Key handling with control vectors
IBM Systems Journal - Special issue on cryptology
A key-management scheme based on control vectors
IBM Systems Journal - Special issue on cryptology
Refinement and extension of encrypted key exchange
ACM SIGOPS Operating Systems Review
Proceedings of the 4th ACM conference on Computer and communications security
ID-based secret-key cryptography
ACM SIGOPS Operating Systems Review
Architectural support for fast symmetric-key cryptography
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
EurAsia-ICT '02 Proceedings of the First EurAsian Conference on Information and Communication Technology
MDx-MAC and Building Fast MACs from Hash Functions
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
SOFSEM '98 Proceedings of the 25th Conference on Current Trends in Theory and Practice of Informatics: Theory and Practice of Informatics
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Cryptographic Primitives for Information Authentication - State of the Art
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
A Flexible User Authentication Scheme for Multi-server Internet Services
ICN '01 Proceedings of the First International Conference on Networking-Part 1
Performance Analysis of the Kerberos Protocol in a Distributed Environment
ISCC '97 Proceedings of the 2nd IEEE Symposium on Computers and Communications (ISCC '97)
Fast Secure Processor for Inhibiting Software Piracy and Tampering
Proceedings of the 36th annual IEEE/ACM International Symposium on Microarchitecture
A public key extension to the common Cryptographic Architecture
IBM Systems Journal
Improving Memory Encryption Performance in Secure Processors
IEEE Transactions on Computers
Usable presentation of secure pseudonyms
Proceedings of the 2005 workshop on Digital identity management
WWW electronic commerce and java trojan horses
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
A new approach of secret key management lifecycle for military applications
WSEAS Transactions on Computers
Design of a secure chat application based on AES cryptographic algorithm and key management
MAMECTIS'08 Proceedings of the 10th WSEAS international conference on Mathematical methods, computational techniques and intelligent systems
MAMECTIS'08 Proceedings of the 10th WSEAS international conference on Mathematical methods, computational techniques and intelligent systems
On the security of two MAC algorithms
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Workload characterization of cryptography algorithms for hardware acceleration
Proceedings of the 2nd ACM/SPEC International Conference on Performance engineering
A new way towards security in TCP/IP protocol suite
ICCOMP'10 Proceedings of the 14th WSEAS international conference on Computers: part of the 14th WSEAS CSCC multiconference - Volume I
On the problem of authentication in a quantum protocol to detect traffic analysis
Quantum Information & Computation
Research: Remote login authentication scheme based on a geometric approach
Computer Communications
A tap and gesture hybrid method for authenticating smartphone users
Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services
Journal of Organizational and End User Computing
Journal of Organizational and End User Computing
Hi-index | 0.00 |