The system likes you? | 0 | 0.34 | 2005 |
Why are we authenticating (transcript of discussion) | 0 | 0.34 | 2004 |
You Can't Take It with You | 0 | 0.34 | 2001 |
I Cannot Tell a Lie (Transcript of Discussion) | 0 | 0.34 | 2000 |
Government Access to Keys - Panel Discussion | 0 | 0.34 | 2000 |
Auditing against Multiple Policies | 0 | 0.34 | 1999 |
Abuse of Process (Transcript of Discussion) | 0 | 0.34 | 1998 |
Discussion Session: Differences Between Academic and Commercial Security | 0 | 0.34 | 1998 |
Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings | 18 | 32.60 | 1998 |
Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings | 18 | 19.89 | 1997 |
A Certification Scheme for Electronic Commerce | 11 | 2.23 | 1996 |
To Whom am I Speaking? Remote Booting in a Hostile World | 3 | 1.43 | 1995 |
Encrypting Network Traffic | 0 | 0.34 | 1993 |