On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS)
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Short Survey: Privacy-enhancing technologies for the world wide web
Computer Communications
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle
Computer Communications
Resiliency aspects of security protocols
Proceedings of the 15th international conference on Security protocols
Provably secure s-box implementation based on fourier transform
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Classifying public key certificates
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Hi-index | 0.00 |