|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2584 occurrences of 1325 keywords
|
|
|
Results
Found 5165 publication records. Showing 5165 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
111 | Qingshui Xue, Fengying Li, Yuan Zhou 0008, Jiping Zhang 0001, Zhenfu Cao, Haifeng Qian |
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSec ![In: Security and Privacy in Mobile Information and Communication Systems, First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers, pp. 58-70, 2009, Springer, 978-3-642-04433-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
103 | Yumin Yuan |
A Threshold Proxy Signature Scheme with Nonrepudiation and Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2006, 21th International Symposium, Istanbul, Turkey, November 1-3, 2006, Proceedings, pp. 1002-1010, 2006, Springer, 3-540-47242-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
threshold proxy signature, anonymity, Digital signature, proxy signature, nonrepudiation |
98 | Jiqiang Lu |
Security Weaknesses in Two Proxy Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 466-475, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Public key cryptology, Proxy signature, Forgery attack |
97 | Wenyuan Liu, Feng Tong, Yongan Luo, Feng Zhang |
A proxy blind signature scheme based on elliptic curve with proxy revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (1) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 99-104, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
92 | Giuseppe Ateniese, Susan Hohenberger |
Proxy re-signatures: new definitions, algorithms, and applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 310-319, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
authenticating path in network, proxy re-signature, bilinear maps |
86 | Songqing Chen, Bo Shen 0003, Susie J. Wee, Xiaodong Zhang 0001 |
Segment-based streaming media proxy: modeling and optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 8(2), pp. 243-256, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
85 | Chung-Ming Huang, Chao-Hsien Lee |
Layer 7 Multimedia Proxy Handoff Using Anycast/Multicast in Mobile Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 6(4), pp. 411-422, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Layer 7 handoff, proxy handoff, application-layer anycast, IPv6 multicast |
85 | Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin |
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 15(6), pp. 1552-1560, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
threshold proxy signature, RSA cryptosystem, Lagrange interpolating polynomial |
83 | Rongxing Lu, Xiaolei Dong, Zhenfu Cao |
Designing efficient proxy signature schemes for mobile communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 51(2), pp. 183-195, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
proxy protected signature, proxy aggregate signature, efficiency, provable secure, bilinear pairings, proxy signature |
82 | N. R. Sunitha, B. B. Amberker |
Proxy Re-signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings, pp. 156-157, 2008, Springer, 978-3-540-89861-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Signature conversion, Proxy re-signature, Proxy revocation, Proxy key, Proxy Signature |
80 | Seung-Hyun Seo, Kyung-Ah Shim, Sang-Ho Lee |
A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 216-225, 2005, Springer, 3-540-28224-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
79 | Wei-hsiu Ma, David Hung-Chang Du |
Frame Selection for Dynamic Caching Adjustment in Video Proxy Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 22(1), pp. 53-73, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
frame selection, video smoothing, video streaming, proxy server, video caching |
79 | Jia-Zhu Dai, Xiao-Hu Yang 0001, Jinxiang Dong |
A privacy-protecting proxy signature scheme and its application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 42nd Annual Southeast Regional Conference, 2004, Huntsville, Alabama, USA, April 2-3, 2004, pp. 203-206, 2004, ACM, 1-58113-870-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, electronic commerce, electronic voting, proxy signature |
78 | Debasis Giri, Parmeshwary Dayal Srivastava |
Cryptanalysis and Improvement of Das et al.'s Proxy Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIT ![In: 10th International Conference on Information Technology, ICIT 2007, Roukela, India, 17-20 December 2007, pp. 151-154, 2007, IEEE Computer Society, 0-7695-3068-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Proxy Revocation, Attacks, Proxy Signature |
78 | Byoungcheon Lee, Heesun Kim, Kwangjo Kim |
Secure Mobile Agent Using Strong Non-designated Proxy Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings, pp. 474, 2001, Springer, 3-540-42300-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Secure mobile agent, strong non-designated proxy signature, multi-proxy signature |
75 | Mingchu Li, Hongyan Yao, Jianbo Ma |
Recovery Mechanism of Online Certification Chain in Grid Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 558-562, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Certifucate Chain, Double signature, Grid security, Proxy certificate |
75 | Binh Thai, Aruna Seneviratne |
The Use of Software Agents as Proxies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 4-6 July 2000, Antibes, France, pp. 546-551, 2000, IEEE Computer Society, 0-7695-0722-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
software agents, proxy |
74 | Fengying Li, Qingshui Xue, Zhenfu Cao |
Crypanalysis of Kuo and Chen's Threshold Proxy Signature Scheme Based on the RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA, pp. 815-818, 2007, IEEE Computer Society, 978-0-7695-2776-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
74 | Jianhong Zhang, Jiancheng Zou, Yumin Wang |
A Novel and Secure Non-designated Proxy Signature Scheme for Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCNMC ![In: Networking and Mobile Computing, Third International Conference, ICCNMC 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings, pp. 836-844, 2005, Springer, 3-540-28102-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
73 | Xuanwu Zhou, Yang Su, Ping Wei 0005 |
Further Study on Proxy Authorization and Its Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex (2) ![In: Complex Sciences, First International Conference, Complex 2009, Shanghai, China, February 23-25, 2009. Revised Papers, Part 2, pp. 1701-1718, 2009, Springer, 978-3-642-02468-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Proxy authorization, multi-party authorization, multicast communi-cation, forward security, BAN logic |
73 | Shih Tsung Liang |
Machanisms for the maintenance of MP proxy tables in IEEE 802.11s mesh networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009, pp. 7-11, 2009, ACM, 978-1-60558-405-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
associated station discovery, proxy registration procedure, IEEE 802.11s, wireless mesh networks |
73 | Yoohyun Park, Yong-Ju Lee, Hag-Young Kim, Kyongsok Kim |
Efficient Segment Based Streaming Media Transcoding Proxy for Various Types of Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM ![In: Advances in Multimedia Information Processing - PCM 2007, 8th Pacific Rim Conference on Multimedia, Hong Kong, China, December 11-14, 2007, Proceedings, pp. 569-578, 2007, Springer, 978-3-540-77254-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Multimedia Caching, Transcoding, Proxy Caching, Segment based caching |
67 | Ying Sun, Chunxiang Xu, Fagen Li, Yong Yu 0002 |
Identity Based Multi-proxy Multi-signcryption Scheme for Electronic Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 281-284, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
67 | Jianhong Zhang, Qin Geng |
An Efficient Proxy Signature Scheme with Full-delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2008, Hainan, China, 6-8 April 2008, pp. 513-518, 2008, IEEE, 978-1-4244-1685-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
67 | Xin Chen 0034, Xiaodong Zhang 0001 |
Coordinated data prefetching by utilizing reference information at both proxy and web servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS Perform. Evaluation Rev. ![In: SIGMETRICS Perform. Evaluation Rev. 29(2), pp. 32-38, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
66 | Zhenhua Liu 0001, Yupu Hu, Hua Ma |
Secure Proxy Multi-signature Scheme in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, pp. 127-140, 2008, Springer, 978-3-540-88732-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
proxy multi-signature, provable security, bilinear pairings, standard model |
66 | N. R. Sunitha, B. B. Amberker, Prashant Koulgi |
Controlled Delegation in e-cheques Using Proxy Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 15-19 October 2007, Annapolis, Maryland, USA, pp. 414-422, 2007, IEEE Computer Society, 0-7695-2891-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Se- curity, Digital Signature, Proxy Signature, DSA |
66 | Xiaolan (Ellen) Zhang, Michael K. Bradshaw, Yang Guo 0001, Bing Wang 0001, James F. Kurose, Prashant J. Shenoy, Donald F. Towsley |
AMPS: a flexible, scalable proxy testbed for implementing streaming services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOSSDAV ![In: Network and Operating System Support for Digital Audio and Video, 14th International Workshop, NOSSDAV 2004, Cork, Ireland, June 16-18, 2004, Proceedings, pp. 116-121, 2004, ACM, 1-58113-801-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
testbed, proxy, multimedia streaming |
66 | Anindya Datta, Kaushik Dutta, Helen M. Thomas, Debra E. VanderMeer, Suresha, Krithi Ramamritham |
Proxy-based acceleration of dynamically generated content on the world wide web: an approach and implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, Madison, Wisconsin, USA, June 3-6, 2002, pp. 97-108, 2002, ACM, 1-58113-497-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
proxy-based caching, dynamic content, edge caching |
65 | Cheng-Kang Chu, Jian Weng 0001, Sherman S. M. Chow, Jianying Zhou 0001, Robert H. Deng |
Conditional Proxy Broadcast Re-Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 327-342, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
conditional proxy re-encryption, hierarchical identity-coupling broadcast encryption, broadcast encryption, proxy re-encryption |
65 | Qin Wang, Zhenfu Cao |
Two Proxy Signcryption Schemes from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings, pp. 161-171, 2005, Springer, 3-540-30849-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
proxy signcryption, bilinear pairings, signcryption, proxy signature |
62 | Baoshan Gu, Ing-Ray Chen |
Performance Analysis of Location-Aware Mobile Service Proxies for Reducing Network Cost in Personal Communication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 10(4), pp. 453-463, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
mobile service management, service handoff, service proxy, performance analysis, location management, cost optimization |
62 | Qiong Luo 0001, Jeffrey F. Naughton, Rajasekar Krishnamurthy, Pei Cao, Yunrui Li |
Active Query Caching for Database Web Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WebDB (Selected Papers) ![In: The World Wide Web and Databases, Third International Workshop WebDB 2000, Dallas, Texas, USA, Maaay 18-19, 2000, Selected Papers, pp. 92-104, 2000, Springer, 3-540-41826-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Active query caching, database web servers, proxy caching, query containment |
61 | Yingwu Zhu, Yiming Hu |
Exploiting client caches to build large Web caches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 39(2), pp. 149-175, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Hier-GD, Client cache, Latency gain, Infinite cache size, Cooperative proxy caching, Peer-to-peer, Proxy cache |
61 | Youan Xiao |
New Self Certified Proxy Digital Signature Scheme based on Elliptic Curve Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 723-726, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Qiang Tang 0001 |
Type-Based Proxy Re-encryption and Its Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 130-144, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Fengying Li, Qingshui Xue, Jiping Zhang 0001, Zhenfu Cao |
A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers, pp. 416-424, 2008, Springer / ICST, 978-3-642-03353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Rongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su |
Designated Verifier Proxy Signature Scheme from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS (2) ![In: Interdisciplinary and Multidisciplinary Research in Computer Science, IEEE CS Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS|06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2, pp. 40-47, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Jin Li 0002, Xiaofeng Chen 0001, Tsz Hon Yuen, Yanming Wang |
Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 545-555, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Qiong Luo 0001, Wenwei Xue |
Template-Based Proxy Caching for Table-Valued Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Database Systems for Advances Applications, 9th International Conference, DASFAA 2004, Jeju Island, Korea, March 17-19, 2004, Proceedings, pp. 339-351, 2004, Springer, 3-540-21047-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
61 | Tianjie Cao, Dongdai Lin, Rui Xue 0001 |
Improved Privacy-Protecting Proxy Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AWCC ![In: Content Computing, Advanced Workshop on Content Computing, AWCC 2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings, pp. 208-213, 2004, Springer, 3-540-23898-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
61 | Víctor Jesús Sosa Sosa, Juan Gabriel González Serna, Xochitl Landa Miguez, Francisco Verduzco Medina, Manuel A. Valdés Marrero |
Dynamic Configuration between Proxy Caches within an Intranet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part IV, pp. 137-146, 2004, Springer, 3-540-22060-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
61 | Matt Blaze, Gerrit Bleumer, Martin Strauss 0001 |
Divertible Protocols and Atomic Proxy Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding, pp. 127-144, 1998, Springer, 3-540-64518-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
60 | Qiong Luo 0001, Jeffrey F. Naughton, Wenwei Xue |
Form-based proxy caching for database-backed web sites: keywords and functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 17(3), pp. 489-513, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Web proxy caching, Database-backed web sites |
60 | Luan Ibraimi, Qiang Tang 0001, Pieter H. Hartel, Willem Jonker |
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings, pp. 185-198, 2008, Springer, 978-3-540-85258-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Identity-Based Encryption, Proxy re-encryption, Personal Health Record |
60 | Robert H. Deng, Jian Weng 0001, Shengli Liu 0001, Kefei Chen |
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings, pp. 1-17, 2008, Springer, 978-3-540-89640-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
bilinear pairing, chosen-ciphertext security, Proxy re-encryption |
60 | Albert M. K. Cheng, Zhubin Zhang |
Improving Web Server Performance with Adaptive Proxy Caching in Soft Real-time Mobile Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. VLSI Signal Process. ![In: J. VLSI Signal Process. 47(2), pp. 103-115, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
adaptive proxy caching, mobile networking, web servers, temporal coherency, soft real-time systems |
60 | Wun-She Yap, Swee-Huay Heng, Bok-Min Goi |
Cryptanalysis of Some Proxy Signature Schemes Without Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings, pp. 115-126, 2007, Springer, 978-3-540-72353-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
attack, Proxy signature, identity-based, certificateless |
60 | Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Fangguo Zhang, Xiaofeng Chen 0001 |
A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 480-489, 2005, Springer, 3-540-30803-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Authentication, Proxy Signature, Short Signature |
60 | Jun Wang 0001, Rui Min, Yingwu Zhu, Yiming Hu |
UCFS-A Novel User-Space, High Performance, Customized File System for Web Proxy Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 51(9), pp. 1056-1073, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
web proxy servers, File systems, performance improvement, disk I/Os |
60 | Matt Burnside, Dwaine E. Clarke, Todd Mills, Andrew Maywah, Srinivas Devadas, Ronald L. Rivest |
Proxy-based security protocols in networked mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain, pp. 265-272, 2002, ACM, 1-58113-445-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
certificate chain, certificate chain discovery, security, protocol, mobile device, wireless, authorization, certificate, ubiquitous, proxy, pervasive |
60 | Marcel-Catalin Rosu, Daniela Rosu 0001 |
An evaluation of TCP splice benefits in web proxy servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the Eleventh International World Wide Web Conference, WWW 2002, May 7-11, 2002, Honolulu, Hawaii, USA, pp. 13-24, 2002, ACM, 1-58113-449-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
TCP splice, web proxy |
59 | Gang Li, Yanling Li, Chuanda Qi |
Analysis on a Non-repudiable Threshold Proxy Signature Scheme with Known Signers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2009, 6th International Symposium on Neural Networks, ISNN 2009, Wuhan, China, May 26-29, 2009, Proceedings, Part II, pp. 904-910, 2009, Springer, 978-3-642-01509-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Tulti-signature, Threshold proxy signature, Digital signature, Proxy signature |
59 | Pooja Verlani, P. J. Narayanan |
A Parametric Proxy-Based Compression of Depth Movies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DCC ![In: 2008 Data Compression Conference (DCC 2008), 25-27 March 2008, Snowbird, UT, USA, pp. 550, 2008, IEEE Computer Society, 978-0-7695-3121-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Depth Movies, Parametric Proxy, Proxy-Based Compression, Tele-Conferencing, Compression, Transmission |
59 | Joo-Yong Kim, Kyoungwoon Cho, Kern Koh |
A Proxy Server Structure and its Cache Consistency Mechanism at the Network Bottleneck. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 23rd International Computer Software and Applications Conference (COMPSAC '99), 27-19 October 1999, Phoenix, AZ, USA, pp. 278-283, 1999, IEEE Computer Society, 0-7695-0368-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
network bottleneck, response time, polling, Proxy server, Proxy cache, invalidation |
59 | Xiangxue Li, Kefei Chen, Shiqun Li |
Multi-proxy Signature and Proxy Multi-signature Schemes from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Parallel and Distributed Computing: Applications and Technologies, 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004, Proceedings, pp. 591-595, 2004, Springer, 3-540-24013-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
58 | Lihua Wang 0001, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura |
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings, pp. 297-311, 2007, Springer, 978-3-540-77025-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
proxy cryptosystem, certificate-based encryption (CBE), pairing |
57 | Yong Woon Park, Ki-Dong Chung |
A Caching Policy for Continuous Media Objects Based on Logical Caches and Object Partitioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP ![In: Proceedings of the 2001 International Conference on Parallel Processing, ICPP 2002, 3-7 September 2001, Valencia, Spain, pp. 259-266, 2001, IEEE Computer Society, 0-7695-1257-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
56 | Trevor Armstrong, Olivier Trescases, Cristiana Amza, Eyal de Lara |
Efficient and transparent dynamic content updates for mobile clients. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 4th International Conference on Mobile Systems, Applications, and Services (MobiSys 2006), Uppsala, Sweden, June 19-22, 2006, pp. 56-68, 2006, ACM, 1-59593-195-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
mobile wireless communication, caching, power management, proxy, batching, pre-fetching, energy measurement |
55 | Songqing Chen, Shiping Chen 0003, Huiping Guo, Bo Shen 0003, Sushil Jajodia |
Achieving simultaneous distribution control and privacy protection for Internet media delivery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Multim. Comput. Commun. Appl. ![In: ACM Trans. Multim. Comput. Commun. Appl. 4(2), pp. 9:1-9:23, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
cooperative proxy, media delivery, privacy, Distribution control, distribution control, proxy caching |
55 | Xu An Wang 0001, Xiaoyuan Yang 0002 |
Proxy Re-encryption Scheme Based on SK Identity Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 657-660, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
55 | Giuseppe Ateniese, Karyn Benson, Susan Hohenberger |
Key-Private Proxy Re-encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 279-294, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
55 | Olatunde O. Abiona, Tricha Anjali, Clement E. Onime, Lawrence O. Kehinde |
Proxy server experiment and the changing nature of the web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIT ![In: 2008 IEEE International Conference on Electro/Information Technology, EIT 2008, held at Iowa State University, Ames, Iowa, USA, May 18-20, 2008, pp. 242-245, 2008, IEEE, 978-1-4244-2030-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Xuanwu Zhou, Ping Wei 0005 |
Anonymous Proxy Authorization Signature Scheme with Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 872-875, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Chung-Ming Huang, Chao-Hsien Lee, Jun-Hao Zhuang, Tsung-Yi Tsai, Chi-Chang Liu |
SIP-Based Cross-Domain Proxy Handoff for Mobile Streaming Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPAN ![In: 9th International Symposium on Parallel Architectures, Algorithms, and Networks, ISPAN 2008, 7-9 May 2008, Sydney, NSW, Australia, pp. 4-9, 2008, IEEE Computer Society, 978-0-7695-3125-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Wei Wu 0001, Yi Mu 0001, Willy Susilo, Jennifer Seberry, Xinyi Huang 0001 |
Identity-Based Proxy Signature from Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 22-31, 2007, Springer, 978-3-540-73546-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Sheng Guo, Zhenfu Cao, Rongxing Lu |
An Efficient ID-Based Multi-proxy Multi-Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS (2) ![In: Interdisciplinary and Multidisciplinary Research in Computer Science, IEEE CS Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS|06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2, pp. 81-88, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
55 | Qin Wang, Zhenfu Cao, Shengbao Wang |
Formalized Security Model of Multi-Proxy Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Fifth International Conference on Computer and Information Technology (CIT 2005), 21-23 September 2005, Shanghai, China, pp. 668-672, 2005, IEEE Computer Society, 0-7695-2432-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Je Hong Park, Bo Gyeong Kang, Sangwoo Park |
Cryptanalysis of Some Group-Oriented Proxy Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers, pp. 10-24, 2005, Springer, 3-540-31012-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Zuowen Tan, Zhuojun Liu, Mingsheng Wang |
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 374-385, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Tianjie Cao, Dongdai Lin, Rui Xue 0001 |
Universal Designated-Verifier Proxy Blind Signatures for E-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 1036-1041, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Wei-hsiu Ma, David Hung-Chang Du |
Design a progressive video caching policy for video proxy servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 6(4), pp. 599-610, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
55 | Qingshui Xue, Zhenfu Cao |
A Threshold Proxy Signature Scheme Using Self-Certified Public Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: Parallel and Distributed Processing and Applications, Second InternationalSymposium, ISPA 2004, Hong Kong, China, December 13-15, 2004, Proceedings, pp. 715-724, 2004, Springer, 3-540-24128-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
55 | Bin Yao, W. Kent Fuchs |
Recovery Proxy for Wireless Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: 12th International Symposium on Software Reliability Engineering (ISSRE 2001), 27-30 November 2001, Hong Kong, China, pp. 112-121, 2001, IEEE Computer Society, 0-7695-1306-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
55 | Edith Cohen, Balachander Krishnamurthy, Jennifer Rexford |
Improving End-to-End Performance of the Web Using Server Volumes and Proxy Filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 1998 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 31 - September 4, 1998, Vancouver, B.C., Canada, pp. 241-253, 1998, ACM, 1-58113-003-1. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
World Wide Web (WWW), caching, Web, filters, prefetching, coherency, volumes, piggybacking |
54 | Benoît Libert, Damien Vergnaud |
Multi-use unidirectional proxy re-signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 511-520, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
multi-use proxy re-cryptography, unidirectionality, digital signatures |
54 | Basel Alomair, Krishna Sampigethaya, Radha Poovendran |
Efficient Generic Forward-Secure Signatures and Proxy Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 166-181, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
efficiency, Digital signatures, proxy, forward-security |
54 | Santosh Chandrasekhar, Saikat Chakrabarti 0002, Mukesh Singhal |
Efficient Proxy Signatures For Ubiquitous Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SUTC ![In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2008), 11-13 June 2008, Taichung, Taiwan, pp. 106-113, 2008, IEEE Computer Society, 978-0-7695-3158-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Schnorr signature, LFSR sequence, cubic LFSR-based cryptosystems, mobile agents, provable security, Proxy signature, ubiquitous systems |
54 | Sherman S. M. Chow, Raphael C.-W. Phan |
Proxy Re-signatures in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 260-276, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Proxy re-signature, compartment signature, standard model |
54 | Wai Kong Cheuk, Daniel Pak-Kong Lun |
Throughput optimization for video streaming proxy servers based on video staging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 35(3), pp. 311-333, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Video smoothing, Video staging, Video streaming, Proxy server, Variable-bit-rate video |
54 | Cheng-Kang Chu, Wen-Guey Tzeng |
Identity-Based Proxy Re-encryption Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 189-202, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
standard model, identity-based encryption, Proxy re-encryption |
54 | Wei Hao 0001, Jicheng Fu, Jiang He, I-Ling Yen, Farokh B. Bastani, Ing-Ray Chen |
Extending Proxy Caching Capability: Issues and Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
World Wide Web ![In: World Wide Web 9(3), pp. 253-275, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
e-commerce, proxy caching, web system, service migration |
54 | Lei Guo 0004, Songqing Chen, Xiaodong Zhang 0001 |
Design and Evaluation of a Scalable and Reliable P2P Assisted Proxy for On-Demand Streaming Media Delivery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 18(5), pp. 669-682, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Internet media streaming, distributed hash table, peer-to-peer systems, proxy caching |
54 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Wei Wu 0001 |
Proxy Signature Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-hoc and Sensor Networks, Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedings, pp. 473-484, 2006, Springer, 3-540-49932-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Without Random Oracles, CDH Problem, Bilinear Pairings, Proxy Signature |
54 | Walid Bagga, Stefano Crosta, Refik Molva |
Proof-Carrying Proxy Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings, pp. 321-335, 2006, Springer, 3-540-38080-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Data Minimization, Authorization, Bilinear Pairings, Credentials, Proxy Certificates |
54 | Jia Song |
Segment-based proxy caching for distributed cooperative media content servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 39(1), pp. 22-33, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
distributed proxy servers, multimedia streaming, network performance, segment-based caching |
54 | Yuan Zhou, Zhenfu Cao, Zhenchuan Chai |
Constructing Secure Proxy Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 150-161, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Proxy cryptosystem, bilinear Diffie-Hellman, ID-based |
54 | Shaobin Wang, Hong Fan, Guohua Cui |
A proxy blind signature schemes based DLP and applying in e-voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, Xi'an, China, August 15-17, 2005, pp. 641-645, 2005, ACM, 1-59593-112-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
proxy blind signature, electronic voting, DLP |
54 | Yuan Zhou, Zhenfu Cao, Rongxing Lu |
Constructing Secure Warrant-Based Proxy Signcryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings, pp. 172-185, 2005, Springer, 3-540-30849-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
proxy Signcryption, provable security, integer factorization |
54 | Chung-Ming Huang, Chao-Hsien Lee, Chung-Yi Lai, Yuan-Tse Yu |
A Location-aware Layer 7 Proxy Handoff Mechanism over the Mobile Network Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 274-278, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Proxy Handoff, Mobile, Load Balance, Wireless, Anycast |
54 | Srivatsan Varadarajan, Raja Harinath, Jaideep Srivastava, Zhi-Li Zhang |
Coverage-Aware Proxy Placement for Dynamic Content Management over the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 19-22 May 2003, Providence, RI, USA, pp. 892-897, 2003, IEEE Computer Society, 0-7695-1921-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Proxy Placement, Internet, Coverage, Content Distribution Network (CDN) |
54 | Sean P. Walker, John Kenneth Salisbury Jr. |
Large haptic topographic maps: marsview and the proxy graph algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SI3D ![In: Proceedings of the 2003 Symposium on Interactive 3D Graphics, SI3D 2003, Monterey, California, USA, April 28-30, 2003, pp. 83-92, 2003, ACM, 1-58113-645-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
virtual proxy, haptics, interface, texture, large datasets, topological map, Mars |
53 | Pavel Ocenasek |
A Proxy-Based System for Translation of Internet Content into Specific Form. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APCHI ![In: Computer-Human Interaction, 8th Asia-Pacific Conference, APCHI 2008, Seoul, Korea, July 6-9, 2008, Proceedings, pp. 413-419, 2008, Springer, 978-3-540-70584-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
URL web-proxy, Security, Accessibility, Translation, Proxy server |
53 | Pei-Yih Ting, Xiao-Wei Huang |
An RSA-Based (t, n) Threshold Proxy Signature Scheme without Any Trusted Combiner. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 277-284, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Threshold proxy signature, Cryptography, Proxy signature |
51 | Jacob C. N. Schuldt, Kanta Matsuura, Kenneth G. Paterson |
Proxy Signatures Secure Against Proxy Key Exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings, pp. 141-161, 2008, Springer, 978-3-540-78439-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
provable security, proxy signatures |
51 | Jin Li 0002, Kwangjo Kim, Fangguo Zhang, Xiaofeng Chen 0001 |
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings, pp. 208-217, 2007, Springer, 978-3-540-75669-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Bilinear pairings, Proxy signature, Random oracle, Aggregate signature |
51 | Byoung-Jip Kim, Kyungbaek Kim, Daeyeon Park |
The Content-Aware Caching for Cooperative Transcoding Proxies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Convergence in Broadband and Mobile Networking, International Conference, ICOIN 2005, Jeju Island, Korea, January 31- February 2, 2005, Proceedings, pp. 766-775, 2005, Springer, 3-540-24467-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Ninghui Li, John C. Mitchell, Derrick Tong |
Securing Java RMI-Based Distributed Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 262-271, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
51 | Jen-Chu Liu, Wen-Tsuen Chen |
An Efficient Wireless Internet Access Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Networking Technologies for Enhanced Internet Services International Conference, ICOIN 2003, Cheju Island, Korea, February 12-14, 2003, Revised Selected Papers, pp. 585-594, 2003, Springer, 3-540-40827-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
51 | Binh Thai, Aruna Seneviratne |
The Effects of Mobile Agent Performance on MP3 Streaming Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MATA ![In: Mobile Agents for Telecommunication Applications, Second International Workshop, MATA 2000, Paris, France, September 18-20, 2000, Proceedings, pp. 215-218, 2000, Springer, 3-540-41069-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 5165 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|