Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
162 | Maithili Narasimha, John Solis, Gene Tsudik |
Privacy-preserving revocation checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(1), pp. 61-75, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy-preserving revocation checking, Anonymity and privacy, Certificate revocation trees, Revocation, Certificate revocation lists |
117 | Dae Hyun Yum, Pil Joong Lee |
Separable Implicit Certificate Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 121-136, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
certificate-based encryption, PKI, certificate revocation |
107 | Bezawada Bruhadeshwar, Sandeep S. Kulkarni |
User Revocation in Secure Adhoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, Second International Conference, ICDCIT 2005, Bhubaneswar, India, December 22-24, 2005, Proceedings, pp. 377-388, 2005, Springer, 3-540-30999-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Secure Adhoc Networks, Secret Instantiation Protocols, Group Key Management Protocols, User Revocation |
107 | Dalit Naor, Moni Naor, Jeffery Lotspiech |
Revocation and Tracing Schemes for Stateless Receivers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings, pp. 41-62, 2001, Springer, 3-540-42456-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Revocation scheme, Tracing scheme, Copyright Protection, Broadcast Encryption |
101 | Nuttapong Attrapadung, Hideki Imai |
Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings, pp. 278-300, 2009, Springer, 978-3-642-10867-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
101 | John Solis, Gene Tsudik |
Simple and Flexible Revocation Checking with Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 351-367, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
97 | Maithili Narasimha, Gene Tsudik |
Privacy-Preserving Revocation Checking with Modified CRLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 18-33, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Anonymity and Privacy, Certificate Revocation |
92 | Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula |
Revocation Schemes for Delegation Licences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings, pp. 190-205, 2008, Springer, 978-3-540-88624-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
92 | Yong Wang, Byrav Ramamurthy, Xukai Zou |
KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2007, Glasgow, Scotland, UK, 24-28 June 2007, pp. 1260-1265, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
92 | Patrick D. McDaniel, Aviel D. Rubin |
A Response to ''Can We Eliminate Certificate Revocation Lists?''. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings, pp. 245-258, 2000, Springer, 3-540-42700-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
88 | Jan Camenisch, Markulf Kohlweiss, Claudio Soriente |
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 481-500, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
revocation, anonymous credentials, dynamic accumulators |
88 | Haowen Chan, Virgil D. Gligor, Adrian Perrig, Gautam Muralidharan |
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 2(3), pp. 233-247, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, Sensor networks, distributed algorithms, key management, key distribution, revocation |
83 | David A. Cooper |
A Model of Certificate Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 256-264, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
certificate revocation, certification authority, CRL, certificate revocation list |
82 | Ying Liu, Sheng-rong Wang, Jingbo Xia, Jun Wei |
A New United Certificate Revocation Scheme in Grid Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30 - December 3, 2005, Proceedings, pp. 123-128, 2005, Springer, 3-540-30510-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
78 | Benoît Libert, Damien Vergnaud |
Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 498-517, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
verifier-local revocation, backward unlinkability, Group signatures, standard model, bilinear maps |
78 | Jon A. Solworth |
Instant Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 31-48, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Public Key Infrastructure, Revocation |
78 | Noam Kogan, Tamir Tassa |
Improved efficiency for revocation schemes via Newton interpolation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 9(4), pp. 461-486, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Newton interpolation, secret sharing, broadcast encryption, User revocation |
78 | Katrin Hoeper, Guang Gong |
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADHOC-NOW ![In: Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, ADHOC-NOW 2006, Ottawa, Canada, August 17-19, 2006, Proceedings, pp. 224-237, 2006, Springer, 3-540-37246-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Identity-Based Schemes, Key Renewal, Neighborhood Monitoring, Mobile Ad Hoc Networks, Revocation |
78 | Toru Nakanishi 0001, Nobuo Funabiki |
A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings, pp. 17-32, 2006, Springer, 3-540-47699-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
backward unlinkability, DLDH assumption, group signature, revocation, bilinear maps |
78 | Wen-Guey Tzeng, Zhi-Jia Tzeng |
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 35(1), pp. 47-61, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
revocation, broadcast encryption, traitor tracing |
78 | Wen-Guey Tzeng, Zhi-Jia Tzeng |
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings, pp. 207-224, 2001, Springer, 3-540-41658-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
revocation, broadcast encryption, traitor tracing |
78 | Feng Bao 0001, Robert H. Deng |
A New type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 1-11, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
e-commerce, traceability, blinding signatures, anonymity revocation |
77 | Oscar García Morchon, Heribert Baldus, Tobias Heer, Klaus Wehrle |
Cooperative security in distributed sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing, White Plains, New York, USA, November 12-15, 2007, pp. 96-105, 2007, IEEE Computer Society / ICST, 1-4244-1317-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
72 | Stephan Eichler, Bernd Müller-Rathgeber |
Performance Analysis of Scalable Certificate Revocation Schemes for Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 15-17 November 2005, Sydney, Australia, Proceedings, pp. 382-391, 2005, IEEE Computer Society, 0-7695-2421-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
72 | Paul C. Kocher |
On Certificate Revocation and Validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings, pp. 172-177, 1998, Springer, 3-540-64951-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
68 | Yuan Xue, Helmut Jürgensen |
Random sampling key revocation scheme for distributed sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PETRA ![In: Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, PETRA 2009, Corfu, Greece, June 9-13, 2009, 2009, ACM, 978-1-60558-409-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, privacy, key management, key revocation, sensor nets |
68 | Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith |
PEREA: towards practical TTP-free revocation in anonymous authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 333-344, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
non-membership proofs, privacy-enhanced revocation, subjective blacklisting, anonymous authentication |
68 | Daryl Walleck, Yingjiu Li, Shouhuai Xu |
Empirical Analysis of Certificate Revocation Lists. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings, pp. 159-174, 2008, Springer, 978-3-540-70566-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
public key infrastructure, empirical analysis, certificate revocation |
68 | Abedelaziz Mohaisen, DaeHun Nyang, YoungJae Maeng, KyungHee Lee |
Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-Hoc and Sensor Networks, Third International Conference, MSN 2007, Beijing, China, December 12-14, 2007, Proceedings, pp. 822-833, 2007, Springer, 978-3-540-77023-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
complete subtree cover, dynamic run-length encoding, sensor network, communication efficiency, Key revocation, bit vector |
68 | Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum |
How to incorporate revocation status information into the trust metrics for public-key certification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 1594-1598, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
PKI, revocation, public key certificates, trust metrics |
68 | JoongHyo Oh, KyungKeun Lee, Sang-Jae Moon |
How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 290-303, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Mediated identity-based encryption, Identity revocation, Mediated key agreement protocol, Key escrow |
68 | Longhua Zhang, Gail-Joon Ahn, Bei-tseng Chu |
A rule-based framework for role-based delegation and revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 6(3), pp. 404-441, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
access control, Role, delegation, revocation, rule-based |
68 | Benoît Libert, Jean-Jacques Quisquater |
Efficient revocation and threshold pairing based cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, PODC 2003, Boston, Massachusetts, USA, July 13-16, 2003, pp. 163-171, 2003, ACM, 1-58113-708-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Public key cryptosystems, revocation, bilinear maps |
68 | Keita Emura, Atsuko Miyaji, Kazumasa Omote |
A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 769-773, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
64 | Toshiyuki Isshiki, Kengo Mori, Kazue Sako, Isamu Teranishi, Shoko Yonezawa |
Using group signatures for identity management and its implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006, pp. 73-78, 2006, ACM, 1-59593-547-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
implementation, identity management, group signature, user revocation |
64 | Lan Nguyen |
Accumulators from Bilinear Pairings and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, pp. 275-292, 2005, Springer, 3-540-24399-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
membership revocation, privacy, anonymity, group signatures, ring signatures, ID-based, identity escrow, Dynamic accumulators |
64 | Tatsuyuki Matsushita |
A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 197-208, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Flexible revocation, Black-box tracing, Traitor tracing |
63 | Wei Ren 0002, Kui Ren 0001, Wenjing Lou |
Optimized User Revocation for Group Signature Based Privacy-Aware PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 17-20 June 2008, Beijing, China, pp. 388-393, 2008, IEEE Computer Society, 978-0-7695-3173-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Michael Backes 0001, Christian Cachin, Alina Oprea |
Secure Key-Updating for Lazy Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings, pp. 327-346, 2006, Springer, 3-540-44601-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
63 | Babu Sundaram, Barbara M. Chapman |
A Grid Authentication System with Revocation Guarantees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HiPC ![In: High Performance Computing - HiPC 2005, 12th International Conference, Goa, India, December 18-21, 2005, Proceedings, pp. 508-517, 2005, Springer, 3-540-30936-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
63 | Mira Kim, Kazukuni Kobara, Hideki Imai |
Dynamic Fingerprinting over Broadcast Using Revocation Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, pp. 251-263, 2004, Springer, 3-540-24015-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
63 | Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi |
Performance Evaluation of Public-Key Certificate Revocation System with Balanced Hash Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: Proceedings of the 1999 International Conference on Parallel Processing Workshops, ICPPW 1999, Wakamatsu, Japan, September 21-24, 1999, pp. 204-211, 1999, IEEE Computer Society, 0-7695-0353-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
59 | Steffen Reidt, Mudhakar Srivatsa, Shane Balfe |
The fable of the bees: incentivizing robust revocation decision making in ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 291-302, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
bees, partially available, suicide, trust authority, game, incentive, revocation, reward |
59 | Thibault Cholez, Isabelle Chrisment, Olivier Festor |
A Distributed and Adaptive Revocation Mechanism for P2P Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Seventh International Conference on Networking (ICN 2008), 13-18 April 2008, Cancun, Mexico, pp. 290-295, 2008, IEEE Computer Society, 978-0-7695-3106-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
revocation mechanism, remote accounts, P2P networks, reputation mechanism, KAD |
59 | Dan Boneh, Hovav Shacham |
Group signatures with verifier-local revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 168-177, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
trusted computing, group signatures, revocation |
59 | Claude Crépeau, Carlton R. Davis |
A certificate revocation scheme for wireless ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2003, Fairfax, Virginia, USA, 2003, pp. 54-61, 2003, ACM, 1-58113-783-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
revocation scheme, digital signature, public-key cryptography, ad hoc network security |
59 | Jan Camenisch, Anna Lysyanskaya |
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 61-76, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
anonymity, group signatures, certificate revocation, credential systems, identity escrow, Dynamic accumulators |
59 | Ninghui Li, Joan Feigenbaum |
Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings, pp. 157-168, 2001, Springer, 3-540-44079-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
Certificates, PKI, Revocation, CRL |
54 | Hua Wang 0002, Jinli Cao |
Delegating Revocations and Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Business Process Management Workshops ![In: Business Process Management Workshops, BPM 2007 International Workshops, BPI, BPD, CBP, ProHealth, RefMod, semantics4ws, Brisbane, Australia, September 24, 2007, Revised Selected Papers, pp. 294-305, 2007, Springer, 978-3-540-78237-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RBAC, Delegation, Revocation |
54 | Dan Boneh, Xuhua Ding, Gene Tsudik |
Fine-grained control of security capabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 4(1), pp. 60-82, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Digital Signatures, Public Key Infrastructure, Certificate Revocation |
53 | George Danezis, Len Sassaman |
How to Bypass Two Anonymity Revocation Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 8th International Symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008, Proceedings, pp. 187-201, 2008, Springer, 978-3-540-70629-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Xinxin Fan, Guang Gong |
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings, pp. 958-965, 2008, IEEE Computer Society, 978-1-4244-2412-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Shushan Zhao, Akshai K. Aggarwal, Robert D. Kent |
A Framework for Revocation of Proxy Certificates in a Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (3) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 532-537, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Daniel Kouril, Ludek Matyska, Michal Procházka |
A Robust and Efficient Mechanism to Distribute Certificate Revocation Information Using the Grid Monitoring Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 614-619, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Noam Kogan, Yuval Shavitt, Avishai Wool |
A practical revocation scheme for broadcast encryption using smartcards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 9(3), pp. 325-351, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
smart cards, Broadcast encryption |
53 | Toru Nakanishi 0001, Nobuo Funabiki |
Verifier-Local Revocation Group Signature Schemes with Backward Unlinkability from Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings, pp. 533-548, 2005, Springer, 3-540-30684-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Michael Backes 0001, Christian Cachin, Alina Oprea |
Lazy Revocation in Cryptographic File Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Security in Storage Workshop ![In: 3rd International IEEE Security in Storage Workshop (SISW 2005), December 13, 2005, San Francisco, California, USA, pp. 1-11, 2005, IEEE Computer Society, 0-7695-2537-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Babu Sundaram, Barbara M. Chapman |
Addressing credential revocation in grid environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 6th IEEE/ACM International Conference on Grid Computing (GRID 2005), November 13-14, 2005, Seattle, Washington, USA, Proceedings, pp. 323-326, 2005, IEEE Computer Society, 0-7803-9493-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Seung-Hyun Seo, Kyung-Ah Shim, Sang-Ho Lee |
A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 216-225, 2005, Springer, 3-540-28224-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng |
Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings, pp. 96-110, 2003, Springer, 3-540-20176-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
53 | Noam Kogan, Yuval Shavitt, Avishai Wool |
A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2003 IEEE Symposium on Security and Privacy (S&P 2003), 11-14 May 2003, Berkeley, CA, USA, pp. 225-235, 2003, IEEE Computer Society, 0-7695-1940-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
53 | Diana Berbecaru, Antonio Lioy, Marius Marian |
Security aspects in standard certificate revocation mechanisms: a case study for OCSP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 1-4 July 2002, Taormina, Italy, pp. 484-489, 2002, IEEE Computer Society, 0-7695-1671-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
53 | Virgil D. Gligor |
Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 113-124, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
49 | Alexandra Boldyreva, Vipul Goyal, Virendra Kumar |
Identity-based encryption with efficient revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 417-426, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
provable security, revocation, identity-based encryption |
49 | Maxim Raya, Mohammad Hossein Manshaei, Márk Félegyházi, Jean-Pierre Hubaux |
Revocation games in ephemeral networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 199-210, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ephemeral networks, game theory, revocation |
49 | Jon A. Solworth |
Beacon certificate push revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008, pp. 59-66, 2008, ACM, 978-1-60558-300-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication, certificate, public key infrastructure (pki), revocation |
49 | Kenneth P. Laberteaux, Jason J. Haas, Yih-Chun Hu |
Security certificate revocation list distribution for vanet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Vehicular Ad Hoc Networks ![In: Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, VANET 2008, San Francisco, California, USA, September 15, 2008, pp. 88-89, 2008, ACM, 978-1-60558-191-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, simulation, vanet, revocation, crl |
49 | Qingyu Xu, Mingxing He |
Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers, pp. 41-55, 2008, Springer, 978-3-642-00305-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
key distribution self-healing, storage complexity, wireless sensor network, computational secure, unconditional secure, key revocation |
49 | Suriadi Suriadi, Ernest Foo, Jason Smith 0001 |
A User-Centric Protocol for Conditional Anonymity Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings, pp. 185-194, 2008, Springer, 978-3-540-85734-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
user-centric identity, privacy, anonymity revocation |
49 | David W. Chadwick, Sean Anthony |
Using WebDAV for Improved Certificate Revocation and Publication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 265-279, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
HTPP, revocation, LDAP, WebDAV, CRLs |
49 | Sujing Zhou, Dongdai Lin |
Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings, pp. 126-143, 2006, Springer, 3-540-49462-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
LRSW Assumption, Verifier-Local Revocation, Group Signature, Bilinear Map |
49 | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano |
Certificate revocation system implementation based on the Merkle hash tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 2(2), pp. 110-124, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Public-key infrastructure, Certificate revocation, Merkle hash tree |
49 | Weifeng Chen 0001, Zihui Ge, Chun Zhang, James F. Kurose, Donald F. Towsley |
On Dynamic Subset Difference Revocation Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication, Third International IFIP-TC6 Networking Conference, Athens, Greece, May 9-14, 2004, Proceedings, pp. 743-758, 2004, Springer, 3-540-21959-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Group rekeying, Subset Difference Revocation, Multicast security |
49 | Toru Nakanishi 0001, Yuji Sugiyama |
A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 336-347, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Membership revocation, Zero-knowledge proof of integer relations, Strong RSA assumption, Group signature scheme |
49 | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano |
Implementation of an Efficient Authenticated Dictionary for Certificate Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey, pp. 238-243, 2003, IEEE Computer Society, 0-7695-1961-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
AD and OCSP, Public key cryptography, PKI, CRT, certificate revocation, CRL |
49 | Petra Wohlmacher |
Digital certificates: a survey of revocation methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia Workshops ![In: Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30 - November 3, 2000, pp. 111-114, 2000, ACM Press, 1-58113-311-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
CRS, CRT, revocation, digital certificate, CRL, public-key certificate, X.509, attribute certificate, OCSP |
49 | William Aiello, Sachin Lodha, Rafail Ostrovsky |
Fast Digital Identity Revocation (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 137-152, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
signatures, public-key infrastructure, certificate revocation, digital identities, Certificate authority |
48 | Min Li, Hua Wang 0002, Ashley W. Plank, Jianming Yong |
Advanced Permission-Role Relationship in Role-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 391-403, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Jean-Bernard Fischer, Emmanuel Prouff |
Off-Line Group Signatures with Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings, pp. 263-277, 2006, Springer, 3-540-33311-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
smart card, risk management, Group signature, revocation, dynamic group |
44 | Andreas Schaad, Volkmar Lotz, Karsten Sohr |
A model-checking approach to analysing organisational controls in a loan origination process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 139-149, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
organisational control, model-checking, delegation, separation, revocation |
44 | Alexandr Andoni, Jessica Staddon |
Graceful service degradation (or, how to know your payment is late). ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), Vancouver, BC, Canada, June 5-8, 2005, pp. 9-18, 2005, ACM, 1-59593-049-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
degradation scheme, moderately-hard functions, revocation scheme, copyright protection, broadcast encryption |
44 | Javier López 0001, Antonio Mana, José A. Montenegro, Juan J. Ortega |
PKI design based on the use of on-line certification authorities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 2(2), pp. 91-102, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Certification authories, Authentication, PKI, Revocation, Public-key certificates |
44 | Moni Naor, Benny Pinkas |
Efficient Trace and Revoke Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings, pp. 1-20, 2000, Springer, 3-540-42700-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
tracing traitors, self enforcement, copyright protection, broadcast encryption, blacklisting, User revocation |
43 | Asma Khalid, Mukhtar Hussain |
A Secure Group Rekeying Scheme with Compromised Node Revocation in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 712-721, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Po-Jen Chuang, Shao-Hsuan Chang, Chih-Shin Lin |
A PKC-Based Node Revocation Scheme in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (1) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 256-261, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
43 | Wenyuan Liu, Feng Tong, Yongan Luo, Feng Zhang |
A proxy blind signature scheme based on elliptic curve with proxy revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (1) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 99-104, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
43 | YoungJae Maeng, Abedelaziz Mohaisen, DaeHun Nyang |
Secret Key Revocation in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, 4th International Conference, UIC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 1222-1232, 2007, Springer, 978-3-540-73548-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
43 | Seung Wook Jung, Souhwan Jung |
Forward Secure Password-Enabled PKI with Instant Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 54-67, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Anantharaman Lakshminarayanan, Tong-Lee Lim |
Augmented Certificate Revocation Lists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 87-98, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Andreas Schaad |
Revocation of Obligation and Authorisation Policy Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings, pp. 28-39, 2005, Springer, 3-540-28138-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
43 | Eun Young Choi, Hyun-Jeong Kim, Dong Hoon Lee 0001 |
Efficient Member Revocation in Group Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 195-205, 2005, Springer, 3-540-28224-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
43 | Yong Ho Hwang, Chong Hee Kim, Pil Joong Lee |
An Efficient Revocation Scheme for Stateless Receivers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 322-334, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Delia Critchlow, Ning Zhang 0001 |
Revocation invocation for accountable anonymous PKI certificate trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28 - July 1, 2004, Alexandria, Egypt, pp. 386-392, 2004, IEEE Computer Society, 0-7803-8623-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Vu Dong Tô, Reihaneh Safavi-Naini |
Linear Code Implies Public-Key Traitor Tracing with Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 24-35, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Donggang Liu, Peng Ning, Kun Sun 0001 |
Efficient self-healing group key distribution with revocation capability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 231-240, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
group key distribution, key management, self-healing |
43 | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano, David Jodra |
Evaluation of Revocation Systems with a JAVA Test-bed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic, pp. 450-454, 2003, IEEE Computer Society, 0-7695-1993-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
43 | Zewen Chen, Jilin Wang, Yumin Wang, Jiwu Huang, Daren Huang |
An Efficient Revocation Algorithm in Group Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 339-351, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
43 | Jose L. Muñoz, Jordi Forné, Juan C. Castro |
Evaluation of Certificate Revocation Policies: OCSP vs. Overissued-CRL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2-6 September 2002, Aix-en-Provence, France, pp. 511-518, 2002, IEEE Computer Society, 0-7695-1668-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
43 | Javier López 0001, Antonio Mana, Juan J. Ortega, José M. Troya |
Distributed Storage and Revocation in Digital Certificate Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 11th International Conference, DEXA 2000, London, UK, September 4-8, 2000, Proceedings, pp. 929-938, 2000, Springer, 3-540-67978-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
43 | Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi |
Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 103-117, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|