The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for revoking with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1983-2002 (15) 2003-2007 (16) 2008-2012 (15) 2013-2021 (15) 2022 (2)
Publication types (Num. hits)
article(27) inproceedings(36)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 52 occurrences of 37 keywords

Results
Found 63 publication records. Showing 63 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
83Aggelos Kiayias, Serdar Pehlivanoglu Tracing and Revoking Pirate Rebroadcasts. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
56Konstantinos Karasavvas Revoking Records in an Immutable Ledger: A Platform for Issuing and Revoking Official Documents on Public Blockchains. Search on Bibsonomy CVCBT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
46Bo Yang, Liu Dongsu, Yumin Wang An anonymity-revoking e-payment system with a smart card. Search on Bibsonomy Int. J. Digit. Libr. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF E-payment systems, Smart card, Anonymity revocation
37Dan Feng 0001, Lanxiang Chen, Lingfang Zeng, Zhongying Niu FPGA/ASIC based Cryptographic Object Store System. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Wynand van Staden, Martin S. Olivier SQL's revoke with a view on privacy. Search on Bibsonomy SAICSIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF compound purposes, purpose binding, privacy, access control, SQL
36Ivo Majetic, Ernst L. Leiss Authorization and Revocation in Object-Oriented Databases. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF revoking, bounded propagation of privileges, inheritance, Object-oriented systems, granting
28Shengmin Xu, Jianting Ning, Xinyi Huang 0001, Yingjiu Li, Guowen Xu Untouchable Once Revoking: A Practical and Secure Dynamic EHR Sharing System via Cloud. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Jongmin Lee, Jun-Yeon Lee, Taeweon Suh, Gunjae Koo CacheRewinder: Revoking Speculative Cache Updates Exploiting Write-Back Buffer. Search on Bibsonomy DATE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Rustam Galimullin, Thomas Ågotnes Dynamic Coalition Logic: Granting and Revoking Dictatorial Powers. Search on Bibsonomy LORI The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Chandrashekhar Meshram, Mohammad S. Obaidat, Kuei-Fang Hsiao, Agbotiname Lucky Imoize, Akshaykumar Meshram An Effective Fair Off-Line Electronic Cash Protocol using Extended Chaotic Maps with Anonymity Revoking Trustee. Search on Bibsonomy CCCI The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28László Viktor Jánoky, János Levendovszky, Péter Ekler An analysis on the revoking mechanisms for JSON Web Tokens. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Marcos A. Simplício Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Leonardo T. D. Ferraz, Marcos V. M. Silva A privacy-preserving method for temporarily linking/revoking pseudonym certificates in vehicular networks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
28Eugenia A. Politou, Efthimios Alepis, Constantinos Patsakis Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions. Search on Bibsonomy J. Cybersecur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Marcos Antonio Simplicio Junior, Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Leonardo T. D. Ferraz, Marcos Vinicius Maciel da Silva Privacy-Preserving Method for Temporarily Linking/Revoking Pseudonym Certificates in VANETs. Search on Bibsonomy TrustCom/BigDataSE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Christina F. Rusnock, Christopher D. Geiger Simulation-Based Evaluation of Adaptive Automation Revoking Strategies on Cognitive Workload and Situation Awareness. Search on Bibsonomy IEEE Trans. Hum. Mach. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Yalin Chen, Jue-Sam Chou On the Privacy of "User Efficient Recoverable Off-Line E-Cash Scheme with Fast Anonymity Revoking". Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2015 DBLP  BibTeX  RDF
28Shun Ye, Guodong (Gordon) Gao, Siva Viswanathan Strategic Behavior in Online Reputation Systems: Evidence from Revoking on eBay. Search on Bibsonomy MIS Q. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Yalin Chen, Jue-Sam Chou Crypto-analyses on "user efficient recoverable off-line e-cashs scheme with fast anonymity revoking". Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
28Hua Deng, Qianhong Wu, Bo Qin, Sherman S. M. Chow, Josep Domingo-Ferrer, Wenchang Shi Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Xingwen Zhao, Gaofei Zhao, Hui Li Generic Codes Based Traitor Tracing and Revoking Scheme from Attribute-Based Encryption. Search on Bibsonomy CIT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Paolo D'Arco, Angel L. Pérez del Pozo Toward tracing and revoking schemes secure against collusion and any form of secret information leakage. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Chun-I Fan, Vincent Shi-Ming Huang, Yao-Chun Yu User efficient recoverable off-line e-cash scheme with fast anonymity revoking. Search on Bibsonomy Math. Comput. Model. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Xingwen Zhao, Fangguo Zhang Tracing and revoking scheme for dynamic privileges against pirate rebroadcast. Search on Bibsonomy Comput. Secur. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Rohan Dutta Bargaining with revoking costs. Search on Bibsonomy Games Econ. Behav. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Xingwen Zhao, Hui Li 0006 Codes Based Tracing and Revoking Scheme with Constant Ciphertext. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Liam Curren, Jane Kaye Revoking consent: A 'blind spot' in data protection law? Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Shun Ye, Guodong (Gordon) Gao, Siva Viswanathan The Good, The Bad, or the Ugly? An Empirical Investigation of Revoking Behavior on eBay. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  BibTeX  RDF
28Stefan Brands, Liesje Demuynck, Bart De Decker A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung Scalable public-key tracing and revoking. Search on Bibsonomy Distributed Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Digital Content Distribution, Scalability, Multicast, Broadcast Encryption, Traitor Tracing
28Marshall T. Rose A Practice for Revoking Posting Rights to IETF Mailing Lists. Search on Bibsonomy RFC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung Scalable Public-Key Tracing and Revoking. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
28Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung Scalable public-key tracing and revoking. Search on Bibsonomy PODC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Digital Content Distribution, Scalability, Multicast, Broadcast Encryption, Traitor Tracing
28Jan Camenisch, Ueli M. Maurer, Markus Stadler Digital Payment Systems With Passive Anonymity-Revoking Trustees. Search on Bibsonomy J. Comput. Secur. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
28Jan Camenisch, Ueli M. Maurer, Markus Stadler Digital Payment Systems with Passive Anonymity-Revoking Trustees. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Digital payment systems, privacy, cryptography, anonymity revocation, electronic money
28David A. Goldberg 0002, Ali Orooji A symmetrical approach to granting and revoking access rights in database management systems. Search on Bibsonomy COMPSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
28Paolo Corsini, Graziano Frosini, Lanfranco Lopriore Distributing and Revoking Access Authorizations on Abstract Objects: A Capability Approach. Search on Bibsonomy Softw. Pract. Exp. The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
28James A. Larson Granting and revoking discretinary authority. Search on Bibsonomy Inf. Syst. The full citation details ... 1983 DBLP  DOI  BibTeX  RDF
18Gefei Zhang Aspect-oriented modeling of adaptive web applications with HiLA. Search on Bibsonomy MoMM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Hui Song, Sencun Zhu, Wensheng Zhang 0001, Guohong Cao Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sensor networks, key management, pairwise key, Least privilege, key revocation
18Toru Nakanishi 0001, Nobuo Funabiki A short anonymously revocable group signature scheme from decision linear assumption. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anonymity, group signature, revocation
18Norio Akagi, Yoshifumi Manabe, Tatsuaki Okamoto An Efficient Anonymous Credential System. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Zhiqiang Du, Kun Wang, Lihua Zhou Efficient Broadcast Authentication in Wireless Sensor Networks. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Tyler Moore 0001, Maxim Raya, Jolyon Clulow, Panagiotis Papadimitratos, Ross J. Anderson, Jean-Pierre Hubaux Fast Exclusion of Errant Devices from Vehicular Networks. Search on Bibsonomy SECON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18João Abreu, José Luiz Fiadeiro A Coordination Model for Service-Oriented Interactions. Search on Bibsonomy COORDINATION The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Xinxin Fan, Guang Gong Key revocation based on Dirichlet multinomial model for mobile ad hoc networks. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Tyler Moore 0001, Jolyon Clulow Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Rupeng Li, Xianghua Du, Guowen Li, Jia Yu 0005, Daxing Li Key-Insulated Group Signature Scheme with Selective Revocation. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Victoria Ungureanu Using certified policies to regulate E-commerce transactions. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Contract terms, Scalability, Enforcement
18Wensheng Zhang 0001, Hui Song, Sencun Zhu, Guohong Cao Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privilege, wireless sensor networks, mobile sinks
18Xiaoming Wang, Bin B. Zhu, Shipeng Li 0001 A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network. Search on Bibsonomy DRMTICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano Certificate revocation system implementation based on the Merkle hash tree. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Public-key infrastructure, Certificate revocation, Merkle hash tree
18Vincent A. Cicirello, Maxim Peysakhov, Gustave Anderson, Gaurav Naik, Kenneth Tsang, William C. Regli, Moshe Kam Designing Dependable Agent Systems for Mobile Wireless Networks. Search on Bibsonomy IEEE Intell. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18André Adelsbach, Jörg Schwenk Key-assignment strategies for CPPM. Search on Bibsonomy MM&Sec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF CPPM, device revocation, key-management, content protection, key-assignment
18Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Pierangela Samarati, Michael K. Reiter, Sushil Jajodia An authorization model for a public key management service. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF authorizations specification and enforcement, Access control, public key infrastructure
18Åsa Hagström, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera Revocations-A Classification. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Li Bai, Ramasubramaniam Achuthanandam, Moshe Kam Access Revocation and Prevention of False Repudiation in Secure Email Exchanges. Search on Bibsonomy ISADS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Wen-Guey Tzeng, Zhi-Jia Tzeng A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF revocation, broadcast encryption, traitor tracing
18Carl A. Gunter, Trevor Jim Generalized Certificate Revocation. Search on Bibsonomy POPL The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
18Takamichi Saito, Kentaro Umesawa, Hiroshi G. Okuno Privacy-Enhanced Access Control by SPKI and Its Application to Web Server. Search on Bibsonomy WETICE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
18William Aiello, Sachin Lodha, Rafail Ostrovsky Fast Digital Identity Revocation (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF signatures, public-key infrastructure, certificate revocation, digital identities, Certificate authority
18Vijayalakshmi Atluri, Wei-kuang Huang An Authorization Model for Workflows. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Security, Petri nets, Workflow, Authorization
Displaying result #1 - #63 of 63 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license