The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Asad M. Ali: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Asad M. Ali
    Zero Footprint Secure Internet Authentication Using Network Smart Card. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:91-104 [Conf]
  2. Michael Montgomery, Asad Ali, Karen Lu
    Secure Network Card. Implementation of a Standard Network Stack in a Smart Card. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2004, pp:193-208 [Conf]
  3. HongQian Karen Lu, Asad Ali
    Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:342-353 [Conf]
  4. Asad Ali, Karen Lu, Michael Montgomery
    Network Smart Card: A New Paradigm of Secure Online Transactions. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:267-280 [Conf]
  5. Asad M. Ali
    Designing SSL/TLS protocol for resource constrained devices. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:74-80 [Conf]

  6. Secure Authentication Through Insecure Systems: An Innovative Approach to Smart Card Login. [Citation Graph (, )][DBLP]


  7. Securing the Internet Through Plug-n-Play Smart Cards. [Citation Graph (, )][DBLP]


  8. Communication Security between a Computer and a Hardware Token. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002