SECURITY REQUIREMENTS
Experts
- Elisa Bertino
- Willy Susilo
- Kim-Kwang Raymond Choo
- Vijay Varadharajan
- Ahmad-Reza Sadeghi
- Muhammad Khurram Khan
- Yi Mu
- Ashok Kumar Das
- Mihir Bellare
- Wouter Joosen
- Eduardo B. Fernández
- Fabio Massacci
- Eduardo Fernández-Medina
- Robert H. Deng
- Fabio Martinelli
- Dongho Won
- Moti Yung
- Saru Kumari
- Bart Preneel
- Chin-Chen Chang
- Goichiro Hanaoka
- Haralambos Mouratidis
- François-Xavier Standaert
- Jan Jürjens
- Debiao He
- Mridul Nandi
- Jianfeng Ma
- Ran Canetti
- Ingrid Verbauwhede
- Pascal Urien
- Kee-Young Yoo
- Trent Jaeger
- Frédéric Cuppens
- Mauro Conti
- Ozgur Sinanoglu
- Bhavani M. Thuraisingham
- David Pointcheval
- Reihaneh Safavi-Naini
- Neeraj Kumar
Venues
- CoRR
- IACR Cryptol. ePrint Arch.
- Comput. Secur.
- IEEE Access
- RFC
- CCS
- IEEE Secur. Priv.
- ARES
- Sensors
- Secur. Commun. Networks
- IEEE Symposium on Security and Privacy
- Wirel. Pers. Commun.
- SEC
- HICSS
- AMCIS
- IEEE Internet Things J.
- Inf. Secur. J. A Glob. Perspect.
- RE
- USENIX Security Symposium
- ACSAC
- ICC
- Future Gener. Comput. Syst.
- Int. J. Netw. Secur.
- Multim. Tools Appl.
- Security Protocols Workshop
- GLOBECOM
- IEEE Trans. Inf. Forensics Secur.
- Comput. Commun.
- DBSec
- Commun. ACM
- Computer
- IEEE Trans. Dependable Secur. Comput.
- SACMAT
- Comput. Networks
- SECRYPT
- NSPW
- J. Inf. Secur. Appl.
- ACISP
- NDSS
Related Topics
Related Keywords
Popularity