|
Conferences in DBLP
The System Likes You. [Citation Graph (, )][DBLP]
Experiences with Host-to-Host IPsec. [Citation Graph (, )][DBLP]
Experiences with Host-to-Host IPsec. [Citation Graph (, )][DBLP]
Repairing the Bluetooth Pairing Protocol. [Citation Graph (, )][DBLP]
Repairing the Bluetooth Pairing Protocol. [Citation Graph (, )][DBLP]
Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags. [Citation Graph (, )][DBLP]
Keep on Blockin' in the Free World. [Citation Graph (, )][DBLP]
PIN (and Chip) or Signature: Beating the Cheating? [Citation Graph (, )][DBLP]
PIN (and Chip) or Signature: Beating the Cheating? [Citation Graph (, )][DBLP]
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable). [Citation Graph (, )][DBLP]
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable). [Citation Graph (, )][DBLP]
Authorisation Subterfuge by Delegation in Decentralised Networks. [Citation Graph (, )][DBLP]
Authorisation Subterfuge by Delegation in Decentralised Networks. [Citation Graph (, )][DBLP]
Multi-channel Protocols. [Citation Graph (, )][DBLP]
Multi-channel Protocols. [Citation Graph (, )][DBLP]
Combining Crypto with Biometrics: A New Human-Security Interface. [Citation Graph (, )][DBLP]
User-Friendly Grid Security Architecture and Protocols. [Citation Graph (, )][DBLP]
User-Friendly Grid Security Architecture and Protocols. [Citation Graph (, )][DBLP]
Countering Automated Exploits with System Security CAPTCHAS. [Citation Graph (, )][DBLP]
Countering Automated Exploits with System Security CAPTCHAS. [Citation Graph (, )][DBLP]
The System Likes You? [Citation Graph (, )][DBLP]
Enhancing Privacy with Shared Pseudo Random Sequences. [Citation Graph (, )][DBLP]
Enhancing Privacy with Shared Pseudo Random Sequences. [Citation Graph (, )][DBLP]
Non-repudiation and the Metaphysics of Presence. [Citation Graph (, )][DBLP]
Non-repudiation and the Metaphysics of Presence. [Citation Graph (, )][DBLP]
Understanding Why Some Network Protocols Are User-Unfriendly. [Citation Graph (, )][DBLP]
Understanding Why Some Network Protocols Are User-Unfriendly. [Citation Graph (, )][DBLP]
Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer. [Citation Graph (, )][DBLP]
Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer. [Citation Graph (, )][DBLP]
Listen Too Closely and You May Be Confused. [Citation Graph (, )][DBLP]
Listen Too Closely and You May Be Confused. [Citation Graph (, )][DBLP]
The Dining Freemasons (Security Protocols for Secret Societies). [Citation Graph (, )][DBLP]
The Dining Freemasons (Security Protocols for Secret Societies). [Citation Graph (, )][DBLP]
On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike). [Citation Graph (, )][DBLP]
Safer Scripting Through Precompilation. [Citation Graph (, )][DBLP]
Safer Scripting Through Precompilation. [Citation Graph (, )][DBLP]
Implementing a Multi-hat PDA. [Citation Graph (, )][DBLP]
Implementing a Multi-hat PDA. [Citation Graph (, )][DBLP]
Anonymous Context Based Role Activation Mechanism. [Citation Graph (, )][DBLP]
Anonymous Context Based Role Activation Mechanism. [Citation Graph (, )][DBLP]
Topology of Covert Conflict. [Citation Graph (, )][DBLP]
The Initial Costs and Maintenance Costs of Protocols. [Citation Graph (, )][DBLP]
The Initial Costs and Maintenance Costs of Protocols. [Citation Graph (, )][DBLP]
Alice and Bob. [Citation Graph (, )][DBLP]
|