Citation Impact
Citing Papers
Dos and don'ts of client authentication on the web
2001
End-to-end authorization
2000
Principles of Policy in Secure Groups.
2001
Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif
2016
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
2001 Standout
DART
2005 Standout
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
2010 Standout
Ciphertext-Policy Attribute-Based Encryption
2007 Standout
Language-based information-flow security
2003 Standout
Private authentication
2004
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
2012 Standout
A Formal Analysis of 5G Authentication
2018 Standout
An attack on the Needham-Schroeder public-key authentication protocol
1995
Information hiding-a survey
1999 Standout
Secrecy types for asymmetric communication
2003
Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
2015 Standout
TCP Congestion Control
1999 Standout
Why cryptosystems fail
1994
A New Method of Isolation of Isoflavones from Glycine max (Soya Beans) by Complexation Technique
2008
Secrecy by typing in security protocols
1999
Advances in Copper Complexes as Anticancer Agents
2013 Standout
A Calculus for Cryptographic Protocols: The Spi Calculus
1999
Provably repairing the ISO/IEC 9798 standard for entity authentication1
2013
Cryptography and evidence
2021
TCP congestion control with a misbehaving receiver
1999
Lightweight protocols and privacy for all-in-silicon objects
2013
Works of R. Needham being referenced
A logic of authentication
1989
Prudent engineering practice for cryptographic protocols
1996