|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1026 occurrences of 508 keywords
|
|
|
Results
Found 1679 publication records. Showing 1679 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
149 | Albert Levi, M. Ufuk Çaglayan, Çetin Kaya Koç |
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(1), pp. 21-59, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
nested certificates, key management, public key infrastructure, Digital certificates |
114 | Petra Wohlmacher, Peter Pharow |
Applications in Health Care using Public-Key Certificates and Attribute Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 128-137, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures |
92 | Lin Chen 0020, Xiaoqin Huang, Jinyuan You |
Certificate-Based Authentication and Authorization Architecture in Digital Library. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICADL ![In: Digital Libraries: International Collaboration and Cross-Fertilization, 7th International Conference on Asian Digital Libraries, ICADL 2004, Shanghai, China, December 13-17, 2004, Proceedings, pp. 643, 2004, Springer, 3-540-24030-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
82 | Markus Jakobsson, Ari Juels, Phong Q. Nguyen |
Proprietary Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings, pp. 164-181, 2002, Springer, 3-540-43224-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
collateral key, digital rights, fair encryption, proprietary key, certificates |
81 | Ravi Mukkamala, Srikanth Balusani |
Active Certificates: A New Paradigm in Digital Certificate Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 20-23 August 2002, Vancouver, BC, Canada, pp. 30-40, 2002, IEEE Computer Society, 0-7695-1680-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
74 | Eugenio Faldella, Marco Prandini |
A Novel Approach to On-Line Status Authentication of Public-Key Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 270-277, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
online status authentication, sensitive data exchange, security constraints, revoked certificates, certificate status handling scheme, one-way accumulator, Owa-based Revocation Scheme, Online Certificate Status Protocol, Internet, scalability, authentication, cryptography, protocols, data integrity, data integrity, computer networks, public key cryptography, public key infrastructure, message authentication, telecommunication security, certification authority, public-key certificates, computational load, public networks |
73 | María-Dolores Cano, Ruben Toledo-Valera, Fernando Cerdán |
A Certification Authority for Elliptic Curve X.509v3 Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNS ![In: Third International Conference on Networking and Services (ICNS 2007), June 19-25, 2007, Athens, Greece, pp. 49, 2007, IEEE Computer Society, 978-0-7695-2858-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, wireless communications, elliptic curve cryptography, digital certificates |
73 | Walid Bagga, Stefano Crosta, Refik Molva |
Proof-Carrying Proxy Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings, pp. 321-335, 2006, Springer, 3-540-38080-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Data Minimization, Authorization, Bilinear Pairings, Credentials, Proxy Certificates |
71 | Anantharaman Lakshminarayanan, Jianying Zhou 0001 |
FlexiCert: Merging X.509 Identity Certificates and Attribute Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic, pp. 489-493, 2003, IEEE Computer Society, 0-7695-1993-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
67 | Gerrit Bleumer |
Biometric yet Privacy Protecting Person Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 99-110, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Non-transferable certificates, Wallets-with-observer, Biometric person authentication, Blind Signatures, Interactive proofs |
67 | Ewen Denney, Bernd Fischer 0002, Dieter Hutter, Mark Jones |
Software certificate management (SoftCeMent'05). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), November 7-11, 2005, Long Beach, CA, USA, pp. 463, 2005, ACM, 1-58113-993-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
66 | Joon S. Park, Ravi S. Sandhu |
Binding Identities and Attributes using Digitally Signed Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 120-127, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
binding identities, digitally signed certificates, binding attributes, chained signatures, monolithic signatures, autonomic signatures, digital signature, certification, message authentication, certificate authority, attribute certificates |
65 | Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rhodes, Srinivas Devadas |
Offline count-limited certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 2145-2152, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
offline payments, authentication, smartcards, trusted platform module (TPM) |
59 | Albert Levi, M. Ufuk Çaglayan |
An Efficient, Dynamic and Trust Preserving Public Key Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000, pp. 203-214, 2000, IEEE Computer Society, 0-7695-0665-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Nested Certificates, Performance Evaluation, Digital Certificates, Public Key Infrastructure (PKI), Certificate Path |
59 | Amir Herzberg, Yosi Mass, Joris Mihaeli, Dalit Naor, Yiftach Ravid |
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000, pp. 2-14, 2000, IEEE Computer Society, 0-7695-0665-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Authentication, logic programming, role based access control, key management, trust management, public key certificates, X.509 |
58 | Eunjin Jung, Ehab S. Elmallah, Mohamed G. Gouda |
Optimal Dispersal of Certificate Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 18(4), pp. 474-484, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
certificate graph, certificate dispersal, public-key management, authentication, authentication, security and protection, Security and privacy protection |
58 | Chih-Ming Yan, Wen-Chen Sun, Tzu-Yen Wang, Tzu-Han Kao, Shyan-Ming Yuan |
Design and Implementation of WAP Certificate Converter Toolkit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MDM ![In: 7th International Conference on Mobile Data Management (MDM 2006), Nara, Japan, May 9-13, 2006, pp. 140, 2006, IEEE Computer Society, 0-7695-2526-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
56 | Alexandra Boldyreva, Markus Jakobsson |
Theft-Protected Proprietary Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers, pp. 208-220, 2002, Springer, 3-540-40410-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
56 | Babak Sadighi Firozabadi, Marek J. Sergot, Olav L. Bandmann |
Using Authority Certificates to Create Management Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers, pp. 134-145, 2001, Springer, 3-540-44263-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
51 | Stephen Wilson |
Public key superstructure "it's PKI Jim, but not as we know it!". ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA, pp. 72-88, 2008, ACM, 978-1-60558-066-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication, PKI, public key infrastructure, digital certificates |
51 | Urs Hengartner, Peter Steenkiste |
Access control to people location information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 8(4), pp. 424-456, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
credential discovery, privacy, trust, RSA, location, Certificates, delegation, DSA, SPKI/SDSI |
51 | Michael Backes 0001, Jan Camenisch, Dieter Sommer |
Anonymous yet accountable access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, November 7, 2005, pp. 40-46, 2005, ACM, 1-59593-228-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
anonymous transactions, privacy, access control, certificates, accountability, anonymous credentials |
50 | Eunjin Jung, Ehab S. Elmallah, Mohamed G. Gouda |
Optimal Dispersal of Certificate Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 18th International Conference, DISC 2004, Amsterdam, The Netherlands, October 4-7, 2004, Proceedings, pp. 435-449, 2004, Springer, 3-540-23306-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
50 | Matei Ciobanu Morogan, Sead Muftic |
Certificate Management in Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003 - Orlando, FL, USA, Proceedings, pp. 337-341, 2003, IEEE Computer Society, 0-7695-1873-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
50 | Himanshu Khurana, Virgil D. Gligor, John Linn |
Reasoning about Joint Administration of Access Policies for Coalition Resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), Vienna, Austria, July 2-5, 2002, pp. 429-438, 2002, IEEE Computer Society, 0-7695-1585-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
50 | Javier López 0001, Antonio Mana, Juan J. Ortega, José M. Troya |
Distributed Storage and Revocation in Digital Certificate Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 11th International Conference, DEXA 2000, London, UK, September 4-8, 2000, Proceedings, pp. 929-938, 2000, Springer, 3-540-67978-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
50 | Tai-Kuo Woo |
A Note on Lamport's Mutual Exclusion Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 24(4), pp. 78-80, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
48 | Arlindo L. Marcon Jr., Altair Olivo Santin, Luiz A. de Paula Lima Jr., Maicon Stihler |
Policy management architecture based on provisioning model and authorization certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 1594-1598, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
authorization certificates and web services security, policy provisioning, policy management |
48 | Oscar García Morchon, Tobias Heer, Klaus Wehrle |
Brief announcement: lightweight key agreement and digital certificates for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, PODC 2009, Calgary, Alberta, Canada, August 10-12, 2009, pp. 326-327, 2009, ACM, 978-1-60558-396-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
wireless sensor networks, distributed algorithms, key establishment, digital certificates |
48 | Jennifer Sobey, Robert Biddle, Paul C. van Oorschot, Andrew S. Patrick |
Exploring User Reactions to New Browser Cues for Extended Validation Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 411-427, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
extended validation certificates, user study, Usable security, browser security |
48 | Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis |
Delivering Attribute Certificates over GPRS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004, pp. 1166-1170, 2004, ACM, 1-58113-812-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
performance evaluation, UMTS, PKI, GPRS, attribute certificates |
48 | Sabine Glesner |
Program Checking with Certificates: Separating Correctness-Critical Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FME ![In: FME 2003: Formal Methods, International Symposium of Formal Methods Europe, Pisa, Italy, September 8-14, 2003, Proceedings, pp. 758-777, 2003, Springer, 3-540-40828-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
safety-scalability, real-scale applications, verification, validation, certificates, correctness, program checking |
48 | Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean |
Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 298-307, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
mobile policies, electronic commerce applications, business-to-consumer applications, business-to-business applications, data access requests, distributed data representation, application-specific policies, user credentials, policy-to-data mapping context, middle tier, user management, application-specific control specification, fine-grained information, security principles, high-level definition language, mobile computing, electronic commerce, specification languages, data management, certification, message authentication, system administration, distributed computing environments, attribute certificates, multi-tier architecture |
48 | Yung-Kao Hsu, Stephen P. Seymour |
Intranet Security Framework based on Short-Lived Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 6th Workshop on Enabling Technologies (WET-ICE '97), Infrastructure for Collaborative Enterprises, 18-20 June 1997, MIT, Cambridge, MA, USA, Proceedings, pp. 228-234, 1997, IEEE Computer Society, 0-8186-7967-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Intranet security framework, short-lived certificates, key management issues, X.509 authentication framework, entity registration, public key cryptography, public key cryptography |
48 | Ricardo Felipe Custódio, Martín A. Gagliotti Vigil, Juliano Romani, Fernando Carlos Pereira, Joni da Silva Fraga |
Optimized Certificates - A New Proposal for Efficient Electronic Document Signature Validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 49-59, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Marta Arias, Roni Khardon, Rocco A. Servedio |
Polynomial Certificates for Propositional Classes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COLT ![In: Computational Learning Theory and Kernel Machines, 16th Annual Conference on Computational Learning Theory and 7th Kernel Workshop, COLT/Kernel 2003, Washington, DC, USA, August 24-27, 2003, Proceedings, pp. 537-551, 2003, Springer, 3-540-40720-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
48 | Virgil D. Gligor |
Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 113-124, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
42 | Helder Gomes, João Paulo da Silva Cunha, André Zúquete |
Authentication Architecture for eHealth Professionals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II, pp. 1583-1600, 2007, Springer, 978-3-540-76835-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
role-based authorization, Authentication, certificates, PKI, eHealth |
42 | Lars Eilebrecht |
Ciphire Mail Email Encryption and Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 211-224, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Ciphire, secure email, email encryption, email authentication, fingerprint system, digital signatures, fingerprints, certificates, PKI |
42 | Urs Hengartner, Peter Steenkiste |
Implementing access control to people location information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 11-20, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
trust, rsa, location, certificates, delegation, dsa, spki/sdsi |
42 | Qinglin Jiang, Douglas S. Reeves, Peng Ning |
Certificate Recommendations to Improve the Robustness of Web of Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings, pp. 292-303, 2004, Springer, 3-540-23208-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
PGP keyrings, Authentication, certificates, graph connectivity |
42 | Jean Bacon, Ken Moody, Walt Yao |
A model of OASIS role-based access control and its support for active security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 5(4), pp. 492-540, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
distributed systems, RBAC, role-based access control, policy, service-level agreements, Certificates, OASIS |
42 | Ying Liu, Sheng-rong Wang, Jingbo Xia, Jun Wei |
A New United Certificate Revocation Scheme in Grid Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30 - December 3, 2005, Proceedings, pp. 123-128, 2005, Springer, 3-540-30510-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Daniel R. L. Brown, Robert P. Gallant, Scott A. Vanstone |
Provably Secure Implicit Certificate Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings, pp. 147-156, 2001, Springer, 3-540-44079-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
Implicit certificate, postal payment, authentication, provable security, elliptic curve cryptography |
42 | Jean Bacon, Ken Moody, Walt Yao |
Access Control and Trust in the Use of Widely Distributed Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Middleware ![In: Middleware 2001, IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, Germany, November 12-16, 2001, Proceedings, pp. 295-310, 2001, Springer, 3-540-42800-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
40 | Daniel Schneider 0001, Mario Trapp |
Conditional safety certificates in open systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDCC-CARS ![In: 1st Workshop on Critical Automotive Applications: Robustness & Safety, CARS 2010 (EDCC Workshop), Valencia, Spain, 27 April 2010, pp. 57-60, 2010, ACM, 978-1-60558-915-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
ad-hoc systems, conditional safety certificates, plug&safe, adaptivity, safety, open systems |
40 | Dmitrij Lagutin, Hannu H. Kari |
Controlling Incoming Connections Using Certificates and Distributed Hash Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NEW2AN ![In: Next Generation Teletraffic and Wired/Wireless Advanced Networking, 7th International Conference, NEW2AN 2007, St. Petersburg, Russia, September 10-14, 2007, Proceedings, pp. 455-467, 2007, Springer, 978-3-540-74832-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
rights delegation, DoS countermeasures, certificates, Session management, rights management |
40 | David O'Callaghan, Louise Doran, Brian A. Coghlan |
Evaluating trust in grid certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 1449-1450, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
trust, grid, PKI |
40 | Ahmad Samer Wazan, Romain Laborde, David W. Chadwick, François Barrère, Abdelmalek Benzekri |
Which Web Browsers Process SSL Certificates in a Standardized Way? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings, pp. 432-442, 2009, Springer, 978-3-642-01243-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Wonsuk Choi, Dongwoo Lee, Jongwhoa Na |
Applicability of No-Hands Computer Input Devices for the Certificates for Microsoft Office Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCHP ![In: Computers Helping People with Special Needs, 11th International Conference, ICCHP 2008, Linz, Austria, July 9-11, 2008. Proceedings, pp. 1169-1176, 2008, Springer, 978-3-540-70539-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
no-hands mouse, employment problem, benchmark |
40 | Vicente Benjumea, Javier López 0001, José A. Montenegro, José M. Troya |
A First Approach to Provide Anonymity in Attribute Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 402-415, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Andrea Petz, Denise Leahy |
IT-Certificates to Foster the Vocational Integration of People with Disabilities: ECDL® PD - Introduction to the Special Thematic Session. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCHP ![In: Computers Helping People with Special Needs, 8th International Conference, ICCHP 2002, Linz, Austria, July 15-20, Proceedings, pp. 712-714, 2002, Springer, 3-540-43904-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
40 | Artur Romão, Miguel Mira da Silva |
Secure Mobile Agent Digital Signatures with Proxy Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
E-Commerce Agents ![In: E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand, pp. 206-220, 2001, Springer, 3-540-41934-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
40 | Himanshu Khurana, Virgil D. Gligor |
Review and Revocation of Access Privileges Distributed with PKI Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 100-112, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
40 | Lane A. Hemaspaandra, Jörg Rothe, Gerd Wechsung |
On Sets with Easy Certificates and the Existence of One-Way Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIAC ![In: Algorithms and Complexity, Third Italian Conference, CIAC '97, Rome, Italy, March 12-14, 1997, Proceedings, pp. 264-275, 1997, Springer, 3-540-62592-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
40 | Monika Rauch Henzinger, Johannes A. La Poutré |
Certificates and Fast Algorithms for Biconnectivity in Fully-Dynamic Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESA ![In: Algorithms - ESA '95, Third Annual European Symposium, Corfu, Greece, September 25-27, 1995, Proceedings, pp. 171-184, 1995, Springer, 3-540-60313-1. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
40 | Shimon Even, Gene Itkis, Sergio Rajsbaum |
On Mixed Connectivity Certificates (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESA ![In: Algorithms - ESA '95, Third Annual European Symposium, Corfu, Greece, September 25-27, 1995, Proceedings, pp. 1-16, 1995, Springer, 3-540-60313-1. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
34 | Florina Almenárez, Andrés Marín López, Daniel Díaz Sánchez, Alberto Cortés, Celeste Campo, Carlos García-Rubio |
Building an Open Toolkit of Digital Certificate Validation for Mobile Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 17-21 March 2008, Hong Kong, pp. 560-565, 2008, IEEE Computer Society, 978-0-7695-3113-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
certificate validation, open toolkit, X.509 certificates |
34 | Massimiliano Pala, Sean W. Smith |
AutoPKI: A PKI Resources Discovery System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 154-169, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Service Discovery, PKI, Digital Certificates, Certification Authority |
34 | Mary R. Thompson, Abdelilah Essiari, Srilekha Mudumbai |
Certificate-based authorization policy in a PKI environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 6(4), pp. 566-588, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
XML, Public key infrastructure, digital certificates |
34 | Alessandro Bassi, Julien Laganier |
Towards an IPv6-Based Security Framework for Distributed Storage Resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security - Advanced Techniques for Network and Data Protection, 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings, pp. 54-64, 2003, Springer, 3-540-20185-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
IBP, authorization certificates, CBID, IPv6, IPsec, CGA, SPKI |
34 | David W. Chadwick, Alexander Otenko |
The PERMIS X.509 role based privilege management infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 135-140, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Privilege management infrastructure, XML, authorization, RBAC, policies, X.509, attribute certificates |
33 | Gilles Barthe, Benjamin Grégoire, César Kunz, Tamara Rezk |
Certificate translation for optimizing compilers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Program. Lang. Syst. ![In: ACM Trans. Program. Lang. Syst. 31(5), pp. 18:1-18:45, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
static analysis, program verification, program optimizations, Proof-carrying code |
33 | Gilles Barthe, Benjamin Grégoire, Sylvain Heraud, César Kunz, Anne Pacalet |
Implementing a Direct Method for Certificate Translation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICFEM ![In: Formal Methods and Software Engineering, 11th International Conference on Formal Engineering Methods, ICFEM 2009, Rio de Janeiro, Brazil, December 9-12, 2009. Proceedings, pp. 541-560, 2009, Springer, 978-3-642-10372-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Luis Carlos Coronado García, Carlos Hernández-López, Carlos Pérez Leguízamo |
Autonomous Decentralized Root Certification Authority System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 22-26 June 2009, Montreal, Québec, Canada, pp. 257-262, 2009, IEEE Computer Society, 978-0-7695-3660-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Jingjing Wu, Jiwu Jing, Jingqiang Lin |
A Decentralized Certification Authority Based on Real World Trust Relationships. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 1123-1126, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Rachid Saadi, Jean-Marc Pierson, Lionel Brunie |
Context Adapted Certificate Using Morph Template Signature for Pervasive Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UCS ![In: Ubiquitous Computing Systems, 4th International Symposium, UCS 2007, Tokyo, Japan, November 25-28, 2007, Proceedings, pp. 17-32, 2007, Springer, 978-3-540-76771-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Gilles Barthe, Benjamin Grégoire, César Kunz, Tamara Rezk |
Certificate Translation for Optimizing Compilers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAS ![In: Static Analysis, 13th International Symposium, SAS 2006, Seoul, Korea, August 29-31, 2006, Proceedings, pp. 301-317, 2006, Springer, 3-540-37756-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Mohamed G. Gouda, Eunjin Jung |
Certificate Dispersal in Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 24th International Conference on Distributed Computing Systems (ICDCS 2004), 24-26 March 2004, Hachioji, Tokyo, Japan, pp. 616-623, 2004, IEEE Computer Society, 0-7695-2086-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Jong-Weon Kim, Kyu-Tae Kim, Jung-Soo Lee, Jong-Uk Choi |
Development of Visible Anti-copy Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings, pp. 209-218, 2004, Springer, 3-540-22919-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum |
A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey, pp. 225-231, 2003, IEEE Computer Society, 0-7695-1961-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Ed Dawson, Javier López 0001, José A. Montenegro, Eiji Okamoto |
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings, pp. 136-149, 2002, Springer, 3-540-44270-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Wayne A. Jansen |
Determining Privileges of Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA, pp. 149-158, 2001, IEEE Computer Society, 0-7695-1405-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
33 | Albert Levi, Çetin Kaya Koç |
CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA, pp. 286-295, 2001, IEEE Computer Society, 0-7695-1405-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
33 | Victoria Ungureanu |
A Regulated Approach to Certificate Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA, pp. 377-385, 2001, IEEE Computer Society, 0-7695-1405-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
33 | Zvi Galil, Giuseppe F. Italiano, Neil Sarnak |
Fully Dynamic Planarity Testing with Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 46(1), pp. 28-91, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
planarity testing, planar graphs, dynamic graph algorithms |
33 | Paul C. Kocher |
On Certificate Revocation and Validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings, pp. 172-177, 1998, Springer, 3-540-64951-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
32 | Hock Kim Tan, Luc Moreau 0001 |
Certificates for mobile code security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain, pp. 76-81, 2002, ACM, 1-58113-445-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
mobile agent certificates, mobile agent security framework, mobile agent security |
31 | Ying Liu, Jingbo Xia, Jing Dai |
A Novel Adaptive Proxy Certificates Management Scheme in Military Grid Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC ![In: Network and Parallel Computing, IFIP International Conference, NPC 2007, Dalian, China, September 18-21, 2007, Proceedings, pp. 23-30, 2007, Springer, 978-3-540-74783-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Military Grid, hierarchical one-way chains, proxy certificate, GSI, hash value |
31 | Shushan Zhao, Akshai K. Aggarwal, Robert D. Kent |
A Framework for Revocation of Proxy Certificates in a Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (3) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 532-537, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Marc Stevens 0001, Arjen K. Lenstra, Benne de Weger |
Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings, pp. 1-22, 2007, Springer, 978-3-540-72539-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Seong-Yoon Shin, Oh-Hyung Kang, Seong-Eun Baek, Ki-Hong Park, Yang-Won Rhee, Moonhaeng Huh |
A Real-Time Evaluation System for Acquisition of Certificates in Computer Skills. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part I, pp. 1024-1033, 2007, Springer, 978-3-540-74468-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Easy-to-access Active Learning System, User Profile, Evaluation System |
31 | Wen Zhao, San-ping Tang |
Certificates Verification Based on Trust Matrix in PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICIC (1) ![In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August - 1 September 2006, Beijing, China, pp. 52-55, 2006, IEEE Computer Society, 0-7695-2616-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Elvira Albert, Puri Arenas-Sánchez, Germán Puebla, Manuel V. Hermenegildo |
Reduced Certificates for Abstraction-Carrying Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICLP ![In: Logic Programming, 22nd International Conference, ICLP 2006, Seattle, WA, USA, August 17-20, 2006, Proceedings, pp. 163-178, 2006, Springer, 3-540-36635-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Benjamin Grégoire, Laurent Théry, Benjamin Werner |
A Computational Approach to Pocklington Certificates in Type Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FLOPS ![In: Functional and Logic Programming, 8th International Symposium, FLOPS 2006, Fuji-Susono, Japan, April 24-26, 2006, Proceedings, pp. 97-113, 2006, Springer, 3-540-33438-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Javier López 0001, Rolf Oppliger, Günther Pernul |
Classifying Public Key Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 135-143, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Stephen Prajna, Ali Jadbabaie |
Safety Verification of Hybrid Systems Using Barrier Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HSCC ![In: Hybrid Systems: Computation and Control, 7th International Workshop, HSCC 2004, Philadelphia, PA, USA, March 25-27, 2004, Proceedings, pp. 477-492, 2004, Springer, 3-540-21259-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | David C. Parkes |
Price-Based Information Certificates for Minimal-Revelation Combinatorial Auctions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMEC ![In: Agent-Mediated Electronic Commerce IV, Designing Mechanisms and Systems, AAMAS 2002 Workshop on Agent Mediated Electronic Commerce, Bologna, Italy, July 16, 2002, Revised Papers, pp. 103-122, 2002, Springer, 3-540-00327-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
31 | Eric R. Verheul |
Self-Blindable Credential Certificates from the Weil Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp. 533-551, 2001, Springer, 3-540-42987-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Mircea Cristian Stana, Nicolae Goga, Constantin Viorel Marian, Ramona Popa, Catalina-Mihaela Vulpe, Cristian Taslitchi |
G-Cloud Briefcase - Electronic Archive for Academic Certificates and General Certificates of Education Documents Using Public Private Hyperspace for E-Government Library Services Based on NOSQL Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BlackSeaCom ![In: 2021 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2021, Bucharest, Romania, May 24-28, 2021, pp. 1-5, 2021, IEEE, 978-1-6654-0308-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
29 | John H. Gerdes Jr., Chin-Tser Huang, Mohamed A. Sharaf |
Incorporating biometrics into veiled certificates: preventing unauthorized use of anonymous certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Commer. Res. ![In: Electron. Commer. Res. 17(2), pp. 289-316, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
29 | Sead Muftic |
BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ledger ![In: Ledger 1, pp. 19-37, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
29 | Jitsupa Peelay, Jeffrey Duncan, Catherine J. Staes |
Description of Industry and Occupation -related Concepts Concerning Industry and Occupation Information Recorded on Death Certificates Description of Industry and Occupation - related Concepts Recorded on Death Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMIA ![In: AMIA 2013, American Medical Informatics Association Annual Symposium, Washington, DC, USA, November 16-20, 2013, 2013, AMIA. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
29 | Selwyn Russell, Ed Dawson, Eiji Okamoto, Javier López 0001 |
Virtual certificates and synthetic certificates: new paradigms for improving public key validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 26(16), pp. 1826-1838, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Albert Levi, Mehmet Ufuk Çaglayan |
Verification of classical certificates via nested certificates and nested certificate paths. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), October 11-13, 1999, Boston, MA, USA, pp. 242-247, 1999, IEEE, 0-7803-5794-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
26 | David W. Chadwick |
FileSpace: an alternative to CardSpace that supports multiple token authorisation and portability between devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2009, Proceedings of the 8th Symposium on Identity and Trust on the Internet, April 14-16, 2009, Gaithersburg, Maryland, USA, pp. 94-102, 2009, ACM, 978-1-60558-474-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
information cards, authorisation, federated identity management, X.509 certificates, CardSpace |
26 | Ansgar Mondorf, Maria Wimmer 0001 |
Interoperability in e-tendering: the case of the virtual company dossier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance, ICEGOV 2008, Cairo, Egypt, December 1-4, 2008, pp. 110-116, 2008, ACM, 978-1-60558-386-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
e-tendering, high impact services, public e-procurement, interoperability, certificates, electronic documents |
26 | Vicente Benjumea, Seung Geol Choi, Javier López 0001, Moti Yung |
Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings, pp. 265-281, 2007, Springer, 978-3-540-76968-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
group signatures, ring signatures, Anonymous authentication, X.509 certificates, traceable signatures |
26 | Antonio Lioy, Marius Marian, Natalia Moltchanova, Massimiliano Pala |
PKI past, present and future. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 5(1), pp. 18-29, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
PKI, Public-key certificates, OCSP |
26 | Kenneth A. Goldman, Ronald Perez, Reiner Sailer |
Linking remote attestation to secure tunnel endpoints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006, pp. 21-24, 2006, ACM, 1-59593-548-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
certificates, trusted platform module |
Displaying result #1 - #100 of 1679 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|