The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for authenticity with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1977-1996 (16) 1997-1998 (18) 1999-2000 (27) 2001 (22) 2002 (32) 2003 (38) 2004 (46) 2005 (67) 2006 (92) 2007 (99) 2008 (97) 2009 (70) 2010 (23) 2011 (17) 2012 (19) 2013 (20) 2014 (16) 2015 (16) 2016 (26) 2017 (35) 2018 (32) 2019 (40) 2020 (24) 2021 (46) 2022 (51) 2023 (52) 2024 (18)
Publication types (Num. hits)
article(300) incollection(4) inproceedings(745) phdthesis(10)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 798 occurrences of 452 keywords

Results
Found 1059 publication records. Showing 1059 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
65Lingli Deng, Yeping He, Ziyao Xu Combating Index Poisoning in P2P File Sharing. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF index poisoning, authenticity, P2P, bloom filter
64Luiz Octavio Massato Kobayashi, Sérgio Shiguemi Furuie Proposal for DICOM Multiframe Medical Image Integrity and Authenticity. Search on Bibsonomy J. Digit. Imaging The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, image processing, authenticity, integrity, DICOM
64Pairat Thorncharoensri, Willy Susilo, Yi Mu 0001 How to Balance Privacy with Authenticity. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF universal designated verifier signature schemes, one time, non-transferability, privacy, authenticity
64Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Identity-based signcryption, public ciphertext authenticity, network security, provable security, firewalls, elliptic curve cryptosystems, public key cryptosystems, forward security, semantical security, cryptographic primitives, public verifiability
53Utpal Garain, Biswajit Halder On Automatic Authenticity Verification of Printed Security Documents. Search on Bibsonomy ICVGIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
53Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph Authenticity and Provability - A Formal Framework. Search on Bibsonomy InfraSec The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
50Ioannis Poulios On the Greatest Challenge in the Management of Living Religious Heritage: Linking the Authenticity of Heritage and the Authenticity of Tourist Experiences to the Authenticity of Religious Tradition. Search on Bibsonomy TMM_CH (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
47Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee 0001, Jong In Lim 0001 Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF encrypt-then-sign, authenticity, confidentiality, non-repudiation, signcryption, authenticated encryption, public verifiability
47Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 Encrypted Message Authentication by Firewalls. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption
46Yuqun Chen, Mehmet Kivanç Mihçak, Darko Kirovski Certifying authenticity via fiber-infused paper. Search on Bibsonomy SIGecom Exch. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF anti-piracy, certificates of authenticity, counterfeit deterrence, security, economics
46Darko Kirovski Toward an automated verification of certificates of authenticity. Search on Bibsonomy EC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF asymmetric traveling salesman, certificate of authenticity, point-set compression
46Omer Horvitz, Virgil D. Gligor Weak Key Authenticity and the Computational Completeness of Formal Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Weak Key Authenticity, Authentication, Cryptography, Encryption, Completeness, Formal Reasoning
44Lingli Deng, Yeping He, Ziyao Xu Service Authenticity in P2P File-Sharing. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Jee Hea An, Mihir Bellare Does Encryption with Redundancy Provide Authenticity? Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
38Kriangsiri Malasri, Lan Wang Design and implementation of a secure wireless mote-based medical sensor network. Search on Bibsonomy UbiComp The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sensor network, privacy, authenticity, health monitoring
38Niladri B. Puhan, Anthony T. S. Ho Secure authentication watermarking for localization against the Holliman-Memon attack. Search on Bibsonomy Multim. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fragile authentication, Holliman-Memon attack, Authenticity score, Security, Localization, Digital watermarking
38Einar Mykletun, Maithili Narasimha, Gene Tsudik Authentication and integrity in outsourced databases. Search on Bibsonomy ACM Trans. Storage The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Outsourced databases, signature aggregation, authentication, integrity, data integrity, storage, data authenticity
38Maithili Narasimha, Gene Tsudik DSAC: integrity for outsourced databases with signature aggregation and chaining. Search on Bibsonomy CIKM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF integrity and authenticity, signature aggregation, digital signature, schemes, data outsourcing
38Roberto J. Bayardo, Jeffrey S. Sorensen Merkle tree authentication of HTTP responses. Search on Bibsonomy WWW (Special interest tracks and posters) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF web content distribution, authenticity, merkle hash tree
38Phillip Rogaway, Mihir Bellare, John Black OCB: A block-cipher mode of operation for efficient authenticated encryption. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF block-cipher usage, authenticity, cryptography, integrity, standards, encryption, AES, provable security, modes of operation
38Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz OCB: a block-cipher mode of operation for efficient authenticated encryption. Search on Bibsonomy CCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF authenticity, cryptography, integrity, standards, encryption, block ciphers, AES, provable security, modes of operation
37Haipeng Chen 0002, Xuanjing Shen, Yingda Lv Blind Identification Method for Authenticity of Infinite Light Source Images. Search on Bibsonomy FCST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF light source direction, Hestenes-Powell multiplier method, image authenticity
37Gilberto Filé, Roberto Vigo Expressive Power of Definite Clauses for Verifying Authenticity. Search on Bibsonomy CSF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF definite clauses, authenticity, security protocols, protocol verification
37Neander Larsen Brisola, Altair Olivo Santin, Lau Cheuk Lung, Heverson Borba Ribeiro, Marcelo H. Vithoft A Public Keys Based Architecture for P2P Identification, Content Authenticity and Reputation. Search on Bibsonomy AINA Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security for P2P, P2P persistent identification, peer and content reputation, content authenticity
36Lingli Deng, Yeping He, Ziyao Xu Trusted Reputation Management Service for Peer-to-Peer Collaboration. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data integrity, virtual machine, P2P, trusted computing, reputation management
36Yvo Desmedt, Goce Jakimoski Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Tian-Tsong Ng, Shih-Fu Chang, Jessie Hsu, Lexing Xie, Mao-Pei Tsui Physics-motivated features for distinguishing photographic images and computer graphics. Search on Bibsonomy ACM Multimedia The full citation details ... 2005 DBLP  DOI  BibTeX  RDF computer graphics, fractal, steganalysis, differential geometry, image authentication, natural image statistics, image forensics
35Julie Doyle, Herna L. Viktor, Eric Paquet Long-term digital preservation: preserving authenticity and usability of 3-D data. Search on Bibsonomy Int. J. Digit. Libr. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Metadata, Framework, Emulation, Long-term preservation
35Gerald DeJean, Darko Kirovski RF-DNA: Radio-Frequency Certificates of Authenticity. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Zhi Li 0001, Qibin Sun, Yong Lian Unequal authenticity protection (UAP) for rate-distortion-optimized secure streaming of multimedia over wireless networks. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Xinwen Zhang, Songqing Chen, Ravi S. Sandhu Enhancing Data Authenticity and Integrity in P2P Systems. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, ad hoc network, peer-to-peer, trust computing
35Andrew D. Gordon 0001, Alan Jeffrey Authenticity by Typing for Security Protocols. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
35Josef Scharinger Application of Signed Kolmogorov Hashes to Provide Integrity and Authenticity in Web-Based Software Distribution. Search on Bibsonomy EUROCAST The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
33Leonard Reinecke, Sabine Trepte Authenticity and well-being on social network sites: A two-wave longitudinal study on the effects of online authenticity and the positivity bias in SNS communication. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
29Jian Ren 0001 Privacy-Preserving Communication Algorithms and Network Protocols. Search on Bibsonomy WASA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Communication anonymity, sender anonymity, recipient anonymity, location privacy, unconditional security, content authenticity
29Wei Wang 0062, Dongyao Ji Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol. Search on Bibsonomy FORTE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AACS, Authenticity, SPIN, LTL, Collusion Attack, Model Checker
29Miguel Ferreira, Ana Alice Baptista, José Carlos Ramalho An intelligent decision support system for digital preservation. Search on Bibsonomy Int. J. Digit. Libr. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Preservation metadata, Preservation services, Web services, Service Oriented Architectures (SOA), Authenticity, Decision Support Systems, Migration, Digital preservation
29Aleksej Jerman Blazic Long Term Trusted Archive Services. Search on Bibsonomy ICDS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Electronic archive, authenticity, trust, protocol, integrity, validity, authority, document, evidence, record, long-term
29Reagan W. Moore, Richard Marciano Building preservation environments. Search on Bibsonomy JCDL The full citation details ... 2005 DBLP  DOI  BibTeX  RDF infrastructure independence, persistent archives, authenticity, integrity
29Jorge Dávila, Javier López 0001, Antonio Mana, Juan J. Ortega, José M. Troya Development of Secure Internet Applications for Governmental Environments. Search on Bibsonomy DEXA Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF secure Internet applications, governmental environments, public administrative procedures, economic benefits, citizen satisfaction, Project Alcance, Spanish R&D Programme, private transport companies, Andalucia regional government, Internet, authenticity, confidentiality, public administration, nonrepudiation
29Petra Wohlmacher, Peter Pharow Applications in Health Care using Public-Key Certificates and Attribute Certificates. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures
29George M. Mohay, J. Zellers Kernel and Shell-Based Applications Integrity Assurance. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF kernel-based applications integrity assurance, shell-based applications integrity assurance, software authenticity verification, CASS project, Computer Architecture for Secure Systems, UNIX SVR4.2, Mach 3.0 microkernel, portable shell, UNIX-style platforms, security, data integrity, operating system, executables, computer viruses, integrity checking, implementation issues
29Tzonelih Hwang, T. R. N. Rao Secret Error-Correcting Codes (SECC). Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF Algebraic-Code Cryptosystem, Block Chaining, Ciphertext-Only Attach, Chosen -Plaintext Attach, Cryptographic Parameter, Data Reliability, Data Secrecy, JEEC, Known-Plaintext Attach, SECC, Work Factor, Cryptography, Data Integrity, Cryptanalysis, Data Security, Cryptosystems, Cryptology, Data Authenticity
27Ashish Kundu, Elisa Bertino How to authenticate graphs without leaking. Search on Bibsonomy EDBT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Xiaotao Guo, Tian-Ge Zhuang A Region-Based Lossless Watermarking Scheme for Enhancing Security of Medical Data. Search on Bibsonomy J. Digit. Imaging The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, integrity, Watermarking, confidentiality, telemedicine, PACS, ROI, image authentication
27Pairat Thorncharoensri, Willy Susilo, Yi Mu 0001 Universal Designated Verifier Signatures with Threshold-Signers. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Dusko Pavlovic, Catherine Meadows 0001 Deriving Secrecy in Key Establishment Protocols. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Audun Jøsang A Subjective Metric of Authentication. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26Ziqing Mao, Ninghui Li, Ian M. Molloy Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cross-Site Request Forgery, Web Security, Browser Security
26Daisuke Kikuchi, Naoki Kobayashi 0001 Type-Based Automated Verification of Authenticity in Cryptographic Protocols. Search on Bibsonomy ESOP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Tom Kean, David McLaren, Carol Marsh Verifying the Authenticity of Chip Designs with the DesignTag System. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Zhi Li 0001, Qibin Sun, Yong Lian 0001, Chang Wen Chen Joint Source-Channel-Authentication Resource Allocation and Unequal Authenticity Protection for Multimedia Over Wireless Networks. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Marius Wolf, Eric Lee, Jan O. Borchers Education, entertainment and authenticity: lessons learned from designing an interactive exhibit about medieval music. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multimedia, education, music, entertainment, interactive exhibits
26Jacek Jonczy Evaluating Trust and Authenticity with Caution. Search on Bibsonomy iTrust The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Reto Kohlas, Jacek Jonczy, Rolf Haenni Towards a precise semantics for authenticity and trust. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Darko Kirovski A Point-Set Compression Heuristic for Fiber-Based Certificates of Authenticity. Search on Bibsonomy DCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Christian Haack, Alan Jeffrey Timed Spi-Calculus with Types for Secrecy and Authenticity. Search on Bibsonomy CONCUR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Christian Decker 0001, Michael Beigl, Albert Krohn, Philip Robinson, Uwe Kubach eSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity. Search on Bibsonomy Pervasive The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Andy Gordon 0001 Authenticity Types for Cryptographic Protocols. Search on Bibsonomy FASec The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Bruno Blanchet From Secrecy to Authenticity in Security Protocols. Search on Bibsonomy SAS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Jean-Jacques Bascou System Survey: Building an Authenticity Profile. Search on Bibsonomy ICCCN The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Security, Authentication, User Profile
26Pak Chung Wong, R. Daniel Bergeron Authenticity Analysis of Wavelet Approximations in Visualization. Search on Bibsonomy IEEE Visualization The full citation details ... 1995 DBLP  DOI  BibTeX  RDF Wavelet transform, Data compression, Data visualization, Multiresolution visualization
26Fritz Bauspieß, Hans-Joachim Knobloch How to Keep Authenticity Alive in a Computer Network. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
20Peter H. Kahn Jr., Jolina H. Ruckert, Takayuki Kanda 0001, Hiroshi Ishiguro, Aimee L. Reichert, Heather E. Gary, Solace Shen Psychological intimacy with robots?: using interaction patterns to uncover depth of relation. Search on Bibsonomy HRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF social and moral development, authenticity, human-robot interaction, design methodology, intimacy, interaction patterns
20Abdelhamid Benhocine, Lamri Laouamer, Laurent Nana, Anca Pascu A New Approach against Color Attacks of Watermarked Images. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authenticity, interpolation, watermarking, attacks, image quality, copyright, Stirmark
20Markus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevis, Youn-Kyung Lim What Instills Trust? A Qualitative Study of Phishing. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF stimuli, design, authenticity, user interface design, experiment, email, phishing, psychology, web pages, think-aloud
20Yiping Shen, T. C. Lam, Jyh-Charn Liu, Wei Zhao 0001 On the Confidential Auditing of Distributed Computing Systems. Search on Bibsonomy ICDCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF commutative cryptography, secure distributed computing, cluster, authenticity, anonymity, Auditing
20Baoshi Zhu, Jiankang Wu, Mohan S. Kankanhalli Print signatures for document authentication. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF laser printer, originality, print signature, authenticity
20Paolo Maggi, Riccardo Sisto A configurable mobile agent data protection protocol. Search on Bibsonomy AAMAS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF mobile agents, data integrity, cryptographic protocols, data authenticity
20Roberto Di Pietro, Antonio Durante, Luigi V. Mancini A Reliable Key Authentication Schema for Secure Multicast Communications. Search on Bibsonomy SRDS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Secure multicast communications, logical key hierarchy, re-keying, security, authenticity, confidentiality, key distribution, group key management
20Ahto Buldas, Peeter Laud, Helger Lipmaa Accountable certificate management using undeniable attestations. Search on Bibsonomy CCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF accountable certificate management, authenticated search trees, long-term authenticity, public-key infrastructure, non-repudiation, search trees, time-stamping, attesters
18Deepak Vijaywargi, Dave Lewis 0002, Darko Kirovski Optical DNA. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Tingjian Ge, Stanley B. Zdonik Light-Weight, Runtime Verification of Query Sources. Search on Bibsonomy ICDE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Senda Hammouda, Zouheir Trabelsi An enhanced secure ARP protocol and LAN switch for preveting ARP based attacks. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ARP cache poisoning attack, ARP protocol, man-in-the-middle attack
18Matthew C. Stamm, K. J. Ray Liu Blind forensics of contrast enhancement in digital images. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Yutaka Kidawara Information credibility analysis of web content. Search on Bibsonomy WICOW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF nlp, information retrieval, information credibility
18Mingyan Li, Casey K. Fung, Krishna Sampigethaya, Richard Robinson, Radha Poovendran, Rainer Falk, Florian Kohlmayer, Andreas Koepf Public key based authentication for secure integration of sensor data and RFID. Search on Bibsonomy HeterSanet The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication, workflow, RFID, sensor, tag, certificate, public key
18Tong-Lee Lim, Tieyan Li, Yingjiu Li A Security and Performance Evaluation of Hash-Based RFID Protocols. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RFID Security and Privacy, Authentication Protocols
18Joan Arnedo-Moreno, Jordi Herrera-Joancomartí Persistent Interoperable Security for JXTA Advertisements. Search on Bibsonomy CISIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18William Steptoe, Anthony Steed High-Fidelity Avatar Eye-Representation. Search on Bibsonomy VR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Barath Raghavan, Saurabh Panjwani, Anton Mityagin Analysis of the SPV secure routing protocol: weaknesses and lessons. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secure path vector, routing, BGP
18Jianguo Zhang, Fenghai Yu, Jianyong Sun, Yuanyuan Yang, Chenwen Liang DICOM Image Secure Communications With Internet Protocols IPv6 and IPv4. Search on Bibsonomy IEEE Trans. Inf. Technol. Biomed. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Zuhua Shao Self-certified Signatures Based on Discrete Logarithms. Search on Bibsonomy WAIFI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Self-certified public key signature, Discrete logarithm, strong unforgeability
18Tri Van Le, Mike Burmester, Breno de Medeiros Universally composable and forward-secure RFID authentication and authenticated key exchange. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RFID authentication and key-exchange protocols, anonymity, forward-security, universal composability
18Chik How Tan Insider-secure Hybrid Signcryption SchemeWithout Random Oracles. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Bogdan Groza Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Somanath Tripathy LISA: LIghtweight Security Algorithm for Wireless Sensor Networks. Search on Bibsonomy ICDCIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Bogdan Groza, Dorina Petrica, Simona Barbu, Mariana Bilanin Implementation of an Authentication Protocol for Sending Audio-Video Information in Java. Search on Bibsonomy SACI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Meng-Hui Lim, Sanggon Lee, Youngho Park 0005, Hoonjae Lee 0001 An Enhanced ID-Based Deniable Authentication Protocol on Pairings. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Ziyao Xu, Yeping He, Lingli Deng A Multilevel Reputation System for Peer-to-Peer Networks. Search on Bibsonomy GCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Thomas Neubauer, Edgar R. Weippl, Stefan Biffl Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Maithili Narasimha, Gene Tsudik Authentication of Outsourced Databases Using Signature Aggregation and Chaining. Search on Bibsonomy DASFAA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Pim Tuyls, Lejla Batina RFID-Tags for Anti-counterfeiting. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Physical Unclonable Function (PUF), authentication, RFID, ECC, counterfeiting
18Xiaomei Liu, Li Xiao 0001 hiREP: Hierarchical Reputation Management for Peer-to-Peer Systems. Search on Bibsonomy ICPP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang Certificateless Designated Verifier Signature Schemes. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Designated Verifier, Gap Bilinear Diffie-Hellman Problem, Certificateless Cryptography
18Qibin Sun, Shih-Fu Chang A secure and robust digital signature scheme for JPEG2000 image authentication. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Andrea Oermann, Andreas Lang 0001, Jana Dittmann Verifier-tuple for audio-forensic to determine speaker environment. Search on Bibsonomy MM&Sec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF concept of content analysis, forensic analysis of digital multimedia
18Anat Bremler-Barr, Hanoch Levy Spoofing prevention method. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Reagan W. Moore, Joseph F. JáJá, Robert Chadduck Mitigating Risk of Data Loss in Preservation Environments. Search on Bibsonomy MSST The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1059 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license