|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 16 occurrences of 14 keywords
|
|
|
Results
Found 10 publication records. Showing 10 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
38 | Mark W. Storer, Kevin M. Greenan, Ethan L. Miller, Kaladhar Voruganti |
POTSHARDS - a secure, recoverable, long-term archival storage system. |
ACM Trans. Storage |
2009 |
DBLP DOI BibTeX RDF |
approximate pointers, secret splitting, Archival storage |
38 | Yixin Jiang, Chuang Lin 0002, Xuemin Shen, Minghui Shi |
Mutual Authentication and Key Exchange Protocols with Anonymity Property for Roaming Services. |
NETWORKING |
2005 |
DBLP DOI BibTeX RDF |
roaming service, secret-splitting, self-certified, authentication, anonymity, key exchange |
33 | Hao Li, Peishun Liu |
An Identification System Combined with Fingerprint and Cryptography. |
IMSCCS (2) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Mark W. Storer, Kevin M. Greenan, Ethan L. Miller |
Long-term threats to secure archives. |
StorageSS |
2006 |
DBLP DOI BibTeX RDF |
secret splitting, cryptography, encryption, threat modeling, secure storage, archival storage, survivable storage |
19 | Chrysanthi Paschou, Oliver Johnson, Angela Doufexi, Ziming Zhu, Woon Hau Chin |
Increasing the Secrecy Gap in Quasi-Static Rayleigh Channels with Secret Splitting. |
GLOBECOM (Workshops) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Andrew Po-Jung Ho |
A Secret Splitting Method for Assuring the Confidentiality of Electronic Records. |
DBSec |
1999 |
DBLP BibTeX RDF |
|
12 | Sergej Zerr, Elena Demidova, Daniel Olmedilla, Wolfgang Nejdl, Marianne Winslett, Soumyadeb Mitra |
Zerber: r-confidential indexing for distributed documents. |
EDBT |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons |
Concealing complex policies with hidden credentials. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
privacy, authentication, secret sharing, identity based encryption, credentials, trust negotiation |
12 | Jukka Ylitalo, Jan Melén, Pekka Nikander, Vesa Torvinen |
Re-thinking Security in IP Based Micro-Mobility. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Hartmut Vogler, Axel Spriestersbach, Marie-Luise Moschgath |
Protecting Competitive Negotiation of Mobile Agents. |
FTDCS |
1999 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #10 of 10 (100 per page; Change: )
|
|