The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for revoke with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-2000 (18) 2001-2003 (20) 2004-2005 (21) 2006 (15) 2007 (19) 2008-2009 (21) 2010-2016 (15) 2017-2022 (19) 2023-2024 (5)
Publication types (Num. hits)
article(32) incollection(2) inproceedings(119)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 168 occurrences of 104 keywords

Results
Found 153 publication records. Showing 153 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
86Lie Liu, Chun Yuan Trace and revoke systems with short ciphertexts. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF revoke, trace, broadcast encryption, ciphertext
83Aggelos Kiayias, Serdar Pehlivanoglu Pirate Evolution: How to Make the Most of Your Traitor Keys. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
83Elisa Bertino, Pierangela Samarati, Sushil Jajodia Authorizations in Relational Database Management Systems. Search on Bibsonomy CCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
81Sukhamay Kundu Deadlock-Free Distributed Relaxed Mutual-Exclusion Without Revoke-Messages. Search on Bibsonomy IWDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
67Hongxia Jin, Jeffery Lotspiech Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anti-piracy, broadcast encryption, traitor tracing, Content protection
54Dan Boneh, Brent Waters A fully collusion resistant broadcast, trace, and revoke system. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
54Yevgeniy Dodis, Nelly Fazio Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
54Moni Naor, Benny Pinkas Efficient Trace and Revoke Schemes. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF tracing traitors, self enforcement, copyright protection, broadcast encryption, blacklisting, User revocation
41Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
40Wynand van Staden, Martin S. Olivier SQL's revoke with a view on privacy. Search on Bibsonomy SAICSIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF compound purposes, purpose binding, privacy, access control, SQL
40Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Kenneth B. Russell, David Detlefs Eliminating synchronization-related atomic operations with biased locking and bulk rebiasing. Search on Bibsonomy OOPSLA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF rebias, revoke, Java, optimization, synchronization, monitor, atomic, lock, bias, reservation
28Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith PEREA: towards practical TTP-free revocation in anonymous authentication. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF non-membership proofs, privacy-enhanced revocation, subjective blacklisting, anonymous authentication
28Dennis Y. W. Liu, Joseph K. Liu, Yi Mu 0001, Willy Susilo, Duncan S. Wong Revocable Ring Signature. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anonymity, group signature, revocability, ring signature
28Feng Bao 0001, Robert H. Deng A New type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF e-commerce, traceability, blinding signatures, anonymity revocation
26Fucai Luo, Haiyan Wang 0009, Willy Susilo, Xingfu Yan, Xiaofan Zheng Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
26Juexiao Zhou, Haoyang Li, Xingyu Liao, Bin Zhang 0042, Wenjia He, Zhongxiao Li, Longxi Zhou, Xin Gao 0001 Audit to Forget: A Unified Method to Revoke Patients' Private Data in Intelligent Healthcare. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Qiuwei Zheng, Jun Zhao Trace-and-Revoke Quadratic Functional Encryption. Search on Bibsonomy ISC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Fariza Sabrina, Tony Sahama, Md. Mamunur Rashid 0001, Steven Gordon Empowering Patients to Delegate and Revoke Access to Blockchain-based Electronic Health Records. Search on Bibsonomy ACSW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Shweta Agrawal, Simran Kumari, Anshu Yadav, Shota Yamada 0001 Broadcast, Trace and Revoke with Optimal Parameters from Polynomial Hardness. Search on Bibsonomy EUROCRYPT (3) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Fucai Luo, Saif M. Al-Kuwari, Haiyan Wang 0009, Xingfu Yan Fully Collusion Resistant Trace-and-Revoke Functional Encryption for Arbitrary Identities. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
26Shweta Agrawal, Simran Kumari, Anshu Yadav, Shota Yamada 0001 Trace and Revoke with Optimal Parameters from Polynomial Hardness. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
26Ji Luo 0002 Ad Hoc (Decentralized) Broadcast, Trace, and Revoke. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
26Olivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan, Damien Stehlé An Anonymous Trace-and-Revoke Broadcast Encryption Scheme. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
26Fucai Luo, Saif M. Al-Kuwari, Haiyan Wang 0009, Weihong Han Generic Construction of Trace-and-Revoke Inner Product Functional Encryption. Search on Bibsonomy ESORICS (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Chien-Hung Liu, Chen-Tzung Liu, Hsiu-Hao Li Detecting Permission Crashes of Android Apps using Crawling and Revoke Operation Injections. Search on Bibsonomy APSEC Workshops The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Olivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan, Damien Stehlé An Anonymous Trace-and-Revoke Broadcast Encryption Scheme. Search on Bibsonomy ACISP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Mriganka Mandal, Ramprasad Sarkar, Junbeom Hur, Koji Nuida Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security. Search on Bibsonomy ISPEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Xuan Thanh Do, Duong Hieu Phan, Moti Yung A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
26Xuan Thanh Do, Duong Hieu Phan, Moti Yung A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes. Search on Bibsonomy ACNS (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Trevor Smith, Luke Dickenson, Kent E. Seamons Let's Revoke: Scalable Global Certificate Revocation. Search on Bibsonomy NDSS The full citation details ... 2020 DBLP  BibTeX  RDF
26Sam Kim, David J. Wu 0001 Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions. Search on Bibsonomy ASIACRYPT (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Sam Kim, David J. Wu 0001 Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
26Tobias Mueller, Marius Stübs, Hannes Federrath Let's Revoke! Mitigating Revocation Equivocation by re-purposing the Certificate Transparency Log. Search on Bibsonomy Open Identity Summit The full citation details ... 2019 DBLP  BibTeX  RDF
26Mriganka Mandal, Ratna Dutta Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption. Search on Bibsonomy Inscrypt The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Mehrnoosh Shakarami, Ravi S. Sandhu Refresh Instead of Revoke Enhances Safety and Availability: A Formal Analysis. Search on Bibsonomy DBSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Mriganka Mandal, Ratna Dutta Efficient Adaptively Secure Public-Key Trace and Revoke from Subset Cover Using Déjà Q Framework. Search on Bibsonomy Inscrypt The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehlé, Shota Yamada 0001 Efficient Public Trace and Revoke from Standard Assumptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
26Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehlé, Shota Yamada 0001 Efficient Public Trace and Revoke from Standard Assumptions: Extended Abstract. Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Willy Susilo, Rongmao Chen, Fuchun Guo, Guomin Yang, Yi Mu 0001, Yang-Wai Chow Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext. Search on Bibsonomy AsiaCCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Murat Ak, Serdar Pehlivanoglu, Ali Aydin Selçuk Anonymous trace and revoke. Search on Bibsonomy J. Comput. Appl. Math. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Dennis Hofheinz, Christoph Striecks A Generic View on Trace-and-Revoke Broadcast Encryption Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Hung Q. Ngo 0001, Duong Hieu Phan, David Pointcheval Black-Box Trace&Revoke Codes. Search on Bibsonomy Algorithmica The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Dennis Hofheinz, Christoph Striecks A generic view on trace-and-revoke broadcast encryption schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
26Duong Hieu Phan, Viet Cuong Trinh Key-Leakage Resilient Revoke Scheme Resisting Pirates 2.0 in Bounded Leakage Model. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Xingwen Zhao Amendment to Trace and Revoke Systems with Short Ciphertexts. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2012 DBLP  BibTeX  RDF
26Murat Ak, Aggelos Kiayias, Serdar Pehlivanoglu, Ali Aydin Selçuk Generic Construction of Trace and Revoke Schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
26Véronique Cortier, Graham Steel, Cyrille Wiedling Revoke and let live: a secure key revocation api for cryptographic devices. Search on Bibsonomy CCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26 Cascade Revoke. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Pierangela Samarati Recursive Revoke. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Jong Hwan Park, Hyun Sook Rhee, Dong Hoon Lee 0001 Fully collusion-resistant trace-and-revoke scheme in prime-order groups. Search on Bibsonomy J. Commun. Networks The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Duong Hieu Phan, Viet Cuong Trinh Identity-Based Trace and Revoke Schemes. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Moni Naor, Benny Pinkas Efficient trace and revoke schemes. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Hassan M. Elkamchouchi, Yasmine Abouelseoud A scalable trace and revoke scheme with security enhancements. Search on Bibsonomy CCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Dan Boneh, Brent Waters A Fully Collusion Resistant Broadcast, Trace, and Revoke System. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
26Dalit Naor, Moni Naor Protecting Cryptographic Keys: The Trace-and-Revoke Approach. Search on Bibsonomy Computer The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Yevgeniy Dodis, Nelly Fazio Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2003 DBLP  BibTeX  RDF
26Arnon Rosenthal, Edward Sciore Extending SQL's Grant and Revoke Operations, to Limit and Reactivate Privileges. Search on Bibsonomy DBSec The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
14Shucheng Yu, Cong Wang 0001, Kui Ren 0001, Wenjing Lou Attribute based data sharing with attribute revocation. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF revocation, attribute based encryption, proxy re-encryption
14Steffen Reidt, Mudhakar Srivatsa, Shane Balfe The fable of the bees: incentivizing robust revocation decision making in ad hoc networks. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF bees, partially available, suicide, trust authority, game, incentive, revocation, reward
14Florin Constantin, Jon Feldman, S. Muthukrishnan 0001, Martin Pál An online mechanism for ad slot reservations with cancellations. Search on Bibsonomy SODA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Aggelos Kiayias, Serdar Pehlivanoglu Tracing and Revoking Pirate Rebroadcasts. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Jun-Won Ho Zone-Based Trust Management in Sensor Networks. Search on Bibsonomy PerCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Jun-Won Ho, Donggang Liu, Matthew K. Wright, Sajal K. Das 0001 Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks. Search on Bibsonomy PerCom Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Stefan Katzenbeisser 0001, Klaus Kursawe, Frederic Stumpf Revocation of TPM Keys. Search on Bibsonomy TRUST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Luis Carlos Coronado García, Carlos Hernández-López, Carlos Pérez Leguízamo Autonomous Decentralized Root Certification Authority System. Search on Bibsonomy ICDCS Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Daisuke Mashima, Mustaque Ahamad, Swagath Kannan User-Centric Handling of Identity Agent Compromise. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Alper Kanak, Ibrahim Sogukpinar Classification Based Revocable Biometric Identity Code Generation. Search on Bibsonomy COST 2101/2102 Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Xuebing Zhou, Stephen D. Wolthusen, Christoph Busch 0001, Arjan Kuijper A Security Analysis of Biometric Template Protection Schemes. Search on Bibsonomy ICIAR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Biometric encryption, biometric template protection, correlation, attacks, security analysis
14Katharine Chang, Kang G. Shin Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Distributed authentication, node revocation, program integrity verification, wireless sensor networks
14Alexandra Boldyreva, Vipul Goyal, Virendra Kumar Identity-based encryption with efficient revocation. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF provable security, revocation, identity-based encryption
14Kenneth P. Laberteaux, Jason J. Haas, Yih-Chun Hu Security certificate revocation list distribution for vanet. Search on Bibsonomy Vehicular Ad Hoc Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, simulation, vanet, revocation, crl
14Linchun Li, Jianhua Li 0001, Yue Wu 0010, Ping Yi A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor Networks. Search on Bibsonomy PerCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF loss tolerance, authentication, revocation, group key management, node compromise
14Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai Ternary Subset Difference Method and Its Quantitative Analysis. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Subset Difference Method, Ternary Tree, Broadcast Encryption
14Shinsaku Kiyomoto, Toshiaki Tanaka Anonymous attribute authentication scheme using self-blindable certificates. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14David Lubicz, Thomas Sirvent Attribute-Based Broadcast Encryption Scheme Made Efficient. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Public-key broadcast encryption, Generic model of groups with pairing, Attribute-based encryption
14Masakazu Maruoka, Alireza Goudarzi Nemati, Valbona Barolli, Tomoya Enokido, Makoto Takizawa 0001 Making Societies in Peer-to-Peer (P2P) Overlay Networks. Search on Bibsonomy CISIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptography, digital signature, information security
14Jian Weng 0001, Shengli Liu 0001, Kefei Chen Pirate decoder for the broadcast encryption schemes from Crypto 2005. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pirate decoder, broadcast encryption, traitor tracing
14Ulrich Kühn 0001, Marcel Selhorst, Christian Stüble Realizing property-based attestation and sealing with commonly available hard- and software. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF property-based attestation, property-based sealing, trusted computing
14Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith Blacklistable anonymous credentials: blocking misbehaving users without ttps. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anonymous blacklisting, user misbehavior, privacy, revocation, anonymous authentication
14Jun Furukawa 0001, Nuttapong Attrapadung Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys. Search on Bibsonomy ICALP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fully Collusion Resistant, Revocation, Traitor Tracing, Black-Box
14Ernie Brickell, Jiangtao Li 0001 Enhanced privacy id: a direct anonymous attestation scheme with enhanced revocation capabilities. Search on Bibsonomy WPES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy, anonymity, cryptographic protocols, trusted computing
14Cécile Delerablée, Pascal Paillier, David Pointcheval Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Philip Zigoris, Hongxia Jin Bayesian Methods for Practical Traitor Tracing. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Heath A. James, Kenneth A. Hawick, Chris Scogings User-friendly scheduling tools for large-scale simulation experiments. Search on Bibsonomy WSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Wenyuan Liu, Feng Tong, Yongan Luo, Feng Zhang A proxy blind signature scheme based on elliptic curve with proxy revocation. Search on Bibsonomy SNPD (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Sébastien Canard, Aline Gouget Divisible E-Cash Systems Can Be Truly Anonymous. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Chun-I Fan, Vincent Shi-Ming Huang Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fair Privacy, Ubiquitous Computing, Cryptography, Anonymity, Mobile Networks, Mutual Authentication
14Yawen Wei, Zhen Yu, Yong Guan Location Verification Algorithms forWireless Sensor Networks. Search on Bibsonomy ICDCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Ratna Dutta, Sourav Mukhopadhyay Designing Scalable Self-healing Key Distribution Schemes with Revocation Capability. Search on Bibsonomy ISPA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF session key distribution, self-healing, revocation, rekeying
14Dmitrij Lagutin, Hannu H. Kari Controlling Incoming Connections Using Certificates and Distributed Hash Tables. Search on Bibsonomy NEW2AN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF rights delegation, DoS countermeasures, certificates, Session management, rights management
14Noam Kogan, Tamir Tassa Improved efficiency for revocation schemes via Newton interpolation. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Newton interpolation, secret sharing, broadcast encryption, User revocation
14Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich How to win the clonewars: efficient periodic n-times anonymous authentication. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF n-anonymous authentication, credentials, clone detection
14Martin Schaffer, Peter Schartner Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Joachim Biskup, Joerg Parthe Optimistic Anonymous Participation in Inter-organizational Workflow Instances. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Man Ho Au, Willy Susilo, Siu-Ming Yiu Event-Oriented k-Times Revocable-iff-Linked Group Signatures. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla SCUBA: Secure Code Update By Attestation in sensor networks. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF externally-verifiable code execution, secure code update, self-checksumming code, software-based attestation
14Ling Dong, Kefei Chen A Practical Clumped-Tree Multicast Encryption Scheme. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Man Ho Au, Willy Susilo, Yi Mu 0001 Constant-Size Dynamic k-TAA. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 153 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license