Communications of the ACM
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Strong password-only authenticated key exchange
ACM SIGCOMM Computer Communication Review
Distributed access-rights management with delegation certificates
Secure Internet programming
An Access Control with handling Private Information
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
VeriSign CZAG: Privacy Leak in X.509 Certificates
Proceedings of the 11th USENIX Security Symposium
The Trust Shell Game (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Preserving Privacy in Distributed Delegation with Fast Certificates
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Moving from the design of usable security technologies to the design of useful secure applications
Proceedings of the 2002 workshop on New security paradigms
Security and usability engineering with particular attention to electronic mail
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Digital-ticket-controlled digital ticket circulation
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Token-mediated certification and electronic commerce
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
A framework for security modeling using knowledge engineering
AIKED'06 Proceedings of the 5th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering and Data Bases
Security rationale for a cooperative backup service for mobile devices
LADC'07 Proceedings of the Third Latin-American conference on Dependable Computing
Trust management of services in cloud environments: Obstacles and solutions
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |