Safe and sound: a safety-critical approach to security
Proceedings of the 2001 workshop on New security paradigms
Automated Software Engineering
Security Management Standard — ISO 17799/BS 7799
BT Technology Journal
Security Management: An Information Systems Setting
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Cryptography and computer security for undergraduates
Proceedings of the 35th SIGCSE technical symposium on Computer science education
On the use of PKI technologies for secure and private e-learning environments
CompSysTech '03 Proceedings of the 4th international conference conference on Computer systems and technologies: e-Learning
Extending the Representational State Transfer (REST) Architectural Style for Decentralized Systems
Proceedings of the 26th International Conference on Software Engineering
Enhanced Security Models for Operating Systems: A Cryptographic Approach
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Security, privacy, and anonymity
Crossroads
Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Usability evaluation of multi-modal biometric verification systems
Interacting with Computers
Looking for trouble: understanding end-user security management
Proceedings of the 2007 symposium on Computer human interaction for the management of information technology
Ourmon and network monitoring performance
ATEC '05 Proceedings of the annual conference on USENIX Annual Technical Conference
Security automation considered harmful?
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Feasibility study of tactile-based authentication
International Journal of Human-Computer Studies
Attack-defense trees and two-player binary zero-sum extensive form games are equivalent
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Quantifying the quality of web authentication mechanisms: a usability perspective
Journal of Web Engineering
A methodology and supporting techniques for the quantitative assessment of insider threats
Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing
International Journal of Human-Computer Studies
Information and Software Technology
Hi-index | 0.00 |