Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
83 | Aggelos Kiayias, Serdar Pehlivanoglu |
Tracing and Revoking Pirate Rebroadcasts. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
56 | Konstantinos Karasavvas |
Revoking Records in an Immutable Ledger: A Platform for Issuing and Revoking Official Documents on Public Blockchains. |
CVCBT |
2018 |
DBLP DOI BibTeX RDF |
|
46 | Bo Yang, Liu Dongsu, Yumin Wang |
An anonymity-revoking e-payment system with a smart card. |
Int. J. Digit. Libr. |
2002 |
DBLP DOI BibTeX RDF |
E-payment systems, Smart card, Anonymity revocation |
37 | Dan Feng 0001, Lanxiang Chen, Lingfang Zeng, Zhongying Niu |
FPGA/ASIC based Cryptographic Object Store System. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Wynand van Staden, Martin S. Olivier |
SQL's revoke with a view on privacy. |
SAICSIT |
2007 |
DBLP DOI BibTeX RDF |
compound purposes, purpose binding, privacy, access control, SQL |
36 | Ivo Majetic, Ernst L. Leiss |
Authorization and Revocation in Object-Oriented Databases. |
IEEE Trans. Knowl. Data Eng. |
1997 |
DBLP DOI BibTeX RDF |
revoking, bounded propagation of privileges, inheritance, Object-oriented systems, granting |
28 | Shengmin Xu, Jianting Ning, Xinyi Huang 0001, Yingjiu Li, Guowen Xu |
Untouchable Once Revoking: A Practical and Secure Dynamic EHR Sharing System via Cloud. |
IEEE Trans. Dependable Secur. Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Jongmin Lee, Jun-Yeon Lee, Taeweon Suh, Gunjae Koo |
CacheRewinder: Revoking Speculative Cache Updates Exploiting Write-Back Buffer. |
DATE |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Rustam Galimullin, Thomas Ågotnes |
Dynamic Coalition Logic: Granting and Revoking Dictatorial Powers. |
LORI |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Chandrashekhar Meshram, Mohammad S. Obaidat, Kuei-Fang Hsiao, Agbotiname Lucky Imoize, Akshaykumar Meshram |
An Effective Fair Off-Line Electronic Cash Protocol using Extended Chaotic Maps with Anonymity Revoking Trustee. |
CCCI |
2021 |
DBLP DOI BibTeX RDF |
|
28 | László Viktor Jánoky, János Levendovszky, Péter Ekler |
An analysis on the revoking mechanisms for JSON Web Tokens. |
Int. J. Distributed Sens. Networks |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Marcos A. Simplício Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Leonardo T. D. Ferraz, Marcos V. M. Silva |
A privacy-preserving method for temporarily linking/revoking pseudonym certificates in vehicular networks. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
28 | Eugenia A. Politou, Efthimios Alepis, Constantinos Patsakis |
Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions. |
J. Cybersecur. |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Marcos Antonio Simplicio Junior, Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Leonardo T. D. Ferraz, Marcos Vinicius Maciel da Silva |
Privacy-Preserving Method for Temporarily Linking/Revoking Pseudonym Certificates in VANETs. |
TrustCom/BigDataSE |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Christina F. Rusnock, Christopher D. Geiger |
Simulation-Based Evaluation of Adaptive Automation Revoking Strategies on Cognitive Workload and Situation Awareness. |
IEEE Trans. Hum. Mach. Syst. |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Yalin Chen, Jue-Sam Chou |
On the Privacy of "User Efficient Recoverable Off-Line E-Cash Scheme with Fast Anonymity Revoking". |
Int. J. Netw. Secur. |
2015 |
DBLP BibTeX RDF |
|
28 | Shun Ye, Guodong (Gordon) Gao, Siva Viswanathan |
Strategic Behavior in Online Reputation Systems: Evidence from Revoking on eBay. |
MIS Q. |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Yalin Chen, Jue-Sam Chou |
Crypto-analyses on "user efficient recoverable off-line e-cashs scheme with fast anonymity revoking". |
IACR Cryptol. ePrint Arch. |
2014 |
DBLP BibTeX RDF |
|
28 | Hua Deng, Qianhong Wu, Bo Qin, Sherman S. M. Chow, Josep Domingo-Ferrer, Wenchang Shi |
Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data. |
AsiaCCS |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Xingwen Zhao, Gaofei Zhao, Hui Li |
Generic Codes Based Traitor Tracing and Revoking Scheme from Attribute-Based Encryption. |
CIT |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Paolo D'Arco, Angel L. Pérez del Pozo |
Toward tracing and revoking schemes secure against collusion and any form of secret information leakage. |
Int. J. Inf. Sec. |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Chun-I Fan, Vincent Shi-Ming Huang, Yao-Chun Yu |
User efficient recoverable off-line e-cash scheme with fast anonymity revoking. |
Math. Comput. Model. |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Xingwen Zhao, Fangguo Zhang |
Tracing and revoking scheme for dynamic privileges against pirate rebroadcast. |
Comput. Secur. |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Rohan Dutta |
Bargaining with revoking costs. |
Games Econ. Behav. |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Xingwen Zhao, Hui Li 0006 |
Codes Based Tracing and Revoking Scheme with Constant Ciphertext. |
ProvSec |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith |
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs. |
ACM Trans. Inf. Syst. Secur. |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Liam Curren, Jane Kaye |
Revoking consent: A 'blind spot' in data protection law? |
Comput. Law Secur. Rev. |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Shun Ye, Guodong (Gordon) Gao, Siva Viswanathan |
The Good, The Bad, or the Ugly? An Empirical Investigation of Revoking Behavior on eBay. |
ICIS |
2009 |
DBLP BibTeX RDF |
|
28 | Stefan Brands, Liesje Demuynck, Bart De Decker |
A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung |
Scalable public-key tracing and revoking. |
Distributed Comput. |
2005 |
DBLP DOI BibTeX RDF |
Digital Content Distribution, Scalability, Multicast, Broadcast Encryption, Traitor Tracing |
28 | Marshall T. Rose |
A Practice for Revoking Posting Rights to IETF Mailing Lists. |
RFC |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung |
Scalable Public-Key Tracing and Revoking. |
IACR Cryptol. ePrint Arch. |
2004 |
DBLP BibTeX RDF |
|
28 | Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung |
Scalable public-key tracing and revoking. |
PODC |
2003 |
DBLP DOI BibTeX RDF |
Digital Content Distribution, Scalability, Multicast, Broadcast Encryption, Traitor Tracing |
28 | Jan Camenisch, Ueli M. Maurer, Markus Stadler |
Digital Payment Systems With Passive Anonymity-Revoking Trustees. |
J. Comput. Secur. |
1997 |
DBLP DOI BibTeX RDF |
|
28 | Jan Camenisch, Ueli M. Maurer, Markus Stadler |
Digital Payment Systems with Passive Anonymity-Revoking Trustees. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
Digital payment systems, privacy, cryptography, anonymity revocation, electronic money |
28 | David A. Goldberg 0002, Ali Orooji |
A symmetrical approach to granting and revoking access rights in database management systems. |
COMPSAC |
1990 |
DBLP DOI BibTeX RDF |
|
28 | Paolo Corsini, Graziano Frosini, Lanfranco Lopriore |
Distributing and Revoking Access Authorizations on Abstract Objects: A Capability Approach. |
Softw. Pract. Exp. |
1984 |
DBLP DOI BibTeX RDF |
|
28 | James A. Larson |
Granting and revoking discretinary authority. |
Inf. Syst. |
1983 |
DBLP DOI BibTeX RDF |
|
18 | Gefei Zhang |
Aspect-oriented modeling of adaptive web applications with HiLA. |
MoMM |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Hui Song, Sencun Zhu, Wensheng Zhang 0001, Guohong Cao |
Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks. |
ACM Trans. Sens. Networks |
2008 |
DBLP DOI BibTeX RDF |
sensor networks, key management, pairwise key, Least privilege, key revocation |
18 | Toru Nakanishi 0001, Nobuo Funabiki |
A short anonymously revocable group signature scheme from decision linear assumption. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
anonymity, group signature, revocation |
18 | Norio Akagi, Yoshifumi Manabe, Tatsuaki Okamoto |
An Efficient Anonymous Credential System. |
Financial Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Zhiqiang Du, Kun Wang, Lihua Zhou |
Efficient Broadcast Authentication in Wireless Sensor Networks. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Tyler Moore 0001, Maxim Raya, Jolyon Clulow, Panagiotis Papadimitratos, Ross J. Anderson, Jean-Pierre Hubaux |
Fast Exclusion of Errant Devices from Vehicular Networks. |
SECON |
2008 |
DBLP DOI BibTeX RDF |
|
18 | João Abreu, José Luiz Fiadeiro |
A Coordination Model for Service-Oriented Interactions. |
COORDINATION |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Xinxin Fan, Guang Gong |
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks. |
LCN |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Tyler Moore 0001, Jolyon Clulow |
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Rupeng Li, Xianghua Du, Guowen Li, Jia Yu 0005, Daxing Li |
Key-Insulated Group Signature Scheme with Selective Revocation. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Victoria Ungureanu |
Using certified policies to regulate E-commerce transactions. |
ACM Trans. Internet Techn. |
2005 |
DBLP DOI BibTeX RDF |
Contract terms, Scalability, Enforcement |
18 | Wensheng Zhang 0001, Hui Song, Sencun Zhu, Guohong Cao |
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. |
MobiHoc |
2005 |
DBLP DOI BibTeX RDF |
privilege, wireless sensor networks, mobile sinks |
18 | Xiaoming Wang, Bin B. Zhu, Shipeng Li 0001 |
A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano |
Certificate revocation system implementation based on the Merkle hash tree. |
Int. J. Inf. Sec. |
2004 |
DBLP DOI BibTeX RDF |
Public-key infrastructure, Certificate revocation, Merkle hash tree |
18 | Vincent A. Cicirello, Maxim Peysakhov, Gustave Anderson, Gaurav Naik, Kenneth Tsang, William C. Regli, Moshe Kam |
Designing Dependable Agent Systems for Mobile Wireless Networks. |
IEEE Intell. Syst. |
2004 |
DBLP DOI BibTeX RDF |
|
18 | André Adelsbach, Jörg Schwenk |
Key-assignment strategies for CPPM. |
MM&Sec |
2004 |
DBLP DOI BibTeX RDF |
CPPM, device revocation, key-management, content protection, key-assignment |
18 | Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum |
A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System. |
ISCC |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Pierangela Samarati, Michael K. Reiter, Sushil Jajodia |
An authorization model for a public key management service. |
ACM Trans. Inf. Syst. Secur. |
2001 |
DBLP DOI BibTeX RDF |
authorizations specification and enforcement, Access control, public key infrastructure |
18 | Åsa Hagström, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera |
Revocations-A Classification. |
CSFW |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Li Bai, Ramasubramaniam Achuthanandam, Moshe Kam |
Access Revocation and Prevention of False Repudiation in Secure Email Exchanges. |
ISADS |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Wen-Guey Tzeng, Zhi-Jia Tzeng |
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
revocation, broadcast encryption, traitor tracing |
18 | Carl A. Gunter, Trevor Jim |
Generalized Certificate Revocation. |
POPL |
2000 |
DBLP DOI BibTeX RDF |
|
18 | Takamichi Saito, Kentaro Umesawa, Hiroshi G. Okuno |
Privacy-Enhanced Access Control by SPKI and Its Application to Web Server. |
WETICE |
2000 |
DBLP DOI BibTeX RDF |
|
18 | William Aiello, Sachin Lodha, Rafail Ostrovsky |
Fast Digital Identity Revocation (Extended Abstract). |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
signatures, public-key infrastructure, certificate revocation, digital identities, Certificate authority |
18 | Vijayalakshmi Atluri, Wei-kuang Huang |
An Authorization Model for Workflows. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
Security, Petri nets, Workflow, Authorization |