Abstract
No abstract available.
Cited By
- Khan S, Luo F, Zhang Z, Ullah F, Amin F, Qadri S, Heyat M, Ruby R, Wang L, Ullah S, Li M, Leung V and Wu K (2023). A Survey on X.509 Public-Key Infrastructure, Certificate Revocation, and Their Modern Implementation on Blockchain and Ledger Technologies, IEEE Communications Surveys & Tutorials, 25:4, (2529-2568), Online publication date: 1-Oct-2023.
- Yadav T, Gosain D and Seamons K Cryptographic deniability Proceedings of the 32nd USENIX Conference on Security Symposium, (3637-3654)
- Bradbury M, Prince D, Marcinkiewicz V and Watson T Attributes and Dimensions of Trust in Secure Systems Proceedings of the 12th International Conference on the Internet of Things, (179-186)
- Jeon S, Shin C, Ko E and Moon J (2022). A security scheme for distributing analysis codes supporting CDM-based research in a multi-center environment, Computer Methods and Programs in Biomedicine, 226:C, Online publication date: 1-Nov-2022.
- Halpin H All that is Solid Melts into Air: Towards Decentralized Cryptographic Access Control Proceedings of the 17th International Conference on Availability, Reliability and Security, (1-6)
- Khan S, Luo F, Zhang Z, Rahim M, Ahmad M and Wu K (2022). Survey on Issues and Recent Advances in Vehicular Public-Key Infrastructure (VPKI), IEEE Communications Surveys & Tutorials, 24:3, (1574-1601), Online publication date: 1-Jul-2022.
- Meurisch C and Mühlhäuser M (2021). Data Protection in AI Services, ACM Computing Surveys, 54:2, (1-38), Online publication date: 31-Mar-2022.
- Schaerer J, Zumbrunn S and Braun T (2022). Veritaa, International Journal of Network Management, 32:2, Online publication date: 10-Mar-2022.
- Madl T Security Concept with Distributed Trust-Levels for Autonomous Cooperative Vehicle Networks 2021 IEEE Intelligent Vehicles Symposium (IV), (321-328)
- Shafagh H, Burkhalter L, Ratnasamy S and Hithnawi A Droplet Proceedings of the 29th USENIX Conference on Security Symposium, (2469-2486)
- Vazquez Sandoval I and Lenzini G A Formal Security Analysis of the Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email Emerging Technologies for Authorization and Authentication, (171-187)
- Jiang W, Li H, Xu G, Wen M, Dong G and Lin X (2022). PTAS, Future Generation Computer Systems, 96:C, (185-195), Online publication date: 1-Jul-2019.
- Buccafurri F, Musarella L and Nardone R Enabling propagation in web of trust by Ethereum Proceedings of the 23rd International Database Applications & Engineering Symposium, (1-6)
- Karati A and Biswas G (2018). Provably secure and authenticated data sharing protocol for IoT‐based crowdsensing network, Transactions on Emerging Telecommunications Technologies, 30:4, Online publication date: 15-Apr-2019.
- Jiang W, Li H, Xu G, Wen M, Dong G and Lin X A Privacy-Preserving Thin-Client Scheme in Blockchain-Based PKI 2018 IEEE Global Communications Conference (GLOBECOM), (1-6)
- Kulynych B, Lueks W, Isaakidis M, Danezis G and Troncoso C ClaimChain Proceedings of the 2018 Workshop on Privacy in the Electronic Society, (86-103)
- Taher P, Boloorchi A and Samadzadeh M (2018). Age-based anonymity, Telecommunications Systems, 69:2, (223-235), Online publication date: 1-Oct-2018.
- Alexopoulos N, Habib S and Mühlhäuser M Towards Secure Distributed Trust Management on a Global Scale Proceedings of the 2018 Workshop on IoT Security and Privacy, (49-54)
- Nguyen H, Eisenbarth J, Ignat C and Perrin O Blockchain-Based Auditing of Transparent Log Servers Data and Applications Security and Privacy XXXII, (21-37)
- Guberek T, McDonald A, Simioni S, Mhaidli A, Toyama K and Schaub F Keeping a Low Profile? Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, (1-15)
- (2018). Efficient deterministic and non-deterministic pseudorandom number generation, Mathematics and Computers in Simulation, 143:C, (114-124), Online publication date: 1-Jan-2018.
- Alexopoulos N On enhancing trust in cryptographic solutions Proceedings of the Symposium on Applied Computing, (1848-1849)
- Karati A and Biswas G (2016). Efficient and provably secure random oracle-free adaptive identity-based encryption with short-signature scheme, Security and Communication Networks, 9:17, (4060-4074), Online publication date: 25-Nov-2016.
- Tschorsch F and Scheuermann B (2016). Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies, IEEE Communications Surveys & Tutorials, 18:3, (2084-2123), Online publication date: 1-Jul-2016.
- Djamaludin C, Foo E, Camtepe S and Corke P (2016). Revocation and update of trust in autonomous delay tolerant networks, Computers and Security, 60:C, (15-36), Online publication date: 1-Jul-2016.
- Taly A and Shankar A Distributed Authorization in Vanadium Tutorial Lectures on Foundations of Security Analysis and Design VIII - Volume 9808, (139-162)
- Memarmoshrefi P, Seibel R and Hogrefe D (2016). Autonomous Ant-based Public Key Authentication Mechanism for Mobile Ad-hoc Networks, Mobile Networks and Applications, 21:1, (149-160), Online publication date: 1-Feb-2016.
- Gilbert S and Zheng C (2015). SybilCast, ACM Transactions on Parallel Computing, 2:3, (1-20), Online publication date: 2-Nov-2015.
- Amour L and Petullo W Improving Application Security through TLS-Library Redesign Proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering - Volume 9354, (75-94)
- McGregor S, Charters P, Holliday T and Roesner F Investigating the computer security practices and needs of journalists Proceedings of the 24th USENIX Conference on Security Symposium, (399-414)
- Melara M, Blankstein A, Bonneau J, Felten E and Freedman M CONIKS Proceedings of the 24th USENIX Conference on Security Symposium, (383-398)
- Gilbert E Open Book Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, (477-486)
- Roesner F, Molnar D, Moshchuk A, Kohno T and Wang H World-Driven Access Control for Continuous Sensing Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, (1169-1181)
- Lécuyer M, Ducoffe G, Lan F, Papancea A, Petsios T, Spahn R, Chaintreau A and Geambasu R XRay Proceedings of the 23rd USENIX conference on Security Symposium, (49-64)
- Tierney M, Spiro I, Bregler C and Subramanian L Cryptagram Proceedings of the first ACM conference on Online social networks, (75-88)
- Gilbert S and Zheng C SybilCast Proceedings of the twenty-fifth annual ACM symposium on Parallelism in algorithms and architectures, (130-139)
- Pranata I, Athauda R and Skinner G (2013). Modeling Decentralized Reputation-Based Trust for Initial Transactions in Digital Environments, ACM Transactions on Internet Technology, 12:3, (1-35), Online publication date: 1-May-2013.
- Xiao H, Malcolm J, Christianson B and Zhang Y Trustworthiness and authentication in ubiquitous computing Proceedings of the 10th ACM international symposium on Mobility management and wireless access, (135-138)
- Glynos D, Argyroudis P and Douligeris C (2012). Collaborative service evaluation with the TwoHop trust framework, Security and Communication Networks, 5:6, (594-613), Online publication date: 1-Jun-2012.
- Jia Z, Lin X, Tan S, Li L and Yang Y (2012). Public key distribution scheme for delay tolerant networks based on two-channel cryptography, Journal of Network and Computer Applications, 35:3, (905-913), Online publication date: 1-May-2012.
- Omar M, Challal Y and Bouabdallah A (2012). Review, Journal of Network and Computer Applications, 35:1, (268-286), Online publication date: 1-Jan-2012.
- Hossmann T, Carta P, Schatzmann D, Legendre F, Gunningberg P and Rohner C Twitter in disaster mode Proceedings of the Special Workshop on Internet and Disasters, (1-8)
- Pranata I, Skinner G and Athauda R A distributed mechanism for secure collaboration in digital ecosystems Proceedings of the International Conference on Management of Emergent Digital EcoSystems, (33-39)
- Pranata I, Skinner G and Athauda R TIDE Proceedings of the International Conference on Management of Emergent Digital EcoSystems, (9-16)
- Garcia-Molina H, Koutrika G and Parameswaran A (2011). Information seeking, Communications of the ACM, 54:11, (121-130), Online publication date: 1-Nov-2011.
- Mallesh N and Wright M (2011). An analysis of the statistical disclosure attack and receiver-bound cover, Computers and Security, 30:8, (597-612), Online publication date: 1-Nov-2011.
- Wojtczak D Trust metrics for the SPKI/SDSI authorisation framework Proceedings of the 9th international conference on Automated technology for verification and analysis, (168-182)
- Gupta M and Han J (2011). Heterogeneous network-based trust analysis, ACM SIGKDD Explorations Newsletter, 13:1, (54-71), Online publication date: 31-Aug-2011.
- Beato F, Kohlweiss M and Wouters K Scramble! your social network data Proceedings of the 11th international conference on Privacy enhancing technologies, (211-225)
- Frazier G, Duong Q, Wellman M and Petersen E Incentivizing responsible networking via introduction-based routing Proceedings of the 4th international conference on Trust and trustworthy computing, (277-293)
- Almenárez F, Marín A, Díaz D, Cortés A, Campo C and García-Rubio C (2011). Trust management for multimedia P2P applications in autonomic networking, Ad Hoc Networks, 9:4, (687-697), Online publication date: 1-Jun-2011.
- Cohen-Almagor R (2011). Internet History, International Journal of Technoethics, 2:2, (45-64), Online publication date: 1-Apr-2011.
- Zhang C, Song Y, Fang Y and Zhang Y (2011). On the price of security in large-scale wireless ad hoc networks, IEEE/ACM Transactions on Networking, 19:2, (319-332), Online publication date: 1-Apr-2011.
- Post A, Shah V and Mislove A Bazaar Proceedings of the 8th USENIX conference on Networked systems design and implementation, (183-196)
- Demertzis F and Xenakis C SOMA Proceedings of the 7th European conference on Public key infrastructures, services and applications, (31-44)
- Feng X, Qiu Q and Tang Z Copy protection for email Proceedings of the 12th International Conference on Electronic Commerce: Roadmap for the Future of Electronic Business, (163-169)
- Saadi R, Pierson J and Brunie L T2D Proceedings of the 2010 ACM Symposium on Applied Computing, (1472-1478)
- Hoffman K, Zage D and Nita-Rotaru C (2009). A survey of attack and defense techniques for reputation systems, ACM Computing Surveys, 42:1, (1-31), Online publication date: 1-Dec-2009.
- Seedorf J, D'Heureuse N, Niccolini S and Cornolti M Detecting trustworthy real-time communications using a web-of-trust Proceedings of the 28th IEEE conference on Global telecommunications, (1387-1394)
- Alcalde B and Mauw S An algebra for trust dilution and trust fusion Proceedings of the 6th international conference on Formal Aspects in Security and Trust, (4-20)
- Herzberg A (2009). DNS-based email sender authentication mechanisms, Computers and Security, 28:8, (731-742), Online publication date: 1-Nov-2009.
- Muñoz-Gea J, Malgosa-Sanahuja J, Manzanares-Lopez P, Sanchez-Aarnoutse J and Garcia-Haro J (2009). Proposal, design and evaluation of a mechanism to limit the length of anonymous overlay network paths, Computers and Security, 28:8, (772-784), Online publication date: 1-Nov-2009.
- Sirivianos M, Kim K and Yang X FaceTrust Proceedings of the 4th USENIX conference on Hot topics in security, (2-2)
- Agudo I, Fernández-Gago C and Lopez J (2009). An Evolutionary Trust and Distrust Model, Electronic Notes in Theoretical Computer Science (ENTCS), 244, (3-12), Online publication date: 1-Aug-2009.
- Nogueira M, Pujolle G, Silva E, Santos A and Albini L Survivable keying for wireless ad hoc networks Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management, (606-613)
- Lambert A, Bezek S and Karahalios K Waterhouse CHI '09 Extended Abstracts on Human Factors in Computing Systems, (4099-4104)
- Cao J, Liao L, Wang G, Ma H and Xiao B (2009). A novel dual-key management protocol based on a hierarchical multicast infrastructure in mobile internet, International Journal of Ad Hoc and Ubiquitous Computing, 4:3/4, (183-190), Online publication date: 1-Apr-2009.
- Goodrich M, Sirivianos M, Solis J, Soriente C, Tsudik G and Uzun E (2009). Using audio in secure device pairing, International Journal of Security and Networks, 4:1/2, (57-68), Online publication date: 1-Feb-2009.
- Hernández-Trapote Á, López-Mencía B, Díaz D, Fernández-Pozo R and Caminero J Embodied conversational agents for voice-biometric interfaces Proceedings of the 10th international conference on Multimodal interfaces, (305-312)
- Herzberg A and Jbara A (2008). Security and identification indicators for browsers against spoofing and phishing attacks, ACM Transactions on Internet Technology, 8:4, (1-36), Online publication date: 1-Sep-2008.
- Chen R, Guo W, Tang L, Hu J and Chen Z Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks Proceedings of the 14th international Euro-Par conference on Parallel Processing, (601-610)
- Guha S, Tang K and Francis P NOYB Proceedings of the first workshop on Online social networks, (49-54)
- Mislove A, Post A, Druschel P and Gummadi K Ostra Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, (15-30)
- Kageyama E, Maziero C and Santin A A pull-based e-mail architecture Proceedings of the 2008 ACM symposium on Applied computing, (468-472)
- Lenders V, Koukoumidis E, Zhang P and Martonosi M Location-based trust for mobile user-generated content Proceedings of the 9th workshop on Mobile computing systems and applications, (60-64)
- Awerbuch B, Curtmola R, Holmer D, Nita-Rotaru C and Rubens H (2008). ODSBR, ACM Transactions on Information and System Security, 10:4, (1-35), Online publication date: 1-Jan-2008.
- Sen J and Subramanyam H An efficient certificate authority for ad hoc networks Proceedings of the 4th international conference on Distributed computing and internet technology, (97-109)
- Spiewak D, Fusenig V and Engel T TrustRings in mobile wireless network settings Proceedings of the 6th WSEAS international conference on Information security and privacy, (63-68)
- Saadi R, Pierson J and Brunie L Context adapted certificate using morph template signature for pervasive environments Proceedings of the 4th international conference on Ubiquitous computing systems, (17-32)
- Saadi R, Pierson J and Brunie L Context Adapted Certificate Using Morph Template Signature for Pervasive Environments Ubiquitous Computing Systems, (17-32)
- Appelt W, Pajo S and Prinz W Supporting trust building in distributed groups by appropriate security technology Proceedings of the 2007 ACM International Conference on Supporting Group Work, (391-398)
- Singaraju G and Kang B RepuScore Proceedings of the 21st conference on Large Installation System Administration Conference, (1-9)
- Arenas A, Wilson M and Matthews B On trust management in grids Proceedings of the 1st international conference on Autonomic computing and communication systems, (1-7)
- Guha S and Francis P (2007). An end-middle-end approach to connection establishment, ACM SIGCOMM Computer Communication Review, 37:4, (193-204), Online publication date: 1-Oct-2007.
- Lui R, Hui L and Yiu S (2007). Delegation with supervision, Information Sciences: an International Journal, 177:19, (4014-4030), Online publication date: 1-Oct-2007.
- Mallesh N and Wright M Countering statistical disclosure with receiver-bound cover traffic Proceedings of the 12th European conference on Research in Computer Security, (547-562)
- Saadi R, Pierson J and Brunie L X316 security toolbox for new generation of certificate Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business, (248-258)
- Guha S and Francis P An end-middle-end approach to connection establishment Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, (193-204)
- Chakrabarti S, Chandrasekhar S, Singhal M and Calvert K Authenticating DSR using a novel multisignature scheme based on cubic LFSR sequences Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks, (156-171)
- Oorschot P, Wan T and Kranakis E (2007). On interdomain routing security and pretty secure BGP (psBGP), ACM Transactions on Information and System Security, 10:3, (11-es), Online publication date: 1-Jul-2007.
- Boldyreva A, Fischlin M, Palacio A and Warinschi B A closer look at PKI Proceedings of the 10th international conference on Practice and theory in public-key cryptography, (458-475)
- Merwe J, Dawoud D and McDonald S (2007). A survey on peer-to-peer key management for mobile ad hoc networks, ACM Computing Surveys, 39:1, (1-es), Online publication date: 12-Apr-2007.
- Kolan P and Dantu R (2007). Socio-technical defense against voice spamming, ACM Transactions on Autonomous and Adaptive Systems, 2:1, (2-es), Online publication date: 1-Mar-2007.
- Jøsang A, Ismail R and Boyd C (2007). A survey of trust and reputation systems for online service provision, Decision Support Systems, 43:2, (618-644), Online publication date: 1-Mar-2007.
- Tseng Y (2007). A heterogeneous-network aided public-key management scheme for mobile ad hoc networks, International Journal of Network Management, 17:1, (3-15), Online publication date: 1-Jan-2007.
- Butler K, Enck W, Plasterr J, Traynor P and McDaniel P Privacy preserving web-based email Proceedings of the Second international conference on Information Systems Security, (116-131)
- Wu Z and Weaver A Using web service enhancements to bridge business trust relationships Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, (1-8)
- Kohlas R, Jonczy J and Haenni R Towards a precise semantics for authenticity and trust Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, (1-9)
- Boyen X, Shacham H, Shen E and Waters B Forward-secure signatures with untrusted update Proceedings of the 13th ACM conference on Computer and communications security, (191-200)
- Byun J, Rhee H, Park H and Lee D Off-line keyword guessing attacks on recent keyword search schemes over encrypted data Proceedings of the Third VLDB international conference on Secure Data Management, (75-83)
- Toledano D, Fernández Pozo R, Hernández Trapote Á and Hernández Gómez L (2006). Usability evaluation of multi-modal biometric verification systems, Interacting with Computers, 18:5, (1101-1122), Online publication date: 1-Sep-2006.
- Kim E, Gupta A, Tsendjav B and Massey D Resolving islands of security problem for DNSSEC Proceedings of the 2006 international conference on Wireless communications and mobile computing, (1271-1276)
- Quinn K, Sullivan D, Lewis D and Wade V The design, generation, and utilisation of a semantically rich personalised model of trust Proceedings of the 4th international conference on Trust Management, (324-338)
- Huynh T, Jennings N and Shadbolt N Certified reputation Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, (1217-1224)
- Sánchez D, Lopez A and Mendoza F A smart card solution for access control and trust management for nomadic users Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications, (62-77)
- Pathak V and Iftode L (2006). Byzantine fault tolerant public key authentication in peer-to-peer systems, Computer Networks: The International Journal of Computer and Telecommunications Networking, 50:4, (579-596), Online publication date: 15-Mar-2006.
- Wang Z, Zhang Z and Zhang Y Towards enhancing trust on chinese e-commerce Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development, (331-342)
- Wang P, Ning P and Reeves D Network Access Control for Mobile Ad-Hoc Networks Information and Communications Security, (350-362)
- Park S and Lee S ID-Based access control and authority delegations Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing, (884-893)
- Di Raimondo M, Gennaro R and Krawczyk H Secure off-the-record messaging Proceedings of the 2005 ACM workshop on Privacy in the electronic society, (81-89)
- Gouda M and Jung E Stabilizing certificate dispersal Proceedings of the 7th international conference on Self-Stabilizing Systems, (140-152)
- Luo J, Hubaux J and Eugster P (2005). DICTATE, IEEE Transactions on Dependable and Secure Computing, 2:4, (311-323), Online publication date: 1-Oct-2005.
- Al-Hamdani W and Griskell I A proposed curriculum of cryptography courses Proceedings of the 2nd annual conference on Information security curriculum development, (4-11)
- van der Merwe J, Dawoud D and McDonald S Fully self-organized peer-to-peer key management for mobile ad hoc networks Proceedings of the 4th ACM workshop on Wireless security, (21-30)
- Amir Y, Nita-Rotaru C, Stanton J and Tsudik G (2005). Secure Spread, IEEE Transactions on Dependable and Secure Computing, 2:3, (248-261), Online publication date: 1-Jul-2005.
- Saadi R, Pierson J and Brunie L Authentification par la méfiance dans les systèmes pervasifs Proceedings of the 2nd French-speaking conference on Mobility and ubiquity computing, (93-96)
- Jøsang A, Keser C and Dimitrakos T Can we manage trust? Proceedings of the Third international conference on Trust Management, (93-107)
- Phan R and Siddiqi M Related-mode attacks on block cipher modes of operation Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III, (661-671)
- Drugan O, Dionysiou I, Bakken D, Plagemann T, Hauser C and Frincke D On the importance of composability of ad hoc mobile middleware and trust management Proceedings of the Second international conference on Service Availability, (149-163)
- Burmester M, de Medeiros B and Yasinsac A Community-centric vanilla-rollback access, or Proceedings of the 13th international conference on Security protocols, (228-237)
- Almenárez F, Marín A, Campo C and García R. C TrustAC Proceedings of the Second international conference on Security in Pervasive Computing, (225-238)
- Go H, Chan P, Dong Y, Sui A, Yiu S, Hui L and Li V Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs) Proceedings of the 43rd annual Southeast regional conference - Volume 2, (75-80)
- Khurana H, Slagell A and Bonilla R SELS Proceedings of the 2005 ACM symposium on Applied computing, (306-313)
- Garfinkel S, Schiller J, Nordlander E, Margrave D and Miller R Views, reactions and impact of digitally-signed mail in e-commerce Proceedings of the 9th international conference on Financial Cryptography and Data Security, (188-202)
- Jøsang A and Pope S Semantic constraints for trust transitivity Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling - Volume 43, (59-68)
- Luo H, Kong J, Zerfos P, Lu S and Zhang L (2004). URSA, IEEE/ACM Transactions on Networking, 12:6, (1049-1063), Online publication date: 1-Dec-2004.
- Quillinan T and Foley S Security in WebCom Proceedings of the 2004 workshop on Secure web service, (97-105)
- Borisov N, Goldberg I and Brewer E Off-the-record communication, or, why not to use PGP Proceedings of the 2004 ACM workshop on Privacy in the electronic society, (77-84)
- Sproull T and Lockwood J Distributed instrusion prevention in active and extensible networks Proceedings of the 6th IFIP TC6 international working conference on Active networks, (54-65)
- Theodorakopoulos G and Baras J Trust evaluation in ad-hoc networks Proceedings of the 3rd ACM workshop on Wireless security, (1-10)
- Nyberg K IKE in ad-hoc IP networking Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks, (139-151)
- Ungureanu V (2004). Formal support for certificate management policies, Computers and Security, 23:4, (300-311), Online publication date: 1-Jun-2004.
- Wiechers W, Daskapan S and Vree W Simulating the establishment of trust infrastructures in multi-agent systems Proceedings of the 6th international conference on Electronic commerce, (255-264)
- Ngai E and Lyu M Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7, (582-587)
- Seigneur J and Jensen C Trust enhanced ubiquitous payment without too much privacy loss Proceedings of the 2004 ACM symposium on Applied computing, (1593-1599)
- Rennhard M, Rafaeli S, Mathy L, Plattner B and Hutchison D (2004). Towards Pseudonymous e-Commerce, Electronic Commerce Research, 4:1-2, (83-111), Online publication date: 1-Jan-2004.
- Herzberg A and Mass Y (2004). Relying Party Credentials Framework, Electronic Commerce Research, 4:1-2, (23-39), Online publication date: 1-Jan-2004.
- Patton M and Jøsang A (2004). Technologies for Trust in Electronic Commerce, Electronic Commerce Research, 4:1-2, (9-21), Online publication date: 1-Jan-2004.
- Key Management for Encrypted Data Storage in Distributed Systems Proceedings of the Second IEEE International Security in Storage Workshop
- Crépeau C and Davis C A certificate revocation scheme for wireless ad hoc networks Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, (54-61)
- Bohge M and Trappe W An authentication framework for hierarchical ad hoc sensor networks Proceedings of the 2nd ACM workshop on Wireless security, (79-87)
- Kong J, Das S, Tsai E and Gerla M ESCORT Proceedings of the 2nd ACM workshop on Wireless security, (51-60)
- Bidder A and Weiler N Key Exchange (KX) - A Next Generation Protocol to Synchronise PGP Keyservers Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
- Čapkun S, Hubaux J and Buttyán L Mobility helps security in ad hoc networks Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing, (46-56)
- Undercoffer J, Perich F, Cedilnik A, Kagal L and Joshi A (2003). A secure infrastructure for service discovery and access in pervasive computing, Mobile Networks and Applications, 8:2, (113-125), Online publication date: 1-Apr-2003.
- Garfinkel S Pretty good privacy (PGP) Encyclopedia of Computer Science, (1421-1422)
- Padmanabhan V and Simon D (2003). Secure traceroute to detect faulty or malicious routing, ACM SIGCOMM Computer Communication Review, 33:1, (77-82), Online publication date: 1-Jan-2003.
- Čapkun S, Buttyán L and Hubaux J (2003). Self-Organized Public-Key Management for Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, 2:1, (52-64), Online publication date: 1-Jan-2003.
- Keoh S and Lupu E Towards flexible credential verification in mobile ad-hoc networks Proceedings of the second ACM international workshop on Principles of mobile computing, (58-65)
- Awerbuch B, Holmer D, Nita-Rotaru C and Rubens H An on-demand secure routing protocol resilient to byzantine failures Proceedings of the 1st ACM workshop on Wireless security, (21-30)
- Yang H, Meng X and Lu S Self-organized network-layer security in mobile ad hoc networks Proceedings of the 1st ACM workshop on Wireless security, (11-20)
- Čapkun S, Buttyán L and Hubaux J Small worlds in security systems Proceedings of the 2002 workshop on New security paradigms, (28-35)
- Lotspiech J, Nusser S and Pestoni F (2002). Broadcast Encryption's Bright Future, Computer, 35:8, (57-63), Online publication date: 1-Aug-2002.
- Mui L, Halberstadt A and Mohtashemi M Evaluating reputation in multi-agents systems Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice, (123-137)
- Mui L, Mohtashemi M and Halberstadt A Notions of reputation in multi-agents systems Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1, (280-287)
- Hubaux J, Buttyán L and Capkun S The quest for security in mobile ad hoc networks Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, (146-155)
- Song D, Wagner D and Tian X Timing analysis of keystrokes and timing attacks on SSH Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
- Aura T Distributed access-rights management with delegation certificates Secure Internet programming, (211-235)
- Steiner M, Buhler P, Eirich T and Waidner M (2001). Secure password-based cipher suite for TLS, ACM Transactions on Information and System Security, 4:2, (134-157), Online publication date: 1-May-2001.
- Park J, Sandhu R and Ahn G (2001). Role-based access control on the web, ACM Transactions on Information and System Security, 4:1, (37-71), Online publication date: 1-Feb-2001.
- Au R, Looi M and Ashley P Automated cross-organisational trust establishment on extranets Proceedings of the workshop on Information technology for virtual enterprises, (3-11)
- Au R, Looi M and Ashley P (2001). Automated cross-organisational trust establishment on extranets, Australian Computer Science Communications, 23:6, (3-11), Online publication date: 1-Jan-2001.
- Hemmerich C Automating Request-based Software Distribution Proceedings of the 14th USENIX conference on System administration, (197-206)
- Adams C, Burmester M, Desmedt Y, Reiter M and Zimmermann P Which PKI (public key infrastructure) is the right one? (panel session) Proceedings of the 7th ACM conference on Computer and Communications Security, (98-101)
- Wright R, Lincoln P and Millen J Efficient fault-tolerant certificate revocation Proceedings of the 7th ACM conference on Computer and Communications Security, (19-24)
- Brown M, Cheung D, Hankerson D, Hernandez J, Kirkup M and Menezes A PGP in constrained wireless devices Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (19-19)
- Katz J and Schneier B A chosen ciphertext attack against several e-mail encryption protocols Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (18-18)
- Park J and Sandhu R (2000). Secure Cookies on the Web, IEEE Internet Computing, 4:4, (36-44), Online publication date: 1-Jul-2000.
- Wright R Obstacles to freedom and privacy by design Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions, (97-100)
- Cranor L and Wright R Influencing software usage Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions, (45-55)
- Bentley D, Rose G and Whalen T ssmail: Opportunistic Encryption in sendmail Proceedings of the 13th USENIX conference on System administration, (1-8)
- Fujimura K, Kuno H, Terada M, Matsuyama K, Mizuno Y and Sekine J Digital-ticket-controlled digital ticket circulation Proceedings of the 8th conference on USENIX Security Symposium - Volume 8, (18-18)
- Li N, Feigenbaum J and Grosof B A Logic-based Knowledge Representation for Authorization with Delegation Proceedings of the 12th IEEE workshop on Computer Security Foundations
- Zadeh J Cryptography on the Internet Proceedings of the 37th annual Southeast regional conference (CD-ROM), (45-es)
- Reiter M and Stubblebine S (1998). Resilient Authentication Using Path Independence, IEEE Transactions on Computers, 47:12, (1351-1362), Online publication date: 1-Dec-1998.
- He Q, Sycara K and Finin T Personal security agent Proceedings of the second international conference on Autonomous agents, (377-384)
- Matocha J, Camp T and Hooper R (1998). Extended analogy, ACM SIGCSE Bulletin, 30:1, (262-266), Online publication date: 1-Mar-1998.
- Matocha J, Camp T and Hooper R Extended analogy Proceedings of the twenty-ninth SIGCSE technical symposium on Computer science education, (262-266)
- Levien R and Aiken A Attack-resistant trust metrics for public key certification Proceedings of the 7th conference on USENIX Security Symposium - Volume 7, (18-18)
- Pfitzmann B and Waidner M (1998). How to break fraud-detectable key recovery, ACM SIGOPS Operating Systems Review, 32:1, (23-28), Online publication date: 1-Jan-1998.
- Reiter M and Stubblebine S Path independence for authentication in large-scale systems Proceedings of the 4th ACM conference on Computer and communications security, (57-66)
- Monrose F and Rubin A Authentication via keystroke dynamics Proceedings of the 4th ACM conference on Computer and communications security, (48-56)
- Chuang S and Wernick P A credibility-based model of computer system security Proceedings of the 1996 workshop on New security paradigms, (53-58)
- Black A and Inouye J System support for mobility Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications, (129-132)
- Davis D Compliance defects in public-key cryptography Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6, (17-17)
- Caronni G, Lubich H, Aziz A, Markson T and Skrenta R SKIP-securing the Internet Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
- Oppliger R and Albanese A Distance education and on-line universities Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
- Bhimani A (1996). Securing the commercial Internet, Communications of the ACM, 39:6, (29-35), Online publication date: 1-Jun-1996.
- Weeks J, Cain A and Sanderson B CCI-Based Web Security: A Design Using PGP Proceedings of the Fourth International Conference on World Wide Web, (381-395)
- Huang J, Seck M and Gheorghe A Towards trustworthy smart cyber-physical-social systems in the era of Internet of Things 2016 11th System of Systems Engineering Conference (SoSE), (1-6)
Index Terms
- The official PGP user's guide