|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 203 occurrences of 133 keywords
|
|
|
Results
Found 252 publication records. Showing 252 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
87 | Feng Bao 0001, Robert H. Deng, Wenbo Mao |
Efficient and Practical Fair Exchange Protocols with Off-Line TTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: Security and Privacy - 1998 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 3-6, 1998, Proceedings, pp. 77-85, 1998, IEEE Computer Society, 0-8186-8386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
78 | Li Dafa |
An Application to Teaching in Logic Course of ATP Based Natural Deduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LPAR ![In: Logic Programming and Automated Reasoning,International Conference LPAR'92, St. Petersburg, Russia, July 15-20, 1992, Proceedings, pp. 463-465, 1992, Springer, 3-540-55727-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
theorem proving, logic, natural deduction |
72 | Jordi Castellà-Roca, Josep Domingo-Ferrer |
On the Security of an Efficient TTP-Free Mental Poker Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (2) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 781-, 2004, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
E-gambling, Cryptographic protocols without Trusted Third Party (TTP), Mental poker |
65 | Macià Mut Puigserver, Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger |
Replay Attack in a Fair Exchange Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pp. 174-187, 2008, 978-3-540-68913-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Günther Bauer 0001, Hermann Kopetz |
Transparent Redundancy in the Time-Triggered Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 25-28 June 2000, New York, NY, USA, pp. 5-13, 2000, IEEE Computer Society, 0-7695-0707-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Fault-Tolerance Layer, Transparent Redundancy, TTP/C, Time-Triggered Architecture |
61 | Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger |
Anonymous Payment in a Fair E-Commerce Protocol with Verifiable TTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 60-69, 2005, Springer, 3-540-28224-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Electronic coins, Anonymity, Atomicity, Fair exchange, Verifiability |
61 | Jordi Castellà-Roca, Francesc Sebé, Josep Domingo-Ferrer |
Dropout-Tolerant TTP-Free Mental Poker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 30-40, 2005, Springer, 3-540-28224-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
player dropout, Mental poker |
61 | Kimio Kuramitsu, Tadashi Murakami, Hajime Matsuda, Ken Sakamura |
TTP: Secure ACID Transfer Protocol for Electronic Ticket between Personal Tamper-Proof Devices . ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 24th International Computer Software and Applications Conference (COMPSAC 2000), 25-28 October 2000, Taipei, Taiwan, pp. 87-92, 2000, IEEE Computer Society, 0-7695-0792-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
electronic transferable ticket, ACID transfer protocols and security, Electronic commerce, smartcard |
59 | Bruno Gaujal, Nicolas Navet |
Maximizing the Robustness of TDMA Networks with Applications to TTP/C. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Real Time Syst. ![In: Real Time Syst. 31(1-3), pp. 5-31, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
in-vehicle network, TTP/C, fault-tolerance, real-time systems, TDMA, replica |
52 | Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith |
Blacklistable anonymous credentials: blocking misbehaving users without ttps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 72-81, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anonymous blacklisting, user misbehavior, privacy, revocation, anonymous authentication |
52 | Omaima Bamasak, Ning Zhang 0001 |
A Distributed Reputation Management Scheme for Mobile Agent-Based E-Commerce Applications . ![Search on Bibsonomy](Pics/bibsonomy.png) |
EEE ![In: 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March - 1 April 2005, Hong Kong, China, pp. 270-275, 2005, IEEE Computer Society, 0-7695-2274-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Holger Vogt, Henning Pagnia, Felix C. Gärtner |
Using Smart Cards for Fair Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WELCOM ![In: Electronic Commerce, Second International Workshop, WELCOM 2001 Heidelberg, Germany, November 16-17, 2001, Proceedings, pp. 101-113, 2001, Springer, 3-540-42878-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
51 | Wei Fan, Huaying Shu, Qiang Yan 0002, Xin Liu |
Two Fair Payment Protocols for E-Commerce Transaction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONFENIS (2) ![In: Research and Practical Issues of Enterprise Information Systems II, Volume 2, IFIP TC 8 WG 8.9 International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS 2007), October 14-16, 2007, Beijing, China, pp. 1037-1046, 2007, Springer, 978-0-387-76311-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
E-payment protocol, TTP, Security, E-commerce, Fairness, Non-repudiation, Concurrent signatures |
50 | Qing Zhang, Qiaoyan Wen, Gengli Chen |
Efficient Fair Contract Signing Protocol from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 333-337, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Trusted Third Party (TTP), bilinear pairings, fair exchange, contract signing |
50 | Sébastien Bardin, Alain Finkel, Jérôme Leroux |
FASTer Acceleration of Counter Automata in Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TACAS ![In: Tools and Algorithms for the Construction and Analysis of Systems, 10th International Conference, TACAS 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2004, Barcelona, Spain, March 29 - April 2, 2004, Proceedings, pp. 576-590, 2004, Springer, 3-540-21299-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
counter automata, convex translation, TTP protocol, acceleration, reachability set |
48 | Mildrey Carbonell, José María Sierra, Jose Antonio Onieva, Javier López 0001, Jianying Zhou 0001 |
Estimation of TTP Features in Non-repudiation Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II, pp. 549-558, 2007, Springer, 978-3-540-74475-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Wilfried Elmenreich, Stefan Krywult |
A comparison of fieldbus protocols: LIN 1.3, LIN 2.0, and TTP/A. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETFA ![In: Proceedings of 10th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2005, September 19-22, 2005, Catania, Italy, 2005, IEEE, 0-7803-9401-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Pavel Herout, Stanislav Racek, Jan Hlavicka |
Model-Based Dependability Evaluation Method for TTP/C Based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDCC ![In: Dependable Computing - EDCC-4, 4th European Dependable Computing Conference, Toulouse, France, October 23-25, 2002, Proceedings, pp. 271-282, 2002, Springer, 3-540-00012-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
48 | Günther Bauer 0001, Michael Paulitsch |
An Investigation of Membership and Clique Avoidance in TTP/C. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 19th IEEE Symposium on Reliable Distributed Systems, SRDS'00, Nürnberg, Germany, October 16-18, 2000, Proceedings, pp. 118-124, 2000, IEEE Computer Society, 0-7695-0543-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
45 | Yashovardhan Sharma, Eleonora Giunchiglia, Simon Birnbach, Ivan Martinovic |
To TTP or not to TTP?: Exploiting TTPs to Improve ML-based Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: IEEE International Conference on Cyber Security and Resilience, CSR 2023, Venice, Italy, July 31 - Aug. 2, 2023, pp. 8-15, 2023, IEEE, 979-8-3503-1170-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
39 | Melek Önen, Abdullatif Shikfa, Refik Molva |
Optimistic fair exchange for secure forwarding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiQuitous ![In: 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), August 6-10, 2007, Philadelphia, PA, USA, pp. 1-5, 2007, IEEE Computer Society, 978-1-4244-1024-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Aris Anagnostopoulos, Laurent Michel, Pascal Van Hentenryck, Yannis Vergados |
A simulated annealing approach to the traveling tournament problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Sched. ![In: J. Sched. 9(2), pp. 177-193, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Sport scheduling, Travelling tournament problems, Simulated annealing, Local search |
39 | Huaping Li, Weidong Kou, Xiaozhen Du |
Fair E-Commerce Protocols without a Third Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 26-29 June 2006, Cagliari, Sardinia, Italy, pp. 324-327, 2006, IEEE Computer Society, 0-7695-2588-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Ling Zhang, Jianping Yin, Yubin Zhan |
An Anonymous Digital Cash and Fair Payment Protocol Utilizing Smart Card in Mobile Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC Workshops ![In: Grid and Cooperative Computing Workshops - GCC 2006, 5th International Conference, Changsha, Hunan, China, 21-23 October 2006, Proceedings, pp. 335-340, 2006, IEEE Computer Society, 0-7695-2695-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Christian Baumgartner, Kurt Gautsch, Christian Böhm 0001, Stephan Felber |
Functional Cluster Analysis of CT Perfusion Maps: A New Tool for Diagnosis of Acute Stroke? ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Imaging ![In: J. Digit. Imaging 18(3), pp. 219-226, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
perfusion imaging, brain infarction, cluster analysis, Computed tomography |
39 | Aleksandra Nenadic, Ning Zhang 0001, Qi Shi 0001, Carole A. Goble |
Certified E-Mail Delivery with DSA Receipts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), CD-ROM / Abstracts Proceedings, 4-8 April 2005, Denver, CO, USA, 2005, IEEE Computer Society, 0-7695-2312-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Omaima Bamasak, Ning Zhang 0001, Doug Edwards |
DiSigncryption: An Integration of Agent-Based Signature Delegation with Distributed Reputation Management Schem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), CD-ROM / Abstracts Proceedings, 4-8 April 2005, Denver, CO, USA, 2005, IEEE Computer Society, 0-7695-2312-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Guilin Wang, Feng Bao 0001, Kenji Imamoto, Kouichi Sakurai |
Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 40-52, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security protocol, non-repudiation, fair exchange, certified email |
39 | Holger Pfeifer, Friedrich W. von Henke |
Modular Formal Analysis of the Central Guardian in the Time-Triggered Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 23rd International Conference, SAFECOMP 2004, Potsdam, Germany, September 21-24, 2004, Proceedings, pp. 240-253, 2004, Springer, 3-540-23176-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Yiping Shen, T. C. Lam, Jyh-Charn Liu, Wei Zhao 0001 |
On the Confidential Auditing of Distributed Computing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 24th International Conference on Distributed Computing Systems (ICDCS 2004), 24-26 March 2004, Hachioji, Tokyo, Japan, pp. 600-607, 2004, IEEE Computer Society, 0-7695-2086-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
commutative cryptography, secure distributed computing, cluster, authenticity, anonymity, Auditing |
39 | Astrit Ademaj, Petr Grillinger, Pavel Herout, Jan Hlavicka |
Fault Tolerance Evaluation Using Two Software Based Fault Injection Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IOLTW ![In: 8th IEEE International On-Line Testing Workshop (IOLTW 2002), 8-10 July 2002, Isle of Bendor, France, pp. 21-25, 2002, IEEE Computer Society, 0-7695-1641-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
39 | Agathe Merceron |
Proving "no Cliques" in a Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSC ![In: 24th Australasian Computer Science Conference (ACSC 2001), 29 January - 1 February 2001, Gold Coast, Queensland, Australia, pp. 134-139, 2001, IEEE Computer Society, 0-7695-0963-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
39 | Olivier Markowitch, Steve Kremer |
An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings, pp. 363-378, 2001, Springer, 3-540-42662-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
39 | Kwangjo Kim, Sangjoon Park, Joonsang Baek |
Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: Proceedings of the 1999 International Conference on Parallel Processing Workshops, ICPPW 1999, Wakamatsu, Japan, September 21-24, 1999, pp. 140-145, 1999, IEEE Computer Society, 0-7695-0353-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Fairness, Cryptographic Protocol, Non-repudiation, Trusted Third Party |
39 | Christian Ebner |
Efficiency evaluation of a time-triggered architecture for vehicle body-electronics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECRTS ![In: 10th Euromicro Conference on Real-Time Systems (ECRTS 1998), 17-19 June 1998, berlin, Germany, Proceedings, pp. 62-70, 1998, IEEE Computer Society, 0-8186-8503-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
38 | Xiang Zhou, Min Huang 0009, Zhiyong Peng |
An additive-attack-proof watermarking mechanism for databases' copyrights protection using image. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 254-258, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
TTP, additive attack, invertibility attack, rights protection, relational database, watermarking |
38 | Tarek F. Abdelzaher, Anees Shaikh, Farnam Jahanian, Kang G. Shin |
RTCAST: lightweight multicast for real-time process groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Real Time Technology and Applications Symposium ![In: 2nd IEEE Real-Time Technology and Applications Symposium, RTAS '96, Boston, MA, USA, June 10-12, 1996, pp. 250-259, 1996, IEEE Computer Society, 0-8186-7448-2. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
RTCAST, real time process groups, lightweight fault tolerant multicast, bounded time message transport, processor crashes, communication failures, communicating processors, membership changes, event triggered approach, fast message delivery time, time triggered protocols, TTP, x-Kernel protocol architecture, RT Mach 3, real-time systems, protocols, fault tolerant computing, message passing, Unix, operating system kernels, communicating processes, membership service |
37 | András Balogh, András Pataricza, Judit Rácz |
Scheduling of embedded time-triggered systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EFTS ![In: Proceedings of the 2007 Workshop on Engineering Fault Tolerant Systems, EFTS 2007, Dubrovnik, Croatia, September 4, 2007, pp. 8, 2007, ACM, 978-1-59593-725-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
TTP/C, time-triggered systems, scheduling, FlexRay |
35 | Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith |
PEREA: towards practical TTP-free revocation in anonymous authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 333-344, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
non-membership proofs, privacy-enhanced revocation, subjective blacklisting, anonymous authentication |
35 | Hao Wang 0003, Yuyi Ou, Jie Ling 0002, Lu Liang, Xiang Xu |
Certified Email Delivery with Offline TTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 15-20, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Weiliang Zhao, Vijay Varadharajan |
Efficient TTP-Free Mental Poker Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 745-750, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Chih-Hung Wang |
Untraceable Fair Network Payment Protocols with Off-Line TTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings, pp. 173-187, 2003, Springer, 3-540-20592-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Designated Confirmer Signatures, Cryptography, Electronic Commerce, Undeniable Signature, Electronic cash, Payment System |
35 | Antoni Martínez-Ballesté, Francesc Sebé, Josep Domingo-Ferrer, Miguel Soriano |
Practical Asymmetric Fingerprinting with a TTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic, pp. 352-356, 2003, IEEE Computer Society, 0-7695-1993-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
asymmetric fingerprinting, Copyright protection, trusted third party |
35 | Jordi Castellà-Roca, Josep Domingo-Ferrer, Andreu Riera, Joan Borrell |
Practical Mental Poker Without a TTP Based on Homomorphic Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings, pp. 280-294, 2003, Springer, 3-540-20609-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Sara Blanc, Joaquin Gracia, Pedro J. Gil |
A Fault Hypothesis Study on the TTP/C Using VHDL-Based and Pin-Level Fault Injection Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DFT ![In: 17th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2002), 6-8 November 2002, Vancouver, BC, Canada, Proceedings, pp. 254-262, 2002, IEEE Computer Society, 0-7695-1831-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Yanping Li, Liaojun Pang |
Multi-party Non-repudiation Protocol with Different Message Exchanged. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 491-494, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Kaoru Kurosawa, Ryo Nojima |
Simple Adaptive Oblivious Transfer without Random Oracle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 334-346, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Adaptive OT, Fully Simulatable, DDH, Standard Model |
26 | Abdullah M. S. Alaraj, Malcolm Munro |
An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 27th International Conference, SAFECOMP 2008, Newcastle upon Tyne, UK, September 22-25, 2008, Proceedings, pp. 193-206, 2008, Springer, 978-3-540-87697-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Liqun Chen 0002, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi |
Property-Based Attestation without a Trusted Third Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 31-46, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Property-based attestation, proof of membership, configuration anonymity, ring signatures, user privacy |
26 | Ifeoma Nwogu, Jason J. Corso |
Exploratory Identification of Image-Based Biomarkers for Solid Mass Pulmonary Tumors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICCAI (1) ![In: Medical Image Computing and Computer-Assisted Intervention - MICCAI 2008, 11th International Conference, New York, NY, USA, September 6-10, 2008, Proceedings, Part I, pp. 612-619, 2008, Springer, 978-3-540-85987-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Luca Di Gaspero, Andrea Schaerf |
A composite-neighborhood tabu search approach to the traveling tournament problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Heuristics ![In: J. Heuristics 13(2), pp. 189-207, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Composite neighborhood, Traveling tournament, Tournament scheduling, Local search, Tabu search, Traveling salesman |
26 | Fabrício Lacerda Biajoli, Luiz Antonio Nogueira Lorena |
Clustering Search Approach for the Traveling Tournament Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICAI ![In: MICAI 2007: Advances in Artificial Intelligence, 6th Mexican International Conference on Artificial Intelligence, Aguascalientes, Mexico, November 4-10, 2007, Proceedings, pp. 83-93, 2007, Springer, 978-3-540-76630-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Gina Kounga, Thomas Walter 0001 |
Identification in Infrastructureless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers, pp. 58-69, 2006, Springer, 978-3-540-69172-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Josep Domingo-Ferrer |
Microaggregation for Database and Location Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NGITS ![In: Next Generation Information Technologies and Systems, 6th International Workshop, NGITS 2006, Kibbutz Shefayim, Israel, July 4-6, 2006, Proceedings, pp. 106-116, 2006, Springer, 3-540-35472-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Statistical database privacy, Location privacy, k-Anonymity, Wireless systems, Microaggregation |
26 | Jin Ho Lee, Young Hoon Lee, Yun Ho Lee |
Mathematical Modeling and Tabu Search Heuristic for the Traveling Tournament Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 875-884, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Philipp Peti, Roman Obermaisser, Harald Paulitsch |
Investigating Connector Faults in the Time-Triggered Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETFA ![In: Proceedings of 11th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2006, September 20-22, 2006, Diplomat Hotel Prague, Czech Republic, pp. 887-896, 2006, IEEE, 0-7803-9758-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Antonio Ruiz-Martínez, C. Inmaculada Marín-López, Laura Baño-López, Antonio Fernandez Gómez-Skarmeta |
A new fair non-repudiation protocol for secure negotiation and contract signing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 16, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
abuse freeness, contract negotiation, contract signing protocol, security, e-commerce, confidentiality, fair-exchange |
26 | Chun-I Fan, Yu-Kuang Liang, Bo-Wei Lin |
Fair Transaction Protocols Based on Electronic Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2006), 4-7 December 2006, Taipei, Taiwan, pp. 383-388, 2006, IEEE Computer Society, 0-7695-2736-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Man Ho Au, Sherman S. M. Chow, Willy Susilo |
Short E-Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings, pp. 332-346, 2005, Springer, 3-540-30805-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Coin-traceability, Bilinear Pairing, E-cash |
26 | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow |
An e-Lottery Scheme Using Verifiable Random Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part III, pp. 651-660, 2005, Springer, 3-540-25862-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
e-lottery, verifiable random function, applied cryptography |
26 | Shiqun Li, Jianying Zhou 0001, Xiangxue Li, Kefei Chen |
An Authentication Protocol for Pervasive Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: Parallel and Distributed Processing and Applications, Third International Symposium, ISPA 2005, Nanjing, China, November 2-5, 2005, Proceedings, pp. 553-563, 2005, Springer, 3-540-29769-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Pervasive Computing Security, Authentication, E-Commerce, Public Key Infrastructure |
26 | Zhenfeng Zhang, Jing Xu 0002, Dengguo Feng |
Efficient Identity-Based Protocol for Fair Certified E-mail Delivery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings, pp. 200-210, 2005, Springer, 3-540-30849-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Security protocol, Fair exchange, Identity-based signature, Certified E-mail |
26 | Zhenfeng Zhang, Dengguo Feng, Jing Xu 0002, Yongbin Zhou |
Efficient ID-Based Optimistic Fair Exchange with Provable Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 14-26, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Provable Security, Fair exchange, Identity-based Signature |
26 | Giuseppe Ateniese |
Verifiable encryption of digital signatures and applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(1), pp. 1-20, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
digital signatures, public-key cryptography, fair exchange, proof of knowledge, contract signing, Certified e-mail |
26 | Sangjin Kim, Heekuck Oh |
Fair Offline Payment Using Verifiable Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, pp. 286-301, 2004, Springer, 3-540-24015-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Omaima Bamasak, Ning Zhang 0001 |
Achieving Distributed Trusted Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 56-61, 2004, IEEE Computer Society, 0-7695-2108-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Günther Bauer 0001, Hermann Kopetz, Wilfried Steiner |
The Central Guardian Approach to Enforce Fault Isolation in the Time-Triggered Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISADS ![In: 6th International Symposium on Autonomous Decentralized Systems (ISADS 2003), 9-11 April 2003, Pisa, Italy, pp. 37-44, 2003, IEEE Computer Society, 0-7695-1876-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Håkan Sivencrona, Per Johannessen, Mattias Persson, Jan Torin |
Heavy-Ion Fault Injections in the Time-Triggered Communication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LADC ![In: Dependable Computing, First Latin-American Symposium, LADC 2003, Sao Paulo, Brazil, October 21-24, 2003, Proceedings, pp. 69-80, 2003, Springer, 3-540-20224-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger |
A Realistic Protocol for Multi-party Certified Electronic Mail. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings, pp. 210-219, 2002, Springer, 3-540-44270-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Manfred Ley, Herbert Grünbacher |
TTA-C2, A Single Chip Communication Controller for the Time-Triggered-Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCD ![In: 20th International Conference on Computer Design (ICCD 2002), VLSI in Computers and Processors, 16-18 September 2002, Freiburg, Germany, Proceedings, pp. 450-453, 2002, IEEE Computer Society, 0-7695-1700-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Ahmed Bouajjani, Agathe Merceron |
Parametric Verification of a Group Membership Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTRTFT ![In: Formal Techniques in Real-Time and Fault-Tolerant Systems, 7th International Symposium, FTRTFT 2002, Co-sponsored by IFIP WG 2.2, Oldenburg, Germany, September 9-12, 2002, Proceedings, pp. 311-330, 2002, Springer, 3-540-44165-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
parametric counter automata, Formal verification, abstraction, fault-tolerant protocols |
26 | Giuseppe Ateniese, Cristina Nita-Rotaru |
Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings, pp. 182-199, 2002, Springer, 3-540-43224-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Xiaolin Pang 0001, Kian-Lee Tan, Yan Wang 0002, Jian Ren |
A Secure Agent-Mediated Payment Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 422-433, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Adrian Perrig, Dawn Song |
Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Proceedings of the 13th IEEE Computer Security Foundations Workshop, CSFW '00, Cambridge, England, UK, July 3-5, 2000, pp. 64-76, 2000, IEEE Computer Society, 0-7695-0671-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Weiliang Zhao, Vijay Varadharajan, Yi Mu 0001 |
Fair On-line Gambling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 394-400, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
fair on-line gambling, fair electronic gambling scheme, gambling outcome, optimal fair exchange metho, gambling message exchange, off-line Trusted Third Party, Internet, Internet, transaction processing, entertainment, security of data, cheating, payment, financial data processing |
26 | Giuseppe Ateniese |
Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '99, Proceedings of the 6th ACM Conference on Computer and Communications Security, Singapore, November 1-4, 1999., pp. 138-146, 1999, ACM, 1-58113-148-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
contract signing problem, digital signatures, public-key cryptography, fair exchange, proof of knowledge, verifiable encryption |
26 | Juan Echagüe, Joan Vila i Carbó, Alfons Crespo |
Providing Generalized Rate Monotonic Scheduling Theory to I/O Abstractions over Timed Token Protocol MAC Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 2nd IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '96), 21-25 October 1996, Montreal, Canada, pp. 107-, 1996, IEEE Computer Society, 0-8186-7614-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
25 | Yaroslav Domaratsky, Maxim Perevozchikov, Alexander Ingulets, Alexander Alkhovik |
Back-End Software for Highly Dependable Real-Time Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 25th International Computer Software and Applications Conference (COMPSAC 2001), Invigorating Software Development, 8-12 October 2001, Chicago, IL, USA, pp. 237-244, 2001, IEEE Computer Society, 0-7695-1372-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
highly dependable, TTOS, FTCom, TTP, fault-tolerant, real-time, TDMA, automotive, RTOS, safety critical, Time-triggered, FlexRay, OS |
24 | Wilfried Steiner, Günther Bauer 0001, Brendan Hall, Michael Paulitsch, Srivatsan Varadarajan |
TTEthernet Dataflow Concept. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, NCA 2009, July 9-11, 2009, Cambridge, Massachusetts, USA, pp. 319-322, 2009, IEEE Computer Society, 978-0-7695-3698-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
mixed-criticality systems, cross-industry application, Avionics Full-Duplex Switched Ethernet (AFDX), Time-Triggered Protocol (TTP), TTEthernet, Ethernet |
24 | Michael Paulitsch, Brendan Hall |
Starting and Resolving a Partitioned BRAIN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISORC ![In: 11th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2008), 5-7 May 2008, Orlando, Florida, USA, pp. 415-421, 2008, IEEE Computer Society, 978-0-7695-3132-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
braided ring, TTP/C, IMA, communication platform, x-by-wire, synchronization, integrity, availability, BRAIN, time-triggered, FlexRay, start-up |
24 | Paul D. Ezhilchelvan, Santosh K. Shrivastava |
A Family of Trusted Third Party Based Fair-Exchange Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 2(4), pp. 273-286, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Trusted Third Party (TTP), crash tolerance, security, distributed systems, smartcards, Fair exchange |
22 | Muhammad Usman Ashraf, Khalid Ali Almarhabi |
An Advanced Dummy Position-Based Privacy Provisioning Framework for TTP-Based LBS System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 23252-23264, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Mohamed Oulaaffart, Rémi Badonnel, Olivier Festor |
C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Syst. Manag. ![In: J. Netw. Syst. Manag. 32(1), pp. 21, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Reza Fayyazi, Rozhina Taghdimi, Shanchieh Jay Yang |
Advancing TTP Analysis: Harnessing the Power of Encoder-Only and Decoder-Only Language Models with Retrieval Augmented Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.00280, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Yue Li, Xiaorui Wang, Chao Zhang |
A Remote Sensing Image Quality Interpretation Scale Characterization Method Based on the TTP Criterion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 15(17), pp. 4121, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Chanho Shin, Insup Lee 0002, Changhee Choi |
Exploiting TTP Co-Occurrence via GloVe-Based Embedding With MITRE ATT&CK Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 100823-100831, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Alexios Lekidis |
Cyber-attack TTP analysis for EPES systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2302.09164, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Mingxuan Fan, Yilun Jin, Liu Yang 0008, Zhenghang Ren, Kai Chen 0005 |
VERTICES: Efficient Two-Party Vertical Federated Linear Model with TTP-aided Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.16139, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Yuga Kanaya, Kenjiro Takazawa |
A Faster Deterministic Approximation Algorithm for TTP-2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.02592, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura |
TTP-Aided Searchable Encryption of Documents Using Threshold Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 9th International Conference on Information Systems Security and Privacy, ICISSP 2023, Lisbon, Portugal, February 22-24, 2023, pp. 442-449, 2023, SciTePress, 978-989-758-624-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Yashovardhan Sharma, Simon Birnbach, Ivan Martinovic |
RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EICC ![In: Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, EICC 2023, Stavanger, Norway, June 14-15, 2023, pp. 159-166, 2023, ACM, 978-1-4503-9829-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Sobhan Niknam, Yixian Shen, Anuj Pathania, Andy D. Pimentel |
3D-TTP: Efficient Transient Temperature-Aware Power Budgeting for 3D-Stacked Processor-Memory Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISVLSI ![In: IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2023, Foz do Iguacu, Brazil, June 20-23, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-2769-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Yong Jin, Masahiko Tomoishi |
A Named-Entity-based TTP-free Authentication and Authorization Architecture for IoT Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 47th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2023, Torino, Italy, June 26-30, 2023, pp. 985-986, 2023, IEEE, 979-8-3503-2697-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Ali Recai Yekta, Dominik Spychalski, Erhan Yekta, Cenk Yekta, Stefan Katzenbeisser 0001 |
VATT&EK: Formalization of Cyber Attacks on Intelligent Transport Systems - a TTP based approach for Automotive and Rail. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCS ![In: Proceedings of the 7th ACM Computer Science in Cars Symposium, CSCS 2023, Darmstadt, Germany, 5 December 2023, pp. 8:1-8:17, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Yuchen Zhao, Qiao Li, Qidong Shi, Tong Wang |
Simulation and Verification of an Improved Membership Fault-Tolerant Service in TTP/C. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IECON ![In: 49th Annual Conference of the IEEE Industrial Electronics Society, IECON 2023, Singapore, October 16-19, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-3182-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal |
TTP-Aided Secure Computation Using (k, n) Threshold Secret Sharing With a Single Computing Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 120503-120513, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Baiyan Wu, Yuwei Peng, Chao Wang |
A TTP watermarking protocol based on visual cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 81(28), pp. 41079-41101, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Jingyang Zhao 0001, Mingyu Xiao 0001 |
Practical Algorithms with Guaranteed Approximation Ratio for TTP with Maximum Tour Length Two. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.12240, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Yizhe You, Jun Jiang, Zhengwei Jiang, Peian Yang, Baoxu Liu, Huamin Feng, Xuren Wang, Ning Li |
TIM: threat context-enhanced TTP intelligence mining on unstructured threat data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecur. ![In: Cybersecur. 5(1), pp. 3, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | María Magdalena Payeras Capellà, Macià Mut Puigserver, Miquel A. Cabot-Nadal, Llorenç Huguet i Rotger |
Blockchain-Based Confidential Multiparty Contract Signing Protocol Without TTP Using Elliptic Curve Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 65(10), pp. 2755-2768, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 252 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ >>] |
|