STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
The design, implementation and operation of an email pseudonym server
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Information rules: a strategic guide to the network economy
Information rules: a strategic guide to the network economy
The digital dilemma: intellectual property in the information age
The digital dilemma: intellectual property in the information age
Password security: a case history
Communications of the ACM
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
Anonymous Connections and Onion Routing
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Dos and don'ts of client authentication on the web
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Analysis of the SSL 3.0 protocol
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Securing Agent Based Architectures
EDCIS '02 Proceedings of the First International Conference on Engineering and Deployment of Cooperative Information Systems
Privacy conflicts in CRM services for online shops: a case study
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Digital rights management in a 3G mobile phone and beyond
Proceedings of the 3rd ACM workshop on Digital rights management
How DRM-based content delivery systems disrupt expectations of "personal use"
Proceedings of the 3rd ACM workshop on Digital rights management
Technology and Web User Data Privacy: A Survey of Risks and Countermeasures
IEEE Security and Privacy
Vicarious infringement creates a privacy ceiling
Proceedings of the ACM workshop on Digital rights management
Towards the development of privacy-aware systems
Information and Software Technology
Pricing schemes for digital content with DRM mechanisms
Decision Support Systems
Policy-Aware Content Reuse on the Web
ISWC '09 Proceedings of the 8th International Semantic Web Conference
Study of digital license search for intellectual property rights of S/W source code
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Privacy enhanced access control by means of policy blinding
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
An adaptive approach to hardware alteration for digital rights management
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Photo agent: an agent-based p2p sharing system
AP2PC'04 Proceedings of the Third international conference on Agents and Peer-to-Peer Computing
Batching SSL/TLS handshake improved
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
User requirements-aware security ranking in SSL protocol
The Journal of Supercomputing
Hi-index | 0.00 |