Science of Computer Programming - Special issue on 12th European symposium on programming (ESOP 2003)
Information security education in the UK: a proposed course in secure e-commerce systems
Proceedings of the 1st annual conference on Information security curriculum development
SKMA: a key management architecture for SCADA systems
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Integrity regions: authentication through presence in wireless networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
Theoretical Computer Science
Provably secure authenticated group Diffie-Hellman key exchange
ACM Transactions on Information and System Security (TISSEC)
Securing group key exchange against strong corruptions
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Securing vehicular ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
EVEY: enhancing privacy of service discovery in pervasive computing
Proceedings of the 2007 ACM/IFIP/USENIX international conference on Middleware companion
ACM Transactions on Computational Logic (TOCL)
A novel secure communication scheme in vehicular ad hoc networks
Computer Communications
Trust-Rated Authentication for Domain-Structured Distributed Systems
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Modal Abstractions of Concurrent Behaviour
SAS '08 Proceedings of the 15th international symposium on Static Analysis
Securing group key exchange against strong corruptions and key registration attacks
International Journal of Applied Cryptography
An improved identity-based key agreement protocol and its security proof
Information Sciences: an International Journal
A New Anonymous Password-Based Authenticated Key Exchange Protocol
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Determining a parallel session attack on a key distribution protocol using a model checker
Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia
Comparing the pre- and post-specified peer models for key agreement
International Journal of Applied Cryptography
Graduate follow up as a vehicle for CSIT curriculum assessment and improvement
Proceedings of the 14th Western Canadian Conference on Computing Education
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Towards Denial-of-Service-Resilient Key Agreement Protocols
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Classification Framework for Fair Content Tracing Protocols
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
The importance of proofs of security for key establishment protocols
Computer Communications
Cryptanalysis of some improved password-authenticated key exchange schemes
Computer Communications
Completeness of discovery protocols
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
Fully Robust Tree-Diffie-Hellman Group Key Exchange
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Synthesising Efficient and Effective Security Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
An improved end-to-end secure authentication scheme for CDMA networks
AsiaCSN '07 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks
Parsing ambiguities in authentication and key establishment protocols
International Journal of Electronic Security and Digital Forensics
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks
Computer Communications
On security models and compilers for group key exchange protocols
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Improving efficiency and simplicity of Tor circuit establishment and hidden services
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Token-based authenticated key establishment protocols for three-party communication
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
3-party approach for fast handover in EAP-based wireless networks
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
An efficient password-only two-server authenticated key exchange system
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Program analysis and compilation, theory and practice
Enforcing spatial constraints for mobile RBAC systems
Proceedings of the 15th ACM symposium on Access control models and technologies
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
Key establishment protocols using environmental and physiological data in wireless sensor networks
International Journal of Sensor Networks
Secure three-party key distribution protocol for fast network access in EAP-based wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Information Sciences: an International Journal
Key management for large-scale distributed storage systems
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
Modal abstractions of concurrent behavior
ACM Transactions on Computational Logic (TOCL)
Resiliency aspects of security protocols
Proceedings of the 15th international conference on Security protocols
Inter-domain and DoS-resistant call establishment protocol (IDDR-CEP): work in progress
Principles, Systems and Applications of IP Telecommunications
Adaptable authentication model: exploring security with weaker attacker models
ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
J-PAKE: authenticated key exchange without PKI
Transactions on computational science XI
Automated analysis of infinite scenarios
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
Distributed temporal logic for the analysis of security protocol models
Theoretical Computer Science
Proceedings of the fourth ACM conference on Wireless network security
A Proposal for a Privacy-preserving National Identity Card
Transactions on Data Privacy
Password authenticated key exchange by juggling
Security'08 Proceedings of the 16th International conference on Security protocols
Key exchange in IPsec revisited: formal analysis of IKEv1 and IKEv2
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
An optimizing authenticated key exchange protocol for self-organizing sensor networks
UCS'06 Proceedings of the Third international conference on Ubiquitous Computing Systems
Formal analysis and systematic construction of two-factor authentication scheme (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Anonymous password-based authenticated key exchange
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
New authentication protocol providing user anonymity in open network
WINE'05 Proceedings of the First international conference on Internet and Network Economics
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
WINE'05 Proceedings of the First international conference on Internet and Network Economics
Session corruption attack and improvements on encryption based MT-Authenticators
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
An improved popescu's authenticated key agreement protocol
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
On the security and composability of the one time pad
SOFSEM'05 Proceedings of the 31st international conference on Theory and Practice of Computer Science
On the existence of related-key oracles in cryptosystems based on block ciphers
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
HMQV: a high-performance secure diffie-hellman protocol
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Deriving secrecy in key establishment protocols
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Optimal key-trees for tree-based private authentication
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Flexible group key exchange with on-demand computation of subgroup keys
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Design of key establishment protocol using one-way functions to avert insider-replay attack
ICISS'06 Proceedings of the Second international conference on Information Systems Security
The challenges raised by the privacy-preserving identity card
Cryptography and Security
A provably secure authenticated key agreement protocol for wireless communications
Computers and Electrical Engineering
iPIN and mTAN for secure eID applications
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Analyzing the Secure Simple Pairing in Bluetooth v4.0
Wireless Personal Communications: An International Journal
Security analysis of a multi-factor authenticated key exchange protocol
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
A complementary analysis of the (s)YZ and DIKE protocols
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
Some improvements to the cost-based framework for analyzing denial of service attacks
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
A Secure Correspondent Router Protocol for NEMO Route Optimization
Computer Networks: The International Journal of Computer and Telecommunications Networking
Ubiquitous One-Time Password Service Using the Generic Authentication Architecture
Mobile Networks and Applications
Hi-index | 0.00 |