|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 16 occurrences of 14 keywords
|
|
|
Results
Found 10 publication records. Showing 10 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
38 | Mark W. Storer, Kevin M. Greenan, Ethan L. Miller, Kaladhar Voruganti |
POTSHARDS - a secure, recoverable, long-term archival storage system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Storage ![In: ACM Trans. Storage 5(2), pp. 5:1-5:35, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
approximate pointers, secret splitting, Archival storage |
38 | Yixin Jiang, Chuang Lin 0002, Xuemin Shen, Minghui Shi |
Mutual Authentication and Key Exchange Protocols with Anonymity Property for Roaming Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2005: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, 4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005, Proceedings, pp. 114-125, 2005, Springer, 3-540-25809-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
roaming service, secret-splitting, self-certified, authentication, anonymity, key exchange |
33 | Hao Li, Peishun Liu |
An Identification System Combined with Fingerprint and Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS (2) ![In: Interdisciplinary and Multidisciplinary Research in Computer Science, IEEE CS Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS|06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2, pp. 105-108, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Mark W. Storer, Kevin M. Greenan, Ethan L. Miller |
Long-term threats to secure archives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
StorageSS ![In: Proceedings of the 2006 ACM Workshop On Storage Security And Survivability, StorageSS 2006, Alexandria, VA, USA, October 30, 2006, pp. 9-16, 2006, ACM, 1-59593-552-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
secret splitting, cryptography, encryption, threat modeling, secure storage, archival storage, survivable storage |
19 | Chrysanthi Paschou, Oliver Johnson, Angela Doufexi, Ziming Zhu, Woon Hau Chin |
Increasing the Secrecy Gap in Quasi-Static Rayleigh Channels with Secret Splitting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM (Workshops) ![In: IEEE Globecom Workshops, GLOBECOM Workshops 2020, Virtual Event, Taiwan, December 7-11, 2020, pp. 1-7, 2020, IEEE, 978-1-7281-7307-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Andrew Po-Jung Ho |
A Secret Splitting Method for Assuring the Confidentiality of Electronic Records. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Research Advances in Database and Information Systems Security, IFIP WG 11.3 Thirteenth International Conference on Database Security, July 26-28, 1999, Seattle, Washington, USA, pp. 117-125, 1999, Kluwer, 0-7923-7848-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
12 | Sergej Zerr, Elena Demidova, Daniel Olmedilla, Wolfgang Nejdl, Marianne Winslett, Soumyadeb Mitra |
Zerber: r-confidential indexing for distributed documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: EDBT 2008, 11th International Conference on Extending Database Technology, Nantes, France, March 25-29, 2008, Proceedings, pp. 287-298, 2008, ACM, 978-1-59593-926-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons |
Concealing complex policies with hidden credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 146-157, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
privacy, authentication, secret sharing, identity based encryption, credentials, trust negotiation |
12 | Jukka Ylitalo, Jan Melén, Pekka Nikander, Vesa Torvinen |
Re-thinking Security in IP Based Micro-Mobility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings, pp. 318-329, 2004, Springer, 3-540-23208-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Hartmut Vogler, Axel Spriestersbach, Marie-Luise Moschgath |
Protecting Competitive Negotiation of Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 7th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '99), 20-22 December 1999, Cape Town, South Africa, Proceedings, pp. 145-150, 1999, IEEE Computer Society, 0-7695-0468-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #10 of 10 (100 per page; Change: )
|
|