|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 798 occurrences of 452 keywords
|
|
|
Results
Found 1059 publication records. Showing 1059 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
65 | Lingli Deng, Yeping He, Ziyao Xu |
Combating Index Poisoning in P2P File Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 358-367, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
index poisoning, authenticity, P2P, bloom filter |
64 | Luiz Octavio Massato Kobayashi, Sérgio Shiguemi Furuie |
Proposal for DICOM Multiframe Medical Image Integrity and Authenticity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Imaging ![In: J. Digit. Imaging 22(1), pp. 71-83, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Security, image processing, authenticity, integrity, DICOM |
64 | Pairat Thorncharoensri, Willy Susilo, Yi Mu 0001 |
How to Balance Privacy with Authenticity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers, pp. 184-201, 2008, Springer, 978-3-642-00729-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
universal designated verifier signature schemes, one time, non-transferability, privacy, authenticity |
64 | Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow |
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 352-369, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Identity-based signcryption, public ciphertext authenticity, network security, provable security, firewalls, elliptic curve cryptosystems, public key cryptosystems, forward security, semantical security, cryptographic primitives, public verifiability |
53 | Utpal Garain, Biswajit Halder |
On Automatic Authenticity Verification of Printed Security Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICVGIP ![In: Sixth Indian Conference on Computer Vision, Graphics & Image Processing, ICVGIP 2008, Bhubaneswar, India, 16-19 December 2008, pp. 706-713, 2008, IEEE Computer Society, 978-0-7695-3476-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph |
Authenticity and Provability - A Formal Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfraSec ![In: Infrastructure Security, International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002, Proceedings, pp. 227-245, 2002, Springer, 3-540-44309-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
50 | Ioannis Poulios |
On the Greatest Challenge in the Management of Living Religious Heritage: Linking the Authenticity of Heritage and the Authenticity of Tourist Experiences to the Authenticity of Religious Tradition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TMM_CH (2) ![In: Transdisciplinary Multispectral Modeling and Cooperation for the Preservation of Cultural Heritage - First International Conference, TMM_CH 2018, Athens, Greece, October 10-13, 2018, Revised Selected Papers, Part II, pp. 262-271, 2018, Springer, 978-3-030-12959-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
47 | Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee 0001, Jong In Lim 0001 |
Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 16-34, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
encrypt-then-sign, authenticity, confidentiality, non-repudiation, signcryption, authenticated encryption, public verifiability |
47 | Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 |
Encrypted Message Authentication by Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 69-81, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption |
46 | Yuqun Chen, Mehmet Kivanç Mihçak, Darko Kirovski |
Certifying authenticity via fiber-infused paper. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGecom Exch. ![In: SIGecom Exch. 5(3), pp. 29-37, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
anti-piracy, certificates of authenticity, counterfeit deterrence, security, economics |
46 | Darko Kirovski |
Toward an automated verification of certificates of authenticity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings 5th ACM Conference on Electronic Commerce (EC-2004), New York, NY, USA, May 17-20, 2004, pp. 160-169, 2004, ACM, 1-58113-771-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
asymmetric traveling salesman, certificate of authenticity, point-set compression |
46 | Omer Horvitz, Virgil D. Gligor |
Weak Key Authenticity and the Computational Completeness of Formal Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, pp. 530-547, 2003, Springer, 3-540-40674-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Weak Key Authenticity, Authentication, Cryptography, Encryption, Completeness, Formal Reasoning |
44 | Lingli Deng, Yeping He, Ziyao Xu |
Service Authenticity in P2P File-Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2246-2253, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Jee Hea An, Mihir Bellare |
Does Encryption with Redundancy Provide Authenticity? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding, pp. 512-528, 2001, Springer, 3-540-42070-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
38 | Kriangsiri Malasri, Lan Wang |
Design and implementation of a secure wireless mote-based medical sensor network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiComp ![In: UbiComp 2008: Ubiquitous Computing, 10th International Conference, UbiComp 2008, Seoul, Korea, September 21-24, 2008, Proceedings, pp. 172-181, 2008, ACM, 978-1-60558-136-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
sensor network, privacy, authenticity, health monitoring |
38 | Niladri B. Puhan, Anthony T. S. Ho |
Secure authentication watermarking for localization against the Holliman-Memon attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 12(6), pp. 521-532, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Fragile authentication, Holliman-Memon attack, Authenticity score, Security, Localization, Digital watermarking |
38 | Einar Mykletun, Maithili Narasimha, Gene Tsudik |
Authentication and integrity in outsourced databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Storage ![In: ACM Trans. Storage 2(2), pp. 107-138, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Outsourced databases, signature aggregation, authentication, integrity, data integrity, storage, data authenticity |
38 | Maithili Narasimha, Gene Tsudik |
DSAC: integrity for outsourced databases with signature aggregation and chaining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31 - November 5, 2005, pp. 235-236, 2005, ACM, 1-59593-140-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
integrity and authenticity, signature aggregation, digital signature, schemes, data outsourcing |
38 | Roberto J. Bayardo, Jeffrey S. Sorensen |
Merkle tree authentication of HTTP responses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW (Special interest tracks and posters) ![In: Proceedings of the 14th international conference on World Wide Web, WWW 2005, Chiba, Japan, May 10-14, 2005 - Special interest tracks and posters, pp. 1182-1183, 2005, ACM, 1-59593-051-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
web content distribution, authenticity, merkle hash tree |
38 | Phillip Rogaway, Mihir Bellare, John Black |
OCB: A block-cipher mode of operation for efficient authenticated encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 6(3), pp. 365-403, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
block-cipher usage, authenticity, cryptography, integrity, standards, encryption, AES, provable security, modes of operation |
38 | Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz |
OCB: a block-cipher mode of operation for efficient authenticated encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001., pp. 196-205, 2001, ACM, 1-58113-385-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
authenticity, cryptography, integrity, standards, encryption, block ciphers, AES, provable security, modes of operation |
37 | Haipeng Chen 0002, Xuanjing Shen, Yingda Lv |
Blind Identification Method for Authenticity of Infinite Light Source Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCST ![In: Fifth International Conference on Frontier of Computer Science and Technology, FCST 2010, Changchun, Jilin Province, China, August 18-22, 2010, pp. 131-135, 2010, IEEE Computer Society, 978-0-7695-4139-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
light source direction, Hestenes-Powell multiplier method, image authenticity |
37 | Gilberto Filé, Roberto Vigo |
Expressive Power of Definite Clauses for Verifying Authenticity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 22nd IEEE Computer Security Foundations Symposium, CSF 2009, Port Jefferson, New York, USA, July 8-10, 2009, pp. 251-265, 2009, IEEE Computer Society, 978-0-7695-3712-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
definite clauses, authenticity, security protocols, protocol verification |
37 | Neander Larsen Brisola, Altair Olivo Santin, Lau Cheuk Lung, Heverson Borba Ribeiro, Marcelo H. Vithoft |
A Public Keys Based Architecture for P2P Identification, Content Authenticity and Reputation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops ![In: 23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Workshops Proceedings, Bradford, United Kingdom, May 26-29, 2009, pp. 159-164, 2009, IEEE Computer Society, 978-0-7695-3639-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Security for P2P, P2P persistent identification, peer and content reputation, content authenticity |
36 | Lingli Deng, Yeping He, Ziyao Xu |
Trusted Reputation Management Service for Peer-to-Peer Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems: OTM 2008, OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part II, pp. 1069-1086, 2008, Springer, 978-3-540-88872-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data integrity, virtual machine, P2P, trusted computing, reputation management |
36 | Yvo Desmedt, Goce Jakimoski |
Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings, pp. 324-338, 2007, Springer, 3-540-69327-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Tian-Tsong Ng, Shih-Fu Chang, Jessie Hsu, Lexing Xie, Mao-Pei Tsui |
Physics-motivated features for distinguishing photographic images and computer graphics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 13th ACM International Conference on Multimedia, Singapore, November 6-11, 2005, pp. 239-248, 2005, ACM, 1-59593-044-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
computer graphics, fractal, steganalysis, differential geometry, image authentication, natural image statistics, image forensics |
35 | Julie Doyle, Herna L. Viktor, Eric Paquet |
Long-term digital preservation: preserving authenticity and usability of 3-D data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Digit. Libr. ![In: Int. J. Digit. Libr. 10(1), pp. 33-47, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Metadata, Framework, Emulation, Long-term preservation |
35 | Gerald DeJean, Darko Kirovski |
RF-DNA: Radio-Frequency Certificates of Authenticity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings, pp. 346-363, 2007, Springer, 978-3-540-74734-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Zhi Li 0001, Qibin Sun, Yong Lian |
Unequal authenticity protection (UAP) for rate-distortion-optimized secure streaming of multimedia over wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2006), 21-24 May 2006, Island of Kos, Greece, 2006, IEEE, 0-7803-9389-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Xinwen Zhang, Songqing Chen, Ravi S. Sandhu |
Enhancing Data Authenticity and Integrity in P2P Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 9(6), pp. 42-49, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, ad hoc network, peer-to-peer, trust computing |
35 | Andrew D. Gordon 0001, Alan Jeffrey |
Authenticity by Typing for Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada, pp. 145-159, 2001, IEEE Computer Society, 0-7695-1146-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
35 | Josef Scharinger |
Application of Signed Kolmogorov Hashes to Provide Integrity and Authenticity in Web-Based Software Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCAST ![In: Computer Aided Systems Theory - EUROCAST 2001, Las Palmas de Gran Canaria, Spain, February 19-23, 2001, Revised Papers, pp. 257-269, 2001, Springer, 3-540-42959-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
33 | Leonard Reinecke, Sabine Trepte |
Authenticity and well-being on social network sites: A two-wave longitudinal study on the effects of online authenticity and the positivity bias in SNS communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Hum. Behav. ![In: Comput. Hum. Behav. 30, pp. 95-102, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Jian Ren 0001 |
Privacy-Preserving Communication Algorithms and Network Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WASA ![In: Wireless Algorithms, Systems, and Applications, Third International Conference, WASA 2008, Dallas, TX, USA, October 26-28, 2008. Proceedings, pp. 515-525, 2008, Springer, 978-3-540-88581-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Communication anonymity, sender anonymity, recipient anonymity, location privacy, unconditional security, content authenticity |
29 | Wei Wang 0062, Dongyao Ji |
Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FORTE ![In: Formal Techniques for Networked and Distributed Systems - FORTE 2008, 28th IFIP WG 6.1 International Conference, Tokyo, Japan, June 10-13, 2008, Proceedings, pp. 305-323, 2008, Springer, 978-3-540-68854-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AACS, Authenticity, SPIN, LTL, Collusion Attack, Model Checker |
29 | Miguel Ferreira, Ana Alice Baptista, José Carlos Ramalho |
An intelligent decision support system for digital preservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Digit. Libr. ![In: Int. J. Digit. Libr. 6(4), pp. 295-304, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Preservation metadata, Preservation services, Web services, Service Oriented Architectures (SOA), Authenticity, Decision Support Systems, Migration, Digital preservation |
29 | Aleksej Jerman Blazic |
Long Term Trusted Archive Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: First International Conference on the Digital Society (ICDS 2007), 2-6 January 2007, Guadeloupe, French Caribbean, pp. 29, 2007, IEEE Computer Society, 978-0-7695-2760-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Electronic archive, authenticity, trust, protocol, integrity, validity, authority, document, evidence, record, long-term |
29 | Reagan W. Moore, Richard Marciano |
Building preservation environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCDL ![In: ACM/IEEE Joint Conference on Digital Libraries, JCDL 2005, Denver, CO, USA, June 7-11, 2005, Proceedings, pp. 424, 2005, ACM, 1-58113-876-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
infrastructure independence, persistent archives, authenticity, integrity |
29 | Jorge Dávila, Javier López 0001, Antonio Mana, Juan J. Ortega, José M. Troya |
Development of Secure Internet Applications for Governmental Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 6-8 September 2000, Greenwich, London, UK, pp. 362-368, 2000, IEEE Computer Society, 0-7695-0680-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
secure Internet applications, governmental environments, public administrative procedures, economic benefits, citizen satisfaction, Project Alcance, Spanish R&D Programme, private transport companies, Andalucia regional government, Internet, authenticity, confidentiality, public administration, nonrepudiation |
29 | Petra Wohlmacher, Peter Pharow |
Applications in Health Care using Public-Key Certificates and Attribute Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 128-137, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures |
29 | George M. Mohay, J. Zellers |
Kernel and Shell-Based Applications Integrity Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 34-43, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
kernel-based applications integrity assurance, shell-based applications integrity assurance, software authenticity verification, CASS project, Computer Architecture for Secure Systems, UNIX SVR4.2, Mach 3.0 microkernel, portable shell, UNIX-style platforms, security, data integrity, operating system, executables, computer viruses, integrity checking, implementation issues |
29 | Tzonelih Hwang, T. R. N. Rao |
Secret Error-Correcting Codes (SECC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings, pp. 540-563, 1988, Springer, 3-540-97196-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
Algebraic-Code Cryptosystem, Block Chaining, Ciphertext-Only Attach, Chosen -Plaintext Attach, Cryptographic Parameter, Data Reliability, Data Secrecy, JEEC, Known-Plaintext Attach, SECC, Work Factor, Cryptography, Data Integrity, Cryptanalysis, Data Security, Cryptosystems, Cryptology, Data Authenticity |
27 | Ashish Kundu, Elisa Bertino |
How to authenticate graphs without leaking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: EDBT 2010, 13th International Conference on Extending Database Technology, Lausanne, Switzerland, March 22-26, 2010, Proceedings, pp. 609-620, 2010, ACM, 978-1-60558-945-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Xiaotao Guo, Tian-Ge Zhuang |
A Region-Based Lossless Watermarking Scheme for Enhancing Security of Medical Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Imaging ![In: J. Digit. Imaging 22(1), pp. 53-64, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, integrity, Watermarking, confidentiality, telemedicine, PACS, ROI, image authentication |
27 | Pairat Thorncharoensri, Willy Susilo, Yi Mu 0001 |
Universal Designated Verifier Signatures with Threshold-Signers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, 4th International Workshop on Security, IWSEC 2009, Toyama, Japan, October 28-30, 2009, Proceedings, pp. 89-109, 2009, Springer, 978-3-642-04845-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Dusko Pavlovic, Catherine Meadows 0001 |
Deriving Secrecy in Key Establishment Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings, pp. 384-403, 2006, Springer, 3-540-44601-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Audun Jøsang |
A Subjective Metric of Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings, pp. 329-344, 1998, Springer, 3-540-65004-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Ziqing Mao, Ninghui Li, Ian M. Molloy |
Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers, pp. 238-255, 2009, Springer. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Cross-Site Request Forgery, Web Security, Browser Security |
26 | Daisuke Kikuchi, Naoki Kobayashi 0001 |
Type-Based Automated Verification of Authenticity in Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESOP ![In: Programming Languages and Systems, 18th European Symposium on Programming, ESOP 2009, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2009, York, UK, March 22-29, 2009. Proceedings, pp. 222-236, 2009, Springer, 978-3-642-00589-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Tom Kean, David McLaren, Carol Marsh |
Verifying the Authenticity of Chip Designs with the DesignTag System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008, Anaheim, CA, USA, June 9, 2008. Proceedings, pp. 59-64, 2008, IEEE Computer Society, 978-1-4244-2401-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Zhi Li 0001, Qibin Sun, Yong Lian 0001, Chang Wen Chen |
Joint Source-Channel-Authentication Resource Allocation and Unequal Authenticity Protection for Multimedia Over Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 9(4), pp. 837-850, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Marius Wolf, Eric Lee, Jan O. Borchers |
Education, entertainment and authenticity: lessons learned from designing an interactive exhibit about medieval music. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts Proceedings of the 2007 Conference on Human Factors in Computing Systems, CHI 2007, San Jose, California, USA, April 28 - May 3, 2007, pp. 1887-1892, 2007, ACM, 978-1-59593-642-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multimedia, education, music, entertainment, interactive exhibits |
26 | Jacek Jonczy |
Evaluating Trust and Authenticity with Caution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings, pp. 449-453, 2006, Springer, 3-540-34295-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Reto Kohlas, Jacek Jonczy, Rolf Haenni |
Towards a precise semantics for authenticity and trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 18, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Darko Kirovski |
A Point-Set Compression Heuristic for Fiber-Based Certificates of Authenticity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DCC ![In: 2005 Data Compression Conference (DCC 2005), 29-31 March 2005, Snowbird, UT, USA, pp. 103-112, 2005, IEEE Computer Society, 0-7695-2309-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Christian Haack, Alan Jeffrey |
Timed Spi-Calculus with Types for Secrecy and Authenticity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONCUR ![In: CONCUR 2005 - Concurrency Theory, 16th International Conference, CONCUR 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings, pp. 202-216, 2005, Springer, 3-540-28309-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang |
Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan, pp. 649-654, 2005, IEEE Computer Society, 0-7695-2249-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Christian Decker 0001, Michael Beigl, Albert Krohn, Philip Robinson, Uwe Kubach |
eSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pervasive ![In: Pervasive Computing, Second International Conference, PERVASIVE 2004, Vienna, Austria, April 21-23, 2004, Proceedings, pp. 254-268, 2004, Springer, 3-540-21835-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Andy Gordon 0001 |
Authenticity Types for Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FASec ![In: Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers, pp. 3, 2002, Springer, 3-540-20693-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Bruno Blanchet |
From Secrecy to Authenticity in Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAS ![In: Static Analysis, 9th International Symposium, SAS 2002, Madrid, Spain, September 17-20, 2002, Proceedings, pp. 342-359, 2002, Springer, 3-540-44235-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Jean-Jacques Bascou |
System Survey: Building an Authenticity Profile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), October 12-15, 1998, Lafayette, Louisiana, USA, pp. 284-288, 1998, IEEE Computer Society, 0-8186-9014-3. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Security, Authentication, User Profile |
26 | Pak Chung Wong, R. Daniel Bergeron |
Authenticity Analysis of Wavelet Approximations in Visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Visualization ![In: 6th IEEE Visualization Conference, IEEE Vis 1995, Atlanta, GA, USA, October 29 - November 3, 1995, Proceedings, pp. 184-191, 1995, IEEE Computer Society Press, 0-8186-7187-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
Wavelet transform, Data compression, Data visualization, Multiresolution visualization |
26 | Fritz Bauspieß, Hans-Joachim Knobloch |
How to Keep Authenticity Alive in a Computer Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings, pp. 38-46, 1989, Springer, 3-540-53433-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
20 | Peter H. Kahn Jr., Jolina H. Ruckert, Takayuki Kanda 0001, Hiroshi Ishiguro, Aimee L. Reichert, Heather E. Gary, Solace Shen |
Psychological intimacy with robots?: using interaction patterns to uncover depth of relation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HRI ![In: Proceedings of the 5th ACM/IEEE International Conference on Human Robot Interaction, HRI 2010, Osaka, Japan, March 2-5, 2010, pp. 123-124, 2010, ACM, 978-1-4244-4893-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
social and moral development, authenticity, human-robot interaction, design methodology, intimacy, interaction patterns |
20 | Abdelhamid Benhocine, Lamri Laouamer, Laurent Nana, Anca Pascu |
A New Approach against Color Attacks of Watermarked Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15-17 August 2008, Proceedings, pp. 969-972, 2008, IEEE Computer Society, 978-0-7695-3278-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authenticity, interpolation, watermarking, attacks, image quality, copyright, Stirmark |
20 | Markus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevis, Youn-Kyung Lim |
What Instills Trust? A Qualitative Study of Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 356-361, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
stimuli, design, authenticity, user interface design, experiment, email, phishing, psychology, web pages, think-aloud |
20 | Yiping Shen, T. C. Lam, Jyh-Charn Liu, Wei Zhao 0001 |
On the Confidential Auditing of Distributed Computing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 24th International Conference on Distributed Computing Systems (ICDCS 2004), 24-26 March 2004, Hachioji, Tokyo, Japan, pp. 600-607, 2004, IEEE Computer Society, 0-7695-2086-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
commutative cryptography, secure distributed computing, cluster, authenticity, anonymity, Auditing |
20 | Baoshi Zhu, Jiankang Wu, Mohan S. Kankanhalli |
Print signatures for document authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 145-154, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
laser printer, originality, print signature, authenticity |
20 | Paolo Maggi, Riccardo Sisto |
A configurable mobile agent data protection protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: The Second International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS 2003, July 14-18, 2003, Melbourne, Victoria, Australia, Proceedings, pp. 851-858, 2003, ACM, 1-58113-683-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
mobile agents, data integrity, cryptographic protocols, data authenticity |
20 | Roberto Di Pietro, Antonio Durante, Luigi V. Mancini |
A Reliable Key Authentication Schema for Secure Multicast Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 6-8 October 2003, Florence, Italy, pp. 231-240, 2003, IEEE Computer Society, 0-7695-1955-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Secure multicast communications, logical key hierarchy, re-keying, security, authenticity, confidentiality, key distribution, group key management |
20 | Ahto Buldas, Peeter Laud, Helger Lipmaa |
Accountable certificate management using undeniable attestations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000., pp. 9-17, 2000, ACM, 1-58113-203-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
accountable certificate management, authenticated search trees, long-term authenticity, public-key infrastructure, non-repudiation, search trees, time-stamping, attesters |
18 | Deepak Vijaywargi, Dave Lewis 0002, Darko Kirovski |
Optical DNA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers, pp. 222-229, 2009, Springer. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Tingjian Ge, Stanley B. Zdonik |
Light-Weight, Runtime Verification of Query Sources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 25th International Conference on Data Engineering, ICDE 2009, March 29 2009 - April 2 2009, Shanghai, China, pp. 30-41, 2009, IEEE Computer Society, 978-0-7695-3545-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Senda Hammouda, Zouheir Trabelsi |
An enhanced secure ARP protocol and LAN switch for preveting ARP based attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009, pp. 942-946, 2009, ACM, 978-1-60558-569-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ARP cache poisoning attack, ARP protocol, man-in-the-middle attack |
18 | Matthew C. Stamm, K. J. Ray Liu |
Blind forensics of contrast enhancement in digital images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2008, October 12-15, 2008, San Diego, California, USA, pp. 3112-3115, 2008, IEEE, 978-1-4244-1765-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Yutaka Kidawara |
Information credibility analysis of web content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WICOW ![In: Proceedings of the 2nd ACM Workshop on Information Credibility on the Web, WICOW 2008, Napa Valley, California, USA, October 30, 2008, pp. 3-4, 2008, ACM, 978-1-60558-259-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
nlp, information retrieval, information credibility |
18 | Mingyan Li, Casey K. Fung, Krishna Sampigethaya, Richard Robinson, Radha Poovendran, Rainer Falk, Florian Kohlmayer, Andreas Koepf |
Public key based authentication for secure integration of sensor data and RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HeterSanet ![In: Proceedings of the 1st ACM International Workshop on Heterogeneous Sensor and Actor Networks, HeterSanet 2008, Hong Kong, SAR, China, May 30, 2008, pp. 61-66, 2008, ACM, 978-1-60558-113-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication, workflow, RFID, sensor, tag, certificate, public key |
18 | Tong-Lee Lim, Tieyan Li, Yingjiu Li |
A Security and Performance Evaluation of Hash-Based RFID Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 406-424, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
RFID Security and Privacy, Authentication Protocols |
18 | Joan Arnedo-Moreno, Jordi Herrera-Joancomartí |
Persistent Interoperable Security for JXTA Advertisements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIS ![In: Second International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2008), March 4th-7th, 2008, Technical University of Catalonia, Barcelona, Spain, pp. 354-359, 2008, IEEE Computer Society, 978-0-7695-3109-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | William Steptoe, Anthony Steed |
High-Fidelity Avatar Eye-Representation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VR ![In: IEEE Virtual Reality Conference 2008 (VR 2008), 8-12 March 2008, Reno, Nevada, USA, Proceedings, pp. 111-114, 2008, IEEE Computer Society, 978-1-4244-1971-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Barath Raghavan, Saurabh Panjwani, Anton Mityagin |
Analysis of the SPV secure routing protocol: weaknesses and lessons. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 37(2), pp. 29-38, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
secure path vector, routing, BGP |
18 | Jianguo Zhang, Fenghai Yu, Jianyong Sun, Yuanyuan Yang, Chenwen Liang |
DICOM Image Secure Communications With Internet Protocols IPv6 and IPv4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Technol. Biomed. ![In: IEEE Trans. Inf. Technol. Biomed. 11(1), pp. 70-80, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Zuhua Shao |
Self-certified Signatures Based on Discrete Logarithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIFI ![In: Arithmetic of Finite Fields, First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007, Proceedings, pp. 252-263, 2007, Springer, 978-3-540-73073-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Self-certified public key signature, Discrete logarithm, strong unforgeability |
18 | Tri Van Le, Mike Burmester, Breno de Medeiros |
Universally composable and forward-secure RFID authentication and authenticated key exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 242-252, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RFID authentication and key-exchange protocols, anonymity, forward-security, universal composability |
18 | Chik How Tan |
Insider-secure Hybrid Signcryption SchemeWithout Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 1148-1154, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Bogdan Groza |
Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 550-557, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Somanath Tripathy |
LISA: LIghtweight Security Algorithm for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, 4th International Conference, ICDCIT 2007, Bangalore, India, December 17-20, Proceedings, pp. 129-134, 2007, Springer, 978-3-540-77112-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Bogdan Groza, Dorina Petrica, Simona Barbu, Mariana Bilanin |
Implementation of an Authentication Protocol for Sending Audio-Video Information in Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACI ![In: 4th International Symposium on Applied Computational Intelligence and Informatics, SACI 2007, Timisoara, Romania, May 17-18, 2007, pp. 237-240, 2007, IEEE, 1-4244-1234-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Meng-Hui Lim, Sanggon Lee, Youngho Park 0005, Hoonjae Lee 0001 |
An Enhanced ID-Based Deniable Authentication Protocol on Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II, pp. 1008-1017, 2007, Springer, 978-3-540-74475-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Ziyao Xu, Yeping He, Lingli Deng |
A Multilevel Reputation System for Peer-to-Peer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing, Sixth International Conference on Grid and Cooperative Computing, GCC 2007, August 16-18, 2007, Urumchi, Xinjiang, China, Proceedings, pp. 67-74, 2007, IEEE Computer Society, 0-7695-2871-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Thomas Neubauer, Edgar R. Weippl, Stefan Biffl |
Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 723-731, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Maithili Narasimha, Gene Tsudik |
Authentication of Outsourced Databases Using Signature Aggregation and Chaining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Database Systems for Advanced Applications, 11th International Conference, DASFAA 2006, Singapore, April 12-15, 2006, Proceedings, pp. 420-436, 2006, Springer, 3-540-33337-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Pim Tuyls, Lejla Batina |
RFID-Tags for Anti-counterfeiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, pp. 115-131, 2006, Springer, 3-540-31033-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Physical Unclonable Function (PUF), authentication, RFID, ECC, counterfeiting |
18 | Xiaomei Liu, Li Xiao 0001 |
hiREP: Hierarchical Reputation Management for Peer-to-Peer Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP ![In: 2006 International Conference on Parallel Processing (ICPP 2006), 14-18 August 2006, Columbus, Ohio, USA, pp. 289-296, 2006, IEEE Computer Society, 0-7695-2636-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang |
Certificateless Designated Verifier Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 15-19, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Designated Verifier, Gap Bilinear Diffie-Hellman Problem, Certificateless Cryptography |
18 | Qibin Sun, Shih-Fu Chang |
A secure and robust digital signature scheme for JPEG2000 image authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 7(3), pp. 480-494, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Andrea Oermann, Andreas Lang 0001, Jana Dittmann |
Verifier-tuple for audio-forensic to determine speaker environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 7th workshop on Multimedia & Security, MM&Sec 2005, New York, NY, USA, August 1-2, 2005, 2006, pp. 57-62, 2005, ACM, 1-59593-032-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
concept of content analysis, forensic analysis of digital multimedia |
18 | Anat Bremler-Barr, Hanoch Levy |
Spoofing prevention method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA, pp. 536-547, 2005, IEEE, 0-7803-8968-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Reagan W. Moore, Joseph F. JáJá, Robert Chadduck |
Mitigating Risk of Data Loss in Preservation Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSST ![In: 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST 2005), Information Retrieval from Very Large Storage Systems, CD-ROM, 11-14 April 2005, Monterey, CA, USA, pp. 39-48, 2005, IEEE Computer Society, 0-7695-2318-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1059 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|