Asad M. Ali Designing SSL/TLS protocol for resource constrained devices. [Citation Graph (0, 0)][DBLP] Communication, Network, and Information Security, 2006, pp:74-80 [Conf]
Secure Authentication Through Insecure Systems: An Innovative Approach to Smart Card Login. [Citation Graph (, )][DBLP]
Securing the Internet Through Plug-n-Play Smart Cards. [Citation Graph (, )][DBLP]
Communication Security between a Computer and a Hardware Token. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP