|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1432 occurrences of 846 keywords
|
|
|
Results
Found 2262 publication records. Showing 2260 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
105 | Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao |
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 426-436, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Threshold Multi Authority ABE, Without a central authority |
67 | Melissa Chase, Sherman S. M. Chow |
Improving privacy and security in multi-authority attribute-based encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 121-130, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multi-authority, removing trusted party, privacy, attribute based encryption, anonymous credential |
67 | Denilson Alves Pereira, Berthier A. Ribeiro-Neto, Nivio Ziviani, Alberto H. F. Laender |
Using web information for creating publication venue authority files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCDL ![In: ACM/IEEE Joint Conference on Digital Libraries, JCDL 2008, Pittsburgh, PA, USA, June 16-20, 2008, pp. 295-304, 2008, ACM, 978-1-59593-998-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authority file, canonical name, publication venue, bibliographic citation |
65 | Mark S. Miller, Bill Tulloh, Jonathan S. Shapiro |
The Structure of Authority: Why Security Is Not a Separable Concern. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MOZ ![In: Multiparadigm Programming in Mozart/Oz, Second International Conference, MOZ 2004, Charleroi, Belgium, October 7-8, 2004, Revised Selected and Invited Papers, pp. 2-20, 2004, Springer, 3-540-25079-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
65 | Kenji Imamoto, Kouichi Sakurai |
A Certified E-mail System with Receiver's Selective Usage of Delivery Authority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002, pp. 326-338, 2002, Springer, 3-540-00263-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
receiver's selective protocols, electronic commerce, non-repudiation, certified e-mail |
60 | Sudhir Aggarwal, Justin Christofoli, Sarit Mukherjee, Sampath Rangarajan |
Authority assignment in distributed multi-player proxy-based games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETGAMES ![In: Proceedings of the 5th Workshop on Network and System Support for Games, NETGAMES 2006, Singapore, October 30-31, 2006, pp. 5, 2006, ACM, 1-59593-589-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
communication proxy, latency compensation, games, authority, MMOG, distributed multi-player games |
55 | Maja Zumer, Athena Salaba, Marcia Lei Zeng |
Functional Requirements for Subject Authority Records (FRSAR): A Conceptual Model of Aboutness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICADL ![In: Asian Digital Libraries. Looking Back 10 Years and Forging New Frontiers, 10th International Conference on Asian Digital Libraries, ICADL 2007, Hanoi, Vietnam, December 10-13, 2007, Proceedings, pp. 487-492, 2007, Springer, 978-3-540-77093-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
FRSAR, IFLA, subject access, knowledge organization systems (KOS), subject authority data, subject authority records, conceptual model |
53 | Vagelis Hristidis, Heasoo Hwang, Yannis Papakonstantinou |
Authority-based keyword search in databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 33(1), pp. 1:1-1:40, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Authority flow, quality experiments, specificity, ranking, PageRank |
53 | Jack G. Conrad, Jochen L. Leidner, Frank Schilder |
Professional credibility: authority on the web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WICOW ![In: Proceedings of the 2nd ACM Workshop on Information Credibility on the Web, WICOW 2008, Napa Valley, California, USA, October 30, 2008, pp. 85-88, 2008, ACM, 978-1-60558-259-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
blog monitoring, authority, opinion mining, credibility, blog mining |
53 | David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen |
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings, pp. 67-86, 2006, Springer, 3-540-47820-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Delegation of Authority, Policies, XACML, Attributes, Credentials, PDP |
53 | Leuo-hong Wang, Tong-Wen Lee |
Collecting Topic-Related Web Pages for Link Structure Analysis by Using a Potential Hub and Authority First Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKDD ![In: Advances in Knowledge Discovery and Data Mining, 9th Pacific-Asia Conference, PAKDD 2005, Hanoi, Vietnam, May 18-20, 2005, Proceedings, pp. 832-837, 2005, Springer, 3-540-26076-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Web mining, link structure analysis, hub and authority |
51 | Andreas Harth, Sheila Kinsella, Stefan Decker |
Using Naming Authority to Rank Data and Ontologies for Web Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISWC ![In: The Semantic Web - ISWC 2009, 8th International Semantic Web Conference, ISWC 2009, Chantilly, VA, USA, October 25-29, 2009. Proceedings, pp. 277-292, 2009, Springer, 978-3-642-04929-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
51 | Ramakrishna Varadarajan, Vagelis Hristidis, Louiqa Raschid |
Explaining and Reformulating Authority Flow Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pp. 883-892, 2008, IEEE Computer Society, 978-1-4244-1836-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
51 | Mitsuhiro Mabuchi, Yasushi Shinjo, Akira Sato, Kazuhiko Kato |
An Access Control Model for Web-Services That Supports Delegation and Creation of Authority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Seventh International Conference on Networking (ICN 2008), 13-18 April 2008, Cancun, Mexico, pp. 213-222, 2008, IEEE Computer Society, 978-0-7695-3106-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Web-Service, Access Control, Capability |
51 | Lan Nie, Brian D. Davison 0001 |
Separate and inequal: preserving heterogeneity in topical authority flows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR ![In: Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2008, Singapore, July 20-24, 2008, pp. 443-450, 2008, ACM, 978-1-60558-164-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
reputation, link analysis, PageRank, web search engine |
45 | Infocomm Media Development Authority, David Kuo Chuen Lee |
Artificial Intelligence, Data and Blockchain in a Digital Economy ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
DOI RDF |
|
45 | Internet Assigned Numbers Authority (IANA) |
Special-Use IPv4 Addresses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 3330, pp. 1-7, September 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
45 | Internet Assigned Numbers Authority (IANA) |
Class A Subnet Experiment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 1797, pp. 1-4, April 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
45 | Åsa Cajander, Jan Gulliksen, Inger Boivie |
Management perspectives on usability in a public authority: a case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordiCHI ![In: Proceedings of the 4th Nordic Conference on Human-Computer Interaction 2006, Oslo, Norway, October 14-18, 2006, pp. 38-47, 2006, ACM, 1-59593-325-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
UCSD, basic values, studies of organizations and usability studies, usability, management, case study, participatory design, responsibility, public authority |
45 | Randolph B. Cooper, Anol Bhattacherjee |
Preliminary evidence for the effect of automatic responses to authority on information technology diffusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Base ![In: Data Base 32(3), pp. 36-50, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
IT diffusion, IT use, automatic response, deference to authority, nonrational, principal-agent, unthinking response, controls, incentives, agency theory |
44 | Jeffrey S. Dwoskin, Ruby B. Lee |
Hardware-rooted trust for secure key management and transient trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 389-400, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
hardware policy enforcement, secret protection (sp), transient trust, key management, emergency response, secure processors |
43 | S. Shyam Sundar, Qian Xu 0002, Anne Oeldorf-Hirsch |
Authority vs. peer: how interface cues influence users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Extended Abstracts Volume, Boston, MA, USA, April 4-9, 2009, pp. 4231-4236, 2009, ACM, 978-1-60558-247-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
user interfaces, web design, psychology |
43 | Liu Wenyin, Qingtian Zeng, Wei Chen 0004, Min Feng, Wan Zhang |
Using a User-Interactive QA System to Capture Student's Interest and Authority About Course Content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWL ![In: Advances in Web Based Learning - ICWL 2006, 5th International Conference, Penang, Malaysia, July 19-21, 2006. Revised Papers, pp. 66-80, 2006, Springer, 3-540-49027-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Jun Luo 0001, Jean-Pierre Hubaux, Patrick Th. Eugster |
DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 2(4), pp. 311-323, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, simulations, Ad hoc networks, system design, public-key infrastructure, Quorum Systems |
43 | Toshiyuki Inagaki, Hiroshi Furukawa |
Computer simulation for the design of authority in the adaptive cruise control systems under possibility of driver's over-trust in automation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (4) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 3932-3937, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Chiung-Hui Chiu |
The Authority Structure Problem of Computer Supported Collaborative Concept Mapping System for Elementary Students. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALT ![In: Proceedings IEEE International Conference on Advanced Learning Technology: Issues, Achievements and Challenges, Madison, WI, USA, August 6-8, 2001, pp. 57-60, 2001, IEEE Computer Society, 0-7695-1013-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
39 | Frédéric Dehais, Stéphane Mercier, Catherine Tessier |
Conflicts in Human Operator - Unmanned Vehicles Interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (17) ![In: Engineering Psychology and Cognitive Ergonomics, 8th International Conference, EPCE 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009. Proceedings, pp. 498-507, 2009, Springer, 978-3-642-02727-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
human automation conflits, adaptive autonomy, authority sharing |
38 | David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen |
Adding support to XACML for multi-domain user to user dynamic delegation of authority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(2), pp. 137-152, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Delegation of authority, Credential validation service, RBAC, XACML |
38 | Brett Cannon, Eric Wohlstadter |
Enforcing security for desktop clients using authority aspects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AOSD ![In: Proceedings of the 8th International Conference on Aspect-Oriented Software Development, AOSD 2009, Charlottesville, Virginia, USA, March 2-6, 2009, pp. 255-266, 2009, ACM, 978-1-60558-442-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
authority aspect, authorizing context |
38 | Vipul Goyal, Steve Lu 0001, Amit Sahai, Brent Waters |
Black-box accountable authority identity-based encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 427-436, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
accountable authority, identity-based encryption |
38 | Fernando Carlos Pereira, Joni da Silva Fraga, Ricardo Felipe Custódio |
Self-Adaptable and Intrusion Tolerant Certificate Authority for Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, GinoWan, Okinawa, Japan, March 25-28, 2008, pp. 705-712, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Dynamic distributed systems, distributed certificate authority, Security, Mobile ad hoc networks, key management |
38 | Lidong Zhou, Fred B. Schneider, Robbert van Renesse |
COCA: A secure distributed online certification authority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 20(4), pp. 329-368, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Byzantine quorum systems, proactive secret-sharing, denial of service, public key infrastructure, threshold cryptography, Certification authority |
38 | M. M. M. Snyman, M. Jansen van Rensburg |
Revolutionizing name authority control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM DL ![In: Proceedings of the Fifth ACM Conference on Digital Libraries, June 2-7, 2000, San Antonio, TX, USA, pp. 185-194, 2000, ACM. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
authority files, library catalogue management |
38 | Feng Bao 0001 |
Introducing Decryption Authority into PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 288-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
decryption authority, DA, sensitive messages, asymmetric encryption, Internet, electronic commerce, electronic commerce, digital signature, public key cryptography, public key cryptography, PKI, message authentication, Internet security, telecommunication security, online transactions |
36 | Na Dai, Brian D. Davison 0001 |
Freshness matters: in flowers, food, and web authority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR ![In: Proceeding of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2010, Geneva, Switzerland, July 19-23, 2010, pp. 114-121, 2010, ACM, 978-1-4503-0153-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
temporal link analysis, web freshness, pagerank, web search engine |
36 | Luis Carlos Coronado García, Carlos Hernández-López, Carlos Pérez Leguízamo |
Autonomous Decentralized Root Certification Authority System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 22-26 June 2009, Montreal, Québec, Canada, pp. 257-262, 2009, IEEE Computer Society, 978-0-7695-3660-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Andrew Hickl |
Answering questions with authority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 17th ACM Conference on Information and Knowledge Management, CIKM 2008, Napa Valley, California, USA, October 26-30, 2008, pp. 1261-1270, 2008, ACM, 978-1-59593-991-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
textual reasoning, information retrieval, question answering |
36 | Diao Mingguang, Xue Tao, Pan Wenyong |
Design of Universal Authority Management Model of Online Teaching System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 610-613, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Melissa Chase |
Multi-authority Attribute Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings, pp. 515-534, 2007, Springer, 3-540-70935-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Jaydip Sen, Harihara Subramanyam |
An Efficient Certificate Authority for Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, 4th International Conference, ICDCIT 2007, Bangalore, India, December 17-20, Proceedings, pp. 97-109, 2007, Springer, 978-3-540-77112-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Marcus J. Huber, Sanjeev Kumar 0004, Sean A. Lisse, David McGee |
Authority, Deontics and Joint Intentions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA, pp. 550-555, 2007, IEEE Computer Society, 978-0-7695-2776-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Jaydip Sen, M. Girish Chandra, P. Balamuralidhar, Harihara S. G., Harish Reddy |
A Scheme of Certificate Authority for Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 3-7 September 2007, Regensburg, Germany, pp. 615-619, 2007, IEEE Computer Society, 0-7695-2932-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Marcus J. Huber, Sanjeev Kumar 0004, David McGee, Sean A. Lisse |
Integrating authority, deontics, and communications within a joint intention framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), Honolulu, Hawaii, USA, May 14-18, 2007, pp. 178, 2007, IFAAMAS, 978-81-904262-7-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | George Stephanides, Mirel Cosulschi, Mihai Gabroveanu, Nicolae Constantinescu |
AHPA-Calculating Hub and Authority for Information Retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 22nd International Conference on Data Engineering Workshops, ICDE 2006, 3-7 April 2006, Atlanta, GA, USA, pp. 36, 2006, IEEE Computer Society, 0-7695-2571-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Haibo Tian, Xi Sun, Yumin Wang |
A Virtual Bridge Certificate Authority Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 500-507, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Donald de B. Beaver |
Does collaborative research have greater epistemic authority? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Scientometrics ![In: Scientometrics 60(3), pp. 399-408, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Aaron Krowne, Anil Bazaz |
Authority Models for Collaborative Authoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe |
Mutually Trusted Authority-Free Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 10(4), pp. 261-289, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Key words, Secret sharing schemes, Secret sharing schemes |
36 | James C. French, Allison L. Powell, Eric Schulman, John L. Pfaltz |
Automating the Construction of Authority Files in Digital Libraries: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECDL ![In: Research and Advanced Technology for Digital Libraries. First European Conference, ECDL '97, Pisa, Italy, 1-3 September, Proceedings, pp. 55-71, 1997, Springer, 3-540-63554-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
36 | Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe |
Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding, pp. 183-193, 1995, Springer, 3-540-59409-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
33 | Li Zhou, Yong Zhang 0002, Chun-Xiao Xing |
A Collaborative Filtering Algorithm Based on Global and Domain Authorities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICADL ![In: Digital Libraries: Universal and Ubiquitous Access to Information, 11th International Conference on Asian Digital Libraries, ICADL 2008, Bali, Indonesia, December 2-5, 2008. Proceedings, pp. 164-173, 2008, Springer, 978-3-540-89532-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Global Authority, Domain Authority, Collaboration Filtering |
33 | Zheng Guo, Tohru Okuyama, Marion R. Finley Jr. |
A New Trust Model for PKI Interoperability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAS/ICNS ![In: Joint International Conference on Autonomic and Autonomous Systems 2005 / International Conference on Networking and Services 2005, ICAS/ICNS 2005, Papeete, Tahiti, France, October 23-28, 2005, pp. 37, 2005, IEEE Computer Society, 0-7695-2450-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Certification Authority (CA), Gateway Certification Authority (GWCA), PKI Interoperability, Public Key Infrastructure (PKI), X.509, Certification Paths |
31 | Pawel Jurczyk, Eugene Agichtein |
Hits on question answer portals: exploration of link analysis for author ranking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR ![In: SIGIR 2007: Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Amsterdam, The Netherlands, July 23-27, 2007, pp. 845-846, 2007, ACM, 978-1-59593-597-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authority estimation, question-answer portals, link analysis |
31 | Yueh-Min Huang, Hua-Yi Lin, Tzone-I Wang |
Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 21(6), pp. 997-1011, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
CBSRP, inter-cluster, cluster-based, CA (Certificate Authority), ad hoc network, PKI, ID-based |
31 | Wen Wu, Datong Chen, Jie Yang 0001 |
Integrating co-training and recognition for text detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, ICME 2005, July 6-9, 2005, Amsterdam, The Netherlands, pp. 1166-1169, 2005, IEEE Computer Society, 0-7803-9331-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
standard text detection dataset, semisupervised learning tool, augmented data, modified cotraining scheme, authority knowledge, unlabeled image patch, classifier prediction, weighted combination, text recognition |
31 | Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber |
Authentication in Distributed Systems: Theory and Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 10(4), pp. 265-310, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
loading programs, path name, principal, speaks for, group, role, delegation, key distribution, interprocess communication, certification authority, trusted computing base, secure channel |
31 | Monis Akhlaq, Baber Aslam, Faeiz Alserhani, Irfan-Ullah Awan, John Mellor |
Empowered Certification Authority in VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops ![In: 23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Workshops Proceedings, Bradford, United Kingdom, May 26-29, 2009, pp. 181-186, 2009, IEEE Computer Society, 978-0-7695-3639-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Security, Privacy, VANETs, Revocation, Certification Authority |
31 | Gabriella Kazai, Natasa Milic-Frayling |
Trust, authority and popularity in social information retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 17th ACM Conference on Information and Knowledge Management, CIKM 2008, Napa Valley, California, USA, October 26-30, 2008, pp. 1503-1504, 2008, ACM, 978-1-59593-991-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
social ir, trust, authority, relevance, popularity |
31 | James W. Warner, Elizabeth W. Brown |
Automated name authority control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCDL ![In: ACM/IEEE Joint Conference on Digital Libraries, JCDL 2001, Roanoke, Virginia, USA, June 24-28, 2001, Proceedings, pp. 21-22, 2001, ACM, 1-58113-345-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
name authority control, metadata, indexing, automation, workflow management |
29 | Shlomi Dolev, Marina Kopeetsky |
Anonymous Transactions in Computer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSS ![In: Stabilization, Safety, and Security of Distributed Systems, 11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings, pp. 297-310, 2009, Springer, 978-3-642-05117-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Thomas Franz, Antje Schultz, Sergej Sizov, Steffen Staab |
TripleRank: Ranking Semantic Web Data by Tensor Decomposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISWC ![In: The Semantic Web - ISWC 2009, 8th International Semantic Web Conference, ISWC 2009, Chantilly, VA, USA, October 25-29, 2009. Proceedings, pp. 213-228, 2009, Springer, 978-3-642-04929-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Mark D. Corner, Brian D. Noble |
Protecting File Systems with Transient Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 11(1-2), pp. 7-19, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Isamu Teranishi, Jun Furukawa 0001, Kazue Sako |
k-Times Anonymous Authentication (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings, pp. 308-322, 2004, Springer, 3-540-23975-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Hongxia Jin, Gregory F. Sullivan, Gerald M. Masson |
Software Tamper Resistance Using Program Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 22nd International Conference, SAFECOMP 2003, Edinburgh, UK, September 23-26, 2003, Proceedings, pp. 144-158, 2003, Springer, 3-540-20126-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Mark D. Corner, Brian Noble |
Zero-interaction authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking, MOBICOM 2002, Atlanta, Georgia, USA, September 23-28, 2002, pp. 1-11, 2002, ACM, 1-58113-486-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
transient authentication, mobile computing, stackable file systems, cryptographic file systems |
29 | Scott A. Crosby, Ian Goldberg, Robert Johnson, Dawn Xiaodong Song, David A. Wagner 0001 |
A Cryptanalysis of the High-Bandwidth Digital Content Protection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Security and Privacy in Digital Rights Management, ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers, pp. 192-200, 2001, Springer, 3-540-43677-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Josep Domingo-Ferrer |
Untransferable Rights in a Client-Independent Server Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings, pp. 260-266, 1993, Springer, 3-540-57600-2. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
29 | Enrico Scalavino, Giovanni Russello, Rudi Ball, Vaibhav Gowadia, Emil C. Lupu |
An opportunistic authority evaluation scheme for data security in crisis management scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 157-168, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
security, policies, encryption, Delay Tolerant Networks, crisis management, ERM |
29 | Heasoo Hwang, Andrey Balmin, Berthold Reinwald, Erik Nijkamp |
BinRank: Scaling Dynamic Authority-Based Search Using Materialized SubGraphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 25th International Conference on Data Engineering, ICDE 2009, March 29 2009 - April 2 2009, Shanghai, China, pp. 66-77, 2009, IEEE Computer Society, 978-0-7695-3545-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Enrico Scalavino, Vaibhav Gowadia, Emil C. Lupu |
PAES: Policy-Based Authority Evaluation Scheme. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXIII, 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings, pp. 268-282, 2009, Springer, 978-3-642-03006-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Meng Ge, Kwok-Yan Lam |
Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 392-401, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Jian Wang, Brian D. Davison 0001 |
Counting ancestors to estimate authority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR ![In: Proceedings of the 32nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2009, Boston, MA, USA, July 19-23, 2009, pp. 658-659, 2009, ACM, 978-1-60558-483-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
probabilistic counting, link analysis, PageRank |
29 | Josiane Xavier Parreira, Sebastian Michel 0001, Gerhard Weikum |
Efficiently Handling Dynamics in Distributed Link Based Authority Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE ![In: Web Information Systems Engineering - WISE 2008, 9th International Conference, Auckland, New Zealand, September 1-3, 2008. Proceedings, pp. 36-49, 2008, Springer, 978-3-540-85480-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Jingjing Wu, Jiwu Jing, Jingqiang Lin |
A Decentralized Certification Authority Based on Real World Trust Relationships. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 1123-1126, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Chaoju Hu, Na Xu |
Application of XTR Public Key System in Certificate Authority System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (5) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 5: E-learning and Knowledge Management / Socially Informed and Instructinal Design / Learning Systems Platforms and Architectures / Modeling and Representation / Other Applications , December 12-14, 2008, Wuhan, China, pp. 1233-1236, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Huey-Ming Lee, Tsang-Yean Lee, Heng-Sheng Chen |
Certificate and Authority Application Based on Grid Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings, Part III, pp. 354-362, 2007, Springer, 978-3-540-74828-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Sen Wu 0001, Lingyu Wu, Haiyan Jin, Shujuan Gu |
Customer Ranking Authority-Hub Algorithm for Mobile Communications in China. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (3) ![In: Fourth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2007, 24-27 August 2007, Haikou, Hainan, China, Proceedings, Volume 3, pp. 559-563, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Jonghyen Baek, Changgu Lee |
The Simulation of Train Separation Control Algorithm by Movement Authority Using Beacon. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (3) ![In: Fourth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2007, 24-27 August 2007, Haikou, Hainan, China, Proceedings, Volume 3, pp. 717-720, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Tuan-Anh Nguyen, David W. Chadwick, Bassem Nasser |
Recognition of Authority in Virtual Organisations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 3-13, 2007, Springer, 978-3-540-74408-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Oren Kurland, Lillian Lee |
Respect my authority!: HITS without hyperlinks, utilizing cluster-based language models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR ![In: SIGIR 2006: Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Seattle, Washington, USA, August 6-11, 2006, pp. 83-90, 2006, ACM, 1-59593-369-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
graph-based retrieval, structural re-ranking, clusters, authorities, language modeling, bipartite graph, HITS, hubs, cluster-based language models, high-accuracy retrieval |
29 | Ludwig Seitz, Erik Rissanen, Babak Sadighi Firozabadi |
A Classification of Delegation Schemes for Attribute Authority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust, Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers, pp. 158-169, 2006, Springer, 978-3-540-75226-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Ján Astalos, Roberto Cecchini, Brian A. Coghlan, Robert Cowles, U. Epting, T. Genovese, Jorge A. T. Gomes, David L. Groep, M. Gug, Andrew Hanushevsky, M. Helm, Jens Jensen, C. Kanellopoulos, David P. Kelsey, R. Marco, I. Neilson, Sophie Nicoud, David O'Callaghan, Darcy Quesnel, I. Schaeffner, L. Shamardin, Dane Skow, M. Sova, Anders Wäänänen, Pawel Wolniewicz, Wei Xing |
International Grid CA Interworking, Peer Review and Policy Management Through the European DataGrid Certification Authority Coordination Group. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGC ![In: Advances in Grid Computing - EGC 2005, European Grid Conference, Amsterdam, The Netherlands, February 14-16, 2005, Revised Selected Papers, pp. 285-295, 2005, Springer, 3-540-26918-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Sejong Oh |
New Concept of Authority Range for Flexible Management of Role Hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers, pp. 343-353, 2005, Springer, 3-540-31012-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Sandra M. Richardson, Kelly McNamara Hilmer, James F. Courtney |
Compliance with Codes of Ethical Conduct: The Effects of Authority and Proximity on Ethical Reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Leuo-hong Wang, Tong-Wen Lee |
Mining the Web by a Potential Hub-and-Authority First Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSTST ![In: Soft Computing as Transdisciplinary Science and Technology, Proceedings of the fourth IEEE International Workshop, WSTST'05, Muroran, Japan, pp. 828-837, 2005, Springer, 978-3-540-25055-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Laith A. Al-Sulaiman, Hussein M. Abdel-Wahab |
Cooperative caching techniques for increasing the availability of MANET certificate authority services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), January 3-6, 2005, Cairo, Egypt, pp. 88, 2005, IEEE Computer Society, 0-7803-8735-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Klaus Berberich, Michalis Vazirgiannis, Gerhard Weikum |
T-Rank: Time-Aware Authority Ranking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAW ![In: Algorithms and Models for the Web-Graph: Third International Workshop, WAW 2004, Rome, Italy, October 16, 2004, Proceeedings, pp. 131-142, 2004, Springer, 3-540-23427-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Babak Sadighi Firozabadi, Marek J. Sergot, Olav L. Bandmann |
Using Authority Certificates to Create Management Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers, pp. 134-145, 2001, Springer, 3-540-44263-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Matt Bishop, Lawrence Snyder |
The Transfer of Information and Authority in a Protection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the Seventh Symposium on Operating System Principles, SOSP 1979, Asilomar Conference Grounds, Pacific Grove, California, USA, 10-12, December 1979, pp. 45-54, 1979, ACM, 0-89791-009-5. The full citation details ...](Pics/full.jpeg) |
1979 |
DBLP DOI BibTeX RDF |
|
28 | Ziyu Zhang, Chunyan Wang 0013, Wanzhong Zhao, Can Xu, Guoping Chen |
Driving Authority Allocation Strategy Based on Driving Authority Real-Time Allocation Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Intell. Transp. Syst. ![In: IEEE Trans. Intell. Transp. Syst. 23(7), pp. 8528-8543, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Rui-Li Shi, Chunxiang Guo 0001, Xin Gu |
Authority updating: An expert authority evaluation algorithm considering post-evaluation and power indices in social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. J. Knowl. Eng. ![In: Expert Syst. J. Knowl. Eng. 38(1), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Shane Saunderson, Goldie Nejat |
Persuasive robots should avoid authority: The effects of formal and real authority on persuasion in human-robot interaction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. Robotics ![In: Sci. Robotics 6(58), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Yuhua Li 0003, Ruixuan Li 0001, Xiaoqing Xiong, Xiwu Gu, Tianan Liang, Mingli Xu, Yumeng Yuan |
Multi-topical authority sensitive influence maximization with authority based graph pruning and three-stage heuristic optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Intell. ![In: Appl. Intell. 51(11), pp. 8432-8450, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Binrui Zhu, Jiameng Sun, Jing Qin 0002, Jixin Ma 0001 |
Fuzzy matching: multi-authority attribute searchable encryption without central authority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 23(2), pp. 527-536, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Takahiro Saito, Takahiro Wada, Kohei Sonoda |
Control Authority Transfer Method for Automated-to-Manual Driving Via a Shared Authority Mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Intell. Veh. ![In: IEEE Trans. Intell. Veh. 3(2), pp. 198-207, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Vladimir Bozovic, Daniel Socek, Rainer Steinwandt, Viktória I. Villányi |
Multi-authority attribute-based encryption with honest-but-curious central authority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Math. ![In: Int. J. Comput. Math. 89(3), pp. 268-283, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Toshiyuki Inagaki, Thomas B. Sheridan |
Authority and responsibility in human-machine systems: probability theoretic validation of machine-initiated trading of authority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cogn. Technol. Work. ![In: Cogn. Technol. Work. 14(1), pp. 29-37, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao |
Secure threshold multi authority attribute based encryption without a central authority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 180(13), pp. 2618-2632, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Minsu Cho, Kyoung Mu Lee |
Authority-shift clustering: Hierarchical clustering by authority seeking on graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR ![In: The Twenty-Third IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2010, San Francisco, CA, USA, 13-18 June 2010, pp. 3193-3200, 2010, IEEE Computer Society, 978-1-4244-6984-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Vladimir Bozovic, Daniel Socek, Rainer Steinwandt, Viktória I. Villányi |
Multi-authority attribute based encryption with honest-but-curious central authority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 83, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
Displaying result #1 - #100 of 2260 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|