Search for persons
X
?
2008 Annual Computer Security Applications Conference (ACSAC) ,
2
pwdArmor: Protecting Conventional Password-Based Authentica..:
, In:
?
Proceedings of the first ACM conference on Wireless network security ,
3
Wireless authentication using remote passwords:
, In:
?
Proceedings of the 11th international conference on Extending database technology: Advances in database technology ,
4
iDataGuard : middleware providing a secure network drive..:
, In:
?
Proceedings of the 7th ACM workshop on Privacy in the electronic society ,
5
CPG : closed pseudonymous groups:
, In:
?
Proceedings of the 16th international conference on World Wide Web ,
6
Simple authentication for the web:
, In:
?
Proceedings of the tenth ACM symposium on Access control models and technologies ,
7
Adaptive trust negotiation and access control:
, In:
?
Proceedings of the 11th ACM conference on Computer and communications security ,
8
Concealing complex policies with hidden credentials:
, In:
?
Proceedings of the eighth ACM symposium on Access control models and technologies ,
12
An access control model for dynamic client-side content:
, In:
?
Proceedings of the 2003 ACM workshop on Privacy in the electronic society ,
14
Hidden Credentials:
, In:
?
Proceedings of the 8th ACM conference on Computer and Communications Security ,
15