![]() |
| 2008 | ||
|---|---|---|
| 4 | EE | Andrew Harding, Timothy W. van der Horst, Kent E. Seamons: Wireless authentication using remote passwords. WISEC 2008: 24-29 |
| 3 | EE | Reed S. Abbott, Timothy W. van der Horst, Kent E. Seamons: CPG: closed pseudonymous groups. WPES 2008: 55-64 |
| 2007 | ||
| 2 | EE | Timothy W. van der Horst, Kent E. Seamons: Simple authentication for the web. WWW 2007: 1217-1218 |
| 2006 | ||
| 1 | EE | Ravi Chandra Jammalamadaka, Timothy W. van der Horst, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian: Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine. ACSAC 2006: 57-66 |
| 1 | Reed S. Abbott | [3] |
| 2 | Andrew Harding | [4] |
| 3 | Ravi Chandra Jammalamadaka | [1] |
| 4 | Sharad Mehrotra | [1] |
| 5 | Kent E. Seamons | [1] [2] [3] [4] |
| 6 | Nalini Venkatasubramanian | [1] |