|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 4 occurrences of 4 keywords
|
|
|
Results
Found 8 publication records. Showing 8 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
78 | Sherman S. M. Chow |
Token-Controlled Public Key Encryption in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 315-332, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Token-controlled, provable security, standard model, public key encryption, timed-release encryption |
60 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo |
Token-Controlled Public Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 386-397, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
52 | David Galindo, Javier Herranz |
A Generic Construction for Token-Controlled Public Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers, pp. 177-190, 2006, Springer, 3-540-46255-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Changlu Lin, Yong Li 0002, Sriramkrishnan Srinivasan, Li Lu 0001 |
Analysis on Token-Controlled Public Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: 8th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2012, Chengdu, China, December 14-16, 2012, pp. 87-91, 2012, IEEE Computer Society, 978-1-4673-5808-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
19 | David G. Stork, Rob J. van Glabbeek |
Token-Controlled Place Refinement in Hierarchical Petri Nets with Application to Active Document Workflow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICATPN ![In: Applications and Theory of Petri Nets 2002, 23rd International Conference, ICATPN 2002, Adelaide, Australia, June 24-30, 2002, Proceedings, pp. 394-413, 2002, Springer, 3-540-43787-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Po-Choi Wong, Tak-Shing Peter Yun |
An integrated services token-controlled ring network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 7(5), pp. 670-679, 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
19 | Ashok K. Agrawala, Jonathan R. Agre, K. D. Gordon |
The slotted ring vs. the token-controlled ring: A comparative evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: The IEEE Computer Society's Second International Computer Software and Applications Conference, COMPSAC 1978, 13-16 November, 1978, Chicago, Illinois, USA, pp. 674-679, 1978, IEEE. The full citation details ...](Pics/full.jpeg) |
1978 |
DBLP DOI BibTeX RDF |
|
11 | Zhi-Li Zhang, Donald F. Towsley, James F. Kurose |
Statistical Analysis of Generalized Processor Sharing Scheduling Discipline. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 1994 Conference on Communications Architectures, Protocols and Applications, London, UK, August 31 - September 2, 1994, pp. 68-77, 1994, ACM, 0-89791-682-4. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #8 of 8 (100 per page; Change: )
|
|