|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 34 occurrences of 29 keywords
|
|
|
Results
Found 60 publication records. Showing 60 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
77 | Song Y. Yan, Carsten Maple, Glyn James |
A New Scheme for Deniable/Repudiable Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASC ![In: Computer Algebra in Scientific Computing, 10th International Workshop, CASC 2007, Bonn, Germany, September 16-20, 2007, Proceedings, pp. 424-432, 2007, Springer, 978-3-540-75186-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Deniable/repudiable authentication, quadratic residuosity problem, intractability |
67 | Paul Robinson, Nick Cook, Santosh K. Shrivastava |
Implementing Fair Non-repudiable Interactions with Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: Ninth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2005), 19-23 September 2005, Enschede, The Netherlands, pp. 195-206, 2005, IEEE Computer Society, 0-7695-2441-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Inter-enterprise collaboration and virtual enterprises, Middleware standards and systems, Security, Web services, Non-repudiation, Fair exchange, Enterprise computing |
67 | Nick Cook, Paul Robinson, Santosh K. Shrivastava |
Component Middleware to Support Non-repudiable Service Interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June - 1 July 2004, Florence, Italy, Proceedings, pp. 605-, 2004, IEEE Computer Society, 0-7695-2052-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
FT Architecture/Middleware Software Engineering, Service Composition, Non-repudiation, System Security |
51 | Willy Susilo, Yi Mu 0001 |
Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 68-80, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
repudiable, authentication, email, phishing, separable, ID-based, deniable |
51 | Daniel W. Manchala |
Trust Metrics, Models and Protocols for Electronic Commerce Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: Proceedings of the 18th International Conference on Distributed Computing Systems, Amsterdam, The Netherlands, May 26-29, 1998, pp. 312-321, 1998, IEEE Computer Society, 0-8186-8292-2. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
trust protocols, trusted authority, fuzzy-verification, trusted advertisement, non-repudiable context, trust models, Trust metrics |
47 | Nick Cook, Paul Robinson, Santosh K. Shrivastava |
The Rigorous Implementation of a Fair Exchange Protocol for Non-repudiable Web Service Interactions - a case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 23rd International Conference on Data Engineering Workshops, ICDE 2007, 15-20 April 2007, Istanbul, Turkey, pp. 307-314, 2007, IEEE Computer Society, 978-1-4244-0831-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Nick Cook, Santosh K. Shrivastava, Stuart M. Wheater |
Middleware Support for Non-repudiable Transactional Information Sharing between Enterprises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAIS ![In: Distributed Applications and Interoperable Systems, 4th IFIP WG6.1 International Conference, DAIS 2003, Paris, France, November 17-21, 2003, Proceedings, pp. 125-132, 2003, Springer, 3-540-20529-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
inter-enterprise interaction, security, middleware, transactions |
40 | Alapan Arnab, Andrew Hutchison |
Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, pp. 277-288, 2007, Springer, 978-0-387-72366-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Yuqing Ding, Zhongcheng Wu, Yongchun Miao, Liyang Xie, Manyu Ding |
Genuine On-Chain and Off-Chain Collaboration: Achieving Secure and Non-Repudiable File Sharing in Blockchain Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Serv. Manag. ![In: IEEE Trans. Netw. Serv. Manag. 21(2), pp. 1802-1816, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Ziqiang Wen, Xiaomei Dong, Chongyang Yang, Ning Zhang |
Short Repudiable Ring Signature: Constant Size and Less Overhead. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Web Information Systems and Applications - 20th International Conference, WISA 2023, Chengdu, China, September 15-17, 2023, Proceedings, pp. 371-382, 2023, Springer, 978-981-99-6221-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Kosei Akama, Seki Makino, Masaaki Sato, Keisuke Uehara |
Poster: Non-repudiable Secure Logging System for the Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, SACMAT 2023, Trento, Italy, June 7-9, 2023, pp. 63-65, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Hao Lin, Mingqiang Wang |
Repudiable ring signature: Stronger security and logarithmic-size. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stand. Interfaces ![In: Comput. Stand. Interfaces 80, pp. 103562, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Yue Zheng, Si Wang, Chip-Hong Chang |
A DNN Fingerprint for Non-Repudiable Model Ownership Identification and Piracy Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 17, pp. 2977-2989, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Mattia Antonini, Miguel Pincheira, Massimo Vecchio, Fabio Antonelli |
A TinyML approach to non-repudiable anomaly detection in extreme industrial environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MetroInd4.0& IoT ![In: IEEE International Workshop on Metrology for Industry 4.0 & IoT, MetroInd4.0&IoT 2022, Trento, Italy, June 7-9, 2022, pp. 397-402, 2022, IEEE, 978-1-6654-1093-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Fei Chen 0003, Jiahao Wang, Changkun Jiang, Tao Xiang 0001, Yuanyuan Yang 0001 |
Blockchain Based Non-repudiable IoT Data Trading: Simpler, Faster, and Cheaper. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: IEEE INFOCOM 2022 - IEEE Conference on Computer Communications, London, United Kingdom, May 2-5, 2022, pp. 1958-1967, 2022, IEEE, 978-1-6654-5822-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Elliot Fairweather, Rudolf Wittner, Martin Chapman, Petr Holub, Vasa Curcin |
Non-repudiable Provenance for Clinical Decision Support Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPAW ![In: Provenance and Annotation of Data and Processes - 8th and 9th International Provenance and Annotation Workshop, IPAW 2020 + IPAW 2021, Virtual Event, July 19-22, 2021, Proceedings, pp. 165-182, 2021, Springer, 978-3-030-80959-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Elliot Fairweather, Rudolf Wittner, Martin Chapman, Petr Holub, Vasa Curcin |
Non-repudiable provenance for clinical decision support systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2006.11233, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
26 | Hao Lin, Mingqiang Wang |
Repudiable Ring Signature: Stronger Security and Logarithmic-Size. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 1269, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
26 | |
Repudiable Ring Signatures: Stronger Definitions and Logarithmic-Size. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 1267, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
26 | Emanuel Palm, Olov Schelén, Ulf Bodin, Richard Hedman |
The Exchange Network: An Architecture for the Negotiation of Non-Repudiable Token Exchanges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDIN ![In: 17th IEEE International Conference on Industrial Informatics, INDIN 2019, Helsinki, Finland, July 22-25, 2019, pp. 760-767, 2019, IEEE, 978-1-7281-2927-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Dinuni K. Fernando, Siddharth Kulshrestha, Jerome Dinal Herath, Nitin Mahadik, Yanzhe Ma, Changxin Bai, Ping Yang 0002, Guanhua Yan, Shiyong Lu |
SciBlock: A Blockchain-Based Tamper-Proof Non-Repudiable Storage for Scientific Workflow Provenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIC ![In: 5th IEEE International Conference on Collaboration and Internet Computing, CIC 2019, Los Angeles, CA, USA, December 12-14, 2019, pp. 81-90, 2019, IEEE, 978-1-7281-6739-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Feng Wang 0020, Li Xu 0002, Huaqun Wang, Zhide Chen |
Identity-based non-repudiable dynamic provable data possession in cloud storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 69, pp. 521-533, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Minseok Lee, Doo-Ho Choi, Taek-Young Youn |
Non-Repudiable Dynamic PDP with Stronger Security based on Stateful Rank Based Skip List. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTC ![In: International Conference on Information and Communication Technology Convergence, ICTC 2018, Jeju Island, Korea (South), October 17-19, 2018, pp. 836-841, 2018, IEEE, 978-1-5386-5041-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Jiangtao Li 0003, Lei Zhang 0009 |
Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 414, pp. 187-202, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Tsu-Yang Wu, Yuh-Min Tseng, Sen-Shan Huang, Yi-Chen Lai |
Non-Repudiable Provable Data Possession Scheme With Designated Verifier in Cloud Storage Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 5, pp. 19333-19341, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Karthik Nandakumar, Nalini K. Ratha, Sharath Pankanti, Shelby Darnell |
Secure one-time biometrie tokens for non-repudiable multi-party transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WIFS ![In: 2017 IEEE Workshop on Information Forensics and Security, WIFS 2017, Rennes, France, December 4-7, 2017, pp. 1-6, 2017, IEEE, 978-1-5090-6769-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Nikilesh Balakrishnan, Lucian Carata, Thomas Bytheway, Ripduman Sohan, Andy Hopper |
Non-repudiable disk I/O in untrusted kernels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSys ![In: Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India, September 2, 2017, pp. 24:1-24:6, 2017, ACM, 978-1-4503-5197-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Hongyuan Wang, Liehuang Zhu, Chang Xu 0004, Yijia Lilong |
A universal method for realizing non-repudiable provable data possession in cloud storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 9(14), pp. 2291-2301, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Qing-Qing Xie, Liangmin Wang 0001, Hong Zhong 0001 |
Non-repudiable Query Answer Authentication Scheme over Anonymous Cloud Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CBD ![In: International Conference on Advanced Cloud and Big Data, CBD 2016, Chengdu, China, August 13-16, 2016, pp. 200-206, 2016, IEEE Computer Society, 978-1-5090-3677-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Joona Kannisto, Takeshi Takahashi 0001, Jarmo Harju, Seppo Heikkinen, Marko Helenius, Shin'ichiro Matsuo, Bilhanan Silverajan |
A non-repudiable negotiation protocol for security service level agreements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Syst. ![In: Int. J. Commun. Syst. 28(15), pp. 2067-2081, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | |
Non-Repudiable Provable Data Possession in Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 432, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
26 | Shouguo Chen, Anmin Fu, Ningyuan Qin |
异构无线网络中基于自更新哈希链的不可否认性计费协议 (Non-repudiable Billing Protocol Based on Self-updating Hash Chain for Heterogeneous Wireless Networks). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 42(3), pp. 111-116, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Zhen Mo, Yian Zhou, Shigang Chen, Cheng-Zhong Xu 0001 |
Enabling Non-repudiable Data Possession Verification in Cloud Storage Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE CLOUD ![In: 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27 - July 2, 2014, pp. 232-239, 2014, IEEE Computer Society, 978-1-4799-5063-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Kissan G. Gauns Dessai, Venkatesh V. Kamat |
Fair and Non-repudiable Protocol for Exchange of E-examination Question Paper and Answer-Scripts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
T4E ![In: Sixth IEEE International Conference on Technology for Education, T4E 2014, Amritapuri, India, December 18-21, 2014, pp. 120-121, 2014, IEEE Computer Society, 978-1-4799-6489-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Lei Pan 0002, Shaun Bangay |
Generating Repudiable, Memorizable, and Privacy Preserving Security Questions Using the Propp Theory of Narrative. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberC ![In: 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2014, Shanghai, China, October 13-15, 2014, pp. 66-72, 2014, IEEE Computer Society, 978-1-4799-6235-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Samaneh Mashhadi |
A Novel Non-repudiable Threshold Proxy Signature Scheme with Known Signers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 15(4), pp. 274-279, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
26 | Alois Paulin, Tatjana Welzer |
A universal system for fair non-repudiable certified e-mail without a trusted third party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 32, pp. 207-218, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Samaneh Mashhadi |
Analysis of frame attack on Hsu et al.'s non-repudiable threshold multi-proxy multi-signature scheme with shared verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. Iran. ![In: Sci. Iran. 19(3), pp. 674-679, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Kassidy P. Clark, Martijn Warnier, Frances M. T. Brazier |
Automated Non-repudiable Cloud Resource Allocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLOSER (Selected Papers) ![In: Cloud Computing and Services Science - Second International Conference, CLOSER 2012, Porto, Portugal, April 18-21, 2012. Revised Selected Papers, pp. 168-182, 2012, Springer, 978-3-319-04518-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Raphael C.-W. Phan |
Non-repudiable authentication and billing architecture for wireless mesh networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 17(4), pp. 1055-1061, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Stephen W. Neville, Michael Horie |
Controlling spam and spear phishing via peered network overlays and non-repudiable traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime Researchers Summit ![In: 2011 eCrime Researchers Summit, eCrime 2011, San Diego, CA, USA, November 7-9, 2011, pp. 1-13, 2011, IEEE, 978-1-4577-1340-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Mohammad Hasan Samadani, Mehdi Shajari |
Mobile Partial Identity Management: The Non-repudiable Minimal Mobile Identity Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGIT ![In: Future Generation Information Technology - Second International Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, pp. 439-449, 2010, Springer, 978-3-642-17568-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Gang Li, Yanling Li, Chuanda Qi |
Analysis on a Non-repudiable Threshold Proxy Signature Scheme with Known Signers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2009, 6th International Symposium on Neural Networks, ISNN 2009, Wuhan, China, May 26-29, 2009, Proceedings, Part II, pp. 904-910, 2009, Springer, 978-3-642-01509-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Tulti-signature, Threshold proxy signature, Digital signature, Proxy signature |
26 | Antonio Grillo, Alessandro Lentini, Gianluigi Me, Giuliano Rulli |
Trusted SMS - A Novel Framework for Non-repudiable SMS-based Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HEALTHINF (1) ![In: Proceedings of the First International Conference on Health Informatics, HEALTHINF 2008, Funchal, Madeira, Portugal, January 28-31, 2008, Volume 1, pp. 43-50, 2008, INSTICC - Institute for Systems and Technologies of Information, Control and Communication, 978-989-8111-16-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
26 | Nick Cook, Paul Robinson, Santosh K. Shrivastava |
Design and Implementation of Web Services Middleware to Support Fair Non-Repudiable Interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Cooperative Inf. Syst. ![In: Int. J. Cooperative Inf. Syst. 15(4), pp. 565-597, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Nicholas Cook |
Middleware support for non-repudiable business-to-business interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2006 |
RDF |
|
26 | Paul Fletcher Robinson |
Design and implementation of extensible middleware for non-repudiable interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2006 |
RDF |
|
26 | Jordi Castellà-Roca, Josep Domingo-Ferrer |
A Non-Repudiable Bitstring Commitment Scheme Based on a Public-Key Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (2) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 778-780, 2004, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Bit commitment, Mental poker |
26 | Chwei-Shyong Tsai, Shiang-Feng Tzeng, Min-Shiang Hwang |
Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Informatica ![In: Informatica 14(3), pp. 393-402, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
26 | Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti |
How to unwittingly sign non-repudiable documents with Java applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA, pp. 192-196, 2003, IEEE Computer Society, 0-7695-2041-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan, C. V. Jawahar |
Efficient Biometric Verification in Encrypted Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICB ![In: Advances in Biometrics, Third International Conference, ICB 2009, Alghero, Italy, June 2-5, 2009. Proceedings, pp. 899-908, 2009, Springer, 978-3-642-01792-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Antonio Grillo, Alessandro Lentini, Gianluigi Me, Giuseppe F. Italiano |
Transaction Oriented Text Messaging with Trusted-SMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 485-494, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Min-Shiang Hwang, Shiang-Feng Tzeng, Chun-Ta Li |
A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings. Part III, pp. 273-284, 2007, Springer, 978-3-540-74482-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Christine Laurendeau, Michel Barbeau |
Secure Anonymous Broadcasting in Vehicular Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 15-18 October 2007, Clontarf Castle, Dublin, Ireland, Proceedings, pp. 661-668, 2007, IEEE Computer Society, 0-7695-3000-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk |
Deniable authentication and key exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 400-409, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authentication, key exchange, deniability |
20 | KyungKeun Lee, JoongHyo Oh, Sang-Jae Moon |
How to Generate Universally Verifiable Signatures in Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MADNES ![In: Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers, pp. 118-131, 2005, Springer, 3-540-36646-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Ad-hoc networks, Digital signature, Bilinear map, Diffie-Hellman problem |
20 | Mikko Honkala, Petri Vuorimaa |
Secure Web Forms with Client-Side Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWE ![In: Web Engineering, 5th International Conference, ICWE 2005, Sydney, Australia, July 27-29, 2005, Proceedings, pp. 340-351, 2005, Springer, 3-540-27996-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Patrick R. Eaton, Hakim Weatherspoon, John Kubiatowicz |
Efficiently Binding Data to Owners in Distributed Content-Addressable Storage Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Security in Storage Workshop ![In: 3rd International IEEE Security in Storage Workshop (SISW 2005), December 13, 2005, San Francisco, California, USA, pp. 40-51, 2005, IEEE Computer Society, 0-7695-2537-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | István Zsolt Berta, Levente Buttyán, István Vajda |
Mitigating the Untrusted Terminal Problem Using Conditional Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 12-16, 2004, IEEE Computer Society, 0-7695-2108-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
untrusted terminal, conditional signature, smart card, message authentication, electronic signature |
20 | Els Van Herreweghen |
Non-repudiation in SET: Open Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings, pp. 140-156, 2000, Springer, 3-540-42700-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #60 of 60 (100 per page; Change: )
|
|