|
Conferences in DBLP
Putting the Human Back in the Protocol. [Citation Graph (, )][DBLP]
Composing Security Metrics. [Citation Graph (, )][DBLP]
Putting the Human Back in Voting Protocols. [Citation Graph (, )][DBLP]
Putting the Human Back in Voting Protocols. [Citation Graph (, )][DBLP]
Towards a Secure Application-Semantic Aware Policy Enforcement Architecture. [Citation Graph (, )][DBLP]
Towards a Secure Application-Semantic Aware Policy Enforcement Architecture. [Citation Graph (, )][DBLP]
Phish and Chips. [Citation Graph (, )][DBLP]
Phish and Chips. [Citation Graph (, )][DBLP]
Where Next for Formal Methods? [Citation Graph (, )][DBLP]
Where Next for Formal Methods? [Citation Graph (, )][DBLP]
Cordial Security Protocol Programming. [Citation Graph (, )][DBLP]
Cordial Security Protocol Programming. [Citation Graph (, )][DBLP]
Privacy-Sensitive Congestion Charging. [Citation Graph (, )][DBLP]
Privacy-Sensitive Congestion Charging. [Citation Graph (, )][DBLP]
The Value of Location Information. [Citation Graph (, )][DBLP]
The Value of Location Information. [Citation Graph (, )][DBLP]
Update on PIN or Signature. [Citation Graph (, )][DBLP]
Innovations for Grid Security from Trusted Computing. [Citation Graph (, )][DBLP]
Innovations for Grid Security from Trusted Computing. [Citation Graph (, )][DBLP]
The Man-in-the-Middle Defence. [Citation Graph (, )][DBLP]
The Man-in-the-Middle Defence. [Citation Graph (, )][DBLP]
Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries. [Citation Graph (, )][DBLP]
Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries. [Citation Graph (, )][DBLP]
Secure Distributed Human Computation. [Citation Graph (, )][DBLP]
Secure Distributed Human Computation. [Citation Graph (, )][DBLP]
Bot, Cyborg and Automated Turing Test. [Citation Graph (, )][DBLP]
Bot, Cyborg and Automated Turing Test. [Citation Graph (, )][DBLP]
A 2-Round Anonymous Veto Protocol. [Citation Graph (, )][DBLP]
A 2-Round Anonymous Veto Protocol. [Citation Graph (, )][DBLP]
How to Speak an Authentication Secret Securely from an Eavesdropper. [Citation Graph (, )][DBLP]
How to Speak an Authentication Secret Securely from an Eavesdropper. [Citation Graph (, )][DBLP]
Secret Public Key Protocols Revisited. [Citation Graph (, )][DBLP]
Secret Public Key Protocols Revisited. [Citation Graph (, )][DBLP]
Vintage Bit Cryptography. [Citation Graph (, )][DBLP]
Vintage Bit Cryptography. [Citation Graph (, )][DBLP]
Usability of Security Management: Defining the Permissions of Guests. [Citation Graph (, )][DBLP]
Usability of Security Management: Defining the Permissions of Guests. [Citation Graph (, )][DBLP]
Eve - The Last Word. [Citation Graph (, )][DBLP]
|