The SCEAS System
Navigation Menu

Conferences in DBLP

Security Protocols Workshop (spw)
2006 (conf/spw/2006)


  1. Putting the Human Back in the Protocol. [Citation Graph (, )][DBLP]


  2. Composing Security Metrics. [Citation Graph (, )][DBLP]


  3. Putting the Human Back in Voting Protocols. [Citation Graph (, )][DBLP]


  4. Putting the Human Back in Voting Protocols. [Citation Graph (, )][DBLP]


  5. Towards a Secure Application-Semantic Aware Policy Enforcement Architecture. [Citation Graph (, )][DBLP]


  6. Towards a Secure Application-Semantic Aware Policy Enforcement Architecture. [Citation Graph (, )][DBLP]


  7. Phish and Chips. [Citation Graph (, )][DBLP]


  8. Phish and Chips. [Citation Graph (, )][DBLP]


  9. Where Next for Formal Methods? [Citation Graph (, )][DBLP]


  10. Where Next for Formal Methods? [Citation Graph (, )][DBLP]


  11. Cordial Security Protocol Programming. [Citation Graph (, )][DBLP]


  12. Cordial Security Protocol Programming. [Citation Graph (, )][DBLP]


  13. Privacy-Sensitive Congestion Charging. [Citation Graph (, )][DBLP]


  14. Privacy-Sensitive Congestion Charging. [Citation Graph (, )][DBLP]


  15. The Value of Location Information. [Citation Graph (, )][DBLP]


  16. The Value of Location Information. [Citation Graph (, )][DBLP]


  17. Update on PIN or Signature. [Citation Graph (, )][DBLP]


  18. Innovations for Grid Security from Trusted Computing. [Citation Graph (, )][DBLP]


  19. Innovations for Grid Security from Trusted Computing. [Citation Graph (, )][DBLP]


  20. The Man-in-the-Middle Defence. [Citation Graph (, )][DBLP]


  21. The Man-in-the-Middle Defence. [Citation Graph (, )][DBLP]


  22. Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries. [Citation Graph (, )][DBLP]


  23. Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries. [Citation Graph (, )][DBLP]


  24. Secure Distributed Human Computation. [Citation Graph (, )][DBLP]


  25. Secure Distributed Human Computation. [Citation Graph (, )][DBLP]


  26. Bot, Cyborg and Automated Turing Test. [Citation Graph (, )][DBLP]


  27. Bot, Cyborg and Automated Turing Test. [Citation Graph (, )][DBLP]


  28. A 2-Round Anonymous Veto Protocol. [Citation Graph (, )][DBLP]


  29. A 2-Round Anonymous Veto Protocol. [Citation Graph (, )][DBLP]


  30. How to Speak an Authentication Secret Securely from an Eavesdropper. [Citation Graph (, )][DBLP]


  31. How to Speak an Authentication Secret Securely from an Eavesdropper. [Citation Graph (, )][DBLP]


  32. Secret Public Key Protocols Revisited. [Citation Graph (, )][DBLP]


  33. Secret Public Key Protocols Revisited. [Citation Graph (, )][DBLP]


  34. Vintage Bit Cryptography. [Citation Graph (, )][DBLP]


  35. Vintage Bit Cryptography. [Citation Graph (, )][DBLP]


  36. Usability of Security Management: Defining the Permissions of Guests. [Citation Graph (, )][DBLP]


  37. Usability of Security Management: Defining the Permissions of Guests. [Citation Graph (, )][DBLP]


  38. Eve - The Last Word. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002