Digital signatures: can they be accepted as legal signatures in EDI?
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
ECA '94 Proceedings of the conference on Ethics in the computer age
Why electronic mail is inherently private
ECA '94 Proceedings of the conference on Ethics in the computer age
Assessing computer security vulnerability
ACM SIGOPS Operating Systems Review
Security issues in a networked UNIX and MVS/VM environment
ACM SIGSAC Review
Programming languages for mobile code
ACM Computing Surveys (CSUR)
Mutual authenticating protocol with key distribution in client/server environment
Crossroads - Special issue on computer security
Information leakage from optical emanations
ACM Transactions on Information and System Security (TISSEC)
Framework for security and privacy in automotive telematics
WMC '02 Proceedings of the 2nd international workshop on Mobile commerce
Web-based testing: A study in insecurity
World Wide Web
Enhanced Password Authentication through Fuzzy Logic
IEEE Expert: Intelligent Systems and Their Applications
A Multi-OS Approach to Trusted Computer Systems
Revised Papers from the 9th International Workshop on Security Protocols
The Role of the Development Process in Operating System Security
ISW '00 Proceedings of the Third International Workshop on Information Security
Prospects of Secure Real-Time Video Transmission over CDPD Networks
IMWS '01 Revised Papers from the NSF Workshop on Developing an Infrastructure for Mobile and Wireless Systems
A social perspective on information security: theoretically grounding the domain
Socio-technical and human cognition elements of information systems
Breakthrough in privacy concerns and lawful access conflicts
Telematics and Informatics
String pattern matching for a deluge survival kit
Handbook of massive data sets
Security issues for wireless ATM networks
ACM SIGOPS Operating Systems Review
A Survey to Determine Federal Agency Needs for a Role-Based Access Control Security Product
ISESS '97 Proceedings of the 3rd International Software Engineering Standards Symposium (ISESS '97)
Task-role-based access control model
Information Systems
NSDF: a computer network system description framework and its application to network security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Intrusion Tolerance in Distributed Middleware
Information Systems Frontiers
Enhanced Security Models for Operating Systems: A Cryptographic Approach
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
A proposed curriculum of cryptography courses
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Plagiarism, Graduate Education, and Information Security
IEEE Security and Privacy
Database encryption using enhanced affine block cipher algorithm
MMACTEE'08 Proceedings of the 10th WSEAS International Conference on Mathematical Methods and Computational Techniques in Electrical Engineering
An Annotation-Based Access Control Model and Tools for Collaborative Information Spaces
WSKS '08 Proceedings of the 1st world summit on The Knowledge Society: Emerging Technologies and Information Systems for the Knowledge Society
Uncle-Share: Annotation-Based Access Control for Cooperative and Social Systems
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
Evolving event-driven programs
GECCO '96 Proceedings of the 1st annual conference on Genetic and evolutionary computation
Computer viruses as artificial life
Artificial Life
Giannis Stamatellos: Computer ethics--A global perspective
Ethics and Information Technology
Annotation-based access control for collaborative information spaces
Computers in Human Behavior
SP 800-12. An Introduction to Computer Security: the NIST Handbook
SP 800-12. An Introduction to Computer Security: the NIST Handbook
A generic model for state-based agent systems
IW-FM'97 Proceedings of the 1st Irish conference on Formal Methods
A new framework for secure network management
Computer Communications
Enhancing optimistic access controls with usage control
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Hi-index | 0.00 |