The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Credential with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1985-2000 (15) 2001-2002 (29) 2003 (20) 2004 (34) 2005 (37) 2006 (49) 2007 (39) 2008 (47) 2009 (41) 2010 (24) 2011 (16) 2012-2013 (30) 2014 (16) 2015 (16) 2016 (18) 2017-2018 (24) 2019 (19) 2020 (24) 2021 (23) 2022 (35) 2023 (35) 2024 (6)
Publication types (Num. hits)
article(164) incollection(4) inproceedings(423) phdthesis(6)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 411 occurrences of 203 keywords

Results
Found 597 publication records. Showing 597 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Xianhui Lu, Bao Li 0001, Qixiang Mei, Haixia Xu 0002 Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Christopher Kunz, Nina Tahmasebi, Thomas Risse 0001, Matthew Smith 0001 Detecting Credential Abuse in the Grid Using Bayesian Networks. Search on Bibsonomy GRID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Yevgeniy Vahlis Cryptography: Leakage Resilience, Black Box Separations, and Credential-free Key Exchange. Search on Bibsonomy 2011   RDF
18Francesco Tusa, Massimo Villari, Antonio Puliafito Credential Management Enforcement and Secure Data Storage in gLite. Search on Bibsonomy Int. J. Distributed Syst. Technol. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Yajun Jiang, Bo Yang 0003, Mingwu Zhang A Classified Credential Selection Scheme with Disclosure-minimizing Privacy. Search on Bibsonomy J. Digit. Content Technol. its Appl. The full citation details ... 2010 DBLP  BibTeX  RDF
18Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Hideki Imai Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Jan Camenisch, Nathalie Casati, Thomas Gross 0001, Victor Shoup Credential Authenticated Identification and Key Exchange. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
18Sven Bugiel, Jan-Erik Ekberg Implementing an application-specific credential platform using late-launched mobile trusted module. Search on Bibsonomy STC@CCS The full citation details ... 2010 DBLP  BibTeX  RDF
18Ali Nasrat Haidar, Stefan J. Zasada, Peter V. Coveney, Ali E. Abdallah, Bruce Beckles Audited credential delegation - a user-centric identity management solution for computational grid environments. Search on Bibsonomy IAS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Moritz Y. Becker Information Flow in Credential Systems. Search on Bibsonomy CSF The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Lujo Bauer, Limin Jia 0001, Divya Sharma Constraining Credential Usage in Logic-Based Access Control. Search on Bibsonomy CSF The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Access control, Logic, Computer security, Formal languages
18Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Gregory Neven, Stefano Paraboschi, Franz-Stefan Preiss, Pierangela Samarati, Mario Verdicchio Enabling Privacy-preserving Credential-based Access Control with XACML and SAML. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF privacy, Access control, XACML, SAML, anonymous credentials
18Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Pierangela Samarati Supporting privacy preferences in credential-based interactions. Search on Bibsonomy WPES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Yarema Varetskyy, Bogdan Rusyn, Agnieszka Molga, Anatoliy Ignatovych A New Method of Fingerprint Key Protection of Grid Credential. Search on Bibsonomy IP&C The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Aashish Sharma, Zbigniew Kalbarczyk, Ravishankar K. Iyer, James Barlow Analysis of Credential Stealing Attacks in an Open Networked Environment. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Jonathan Hart, Konstantinos Markantonakis, Keith Mayes Website Credential Storage and Two-Factor Web Authentication with a Java SIM. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Atsuko Miyaji, Mohammad Shahriar Rahman, Masakazu Soshi Hidden Credential Retrieval without Random Oracles. Search on Bibsonomy WISA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Pierangela Samarati Minimizing Disclosure of Private Information in Credential-based Interactions: A Graph-based Approach. Search on Bibsonomy SocialCom/PASSAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Kari Kostiainen, N. Asokan, Jan-Erik Ekberg Credential Disabling from Trusted Execution Environments. Search on Bibsonomy NordSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Jorge Guajardo, Bart Mennink, Berry Schoenmakers Anonymous Credential Schemes with Encrypted Attributes. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Jan Camenisch, Nathalie Casati, Thomas Gross 0001, Victor Shoup Credential Authenticated Identification and Key Exchange. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Krzysztof Sacha Credential Chain Discovery in RTT Trust Management Language. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18 Credential Hardening. Search on Bibsonomy Encyclopedia of Biometrics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Christian Tchepnda, Hassnaa Moustafa, Houda Labiod, Gilles Bourdon On Analyzing the Potential of a Layer-2 Multi-hop Authentication and Credential Delivery Scheme for Vehicular Communications. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18A. Damodaram, H. Jayasri Authentication Without Identification using Anonymous Credential System Search on Bibsonomy CoRR The full citation details ... 2009 DBLP  BibTeX  RDF
18Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
18Nick Bartlow, Bojan Cukic Keystroke Dynamics-Based Credential Hardening Systems. Search on Bibsonomy Handbook of Remote Biometrics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Xavier Boyen Hidden credential retrieval from a reusable password. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF online authentication, partially trusted servers, reusable passwords, stateless roaming credentials
18Moritz Y. Becker, Jason F. Mackay, Blair Dillaway Abductive Authorization Credential Gathering. Search on Bibsonomy POLICY The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Marcel Henseler, Michael Rossberg, Guenter Schaefer Credential Management for Automatic Identification Solutions in Supply Chain Management. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18SeongHan Shin, Kazukuni Kobara, Hideki Imai A Secure Authenticated Key Exchange Protocol for Credential Services. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Erman Ayday, Faramarz Fekri Using node accountability in credential based routing for mobile ad-hoc networks. Search on Bibsonomy MASS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Tao Jiang 0004, John S. Baras Trust Credential Distribution in Autonomic Networks. Search on Bibsonomy GLOBECOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Christian Tchepnda, Hassnaa Moustafa, Houda Labiod, Gilles Bourdon A Layer-2 Multi-Hop Authentication and Credential Delivery Scheme for Vehicular Networks. Search on Bibsonomy GLOBECOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Hristo Koshutanski, Antonio Maña A Semantic Approach to Access Control and Automated Credential Negotiation for Decentralized Online Repositories / An OKKAM Project Use Case. Search on Bibsonomy SWAP The full citation details ... 2008 DBLP  BibTeX  RDF
18Mohammad Mannan, Paul C. van Oorschot Localization of credential information to address increasingly inevitable data breaches. Search on Bibsonomy NSPW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Raghav Bhaskar, K. Chandrasekaran 0003, Satyanarayana V. Lokam, Peter L. Montgomery, Ramarathnam Venkatesan, Yacov Yacobi Vulnerabilities in Anonymous Credential Systems. Search on Bibsonomy STM@ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Konstantina Stoupa, Athena Vakali Clustering subjects in a credential-based access control framework. Search on Bibsonomy Comput. Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Javed I. Khan, Kailas B. Bobade, Manas Hardas Intra-federation credential negotiation based on individualized release strategy. Search on Bibsonomy Communications, Internet, and Information Technology The full citation details ... 2007 DBLP  BibTeX  RDF
18Gabriel López Millán, Óscar Cánovas Reverte, Diego R. López, Antonio Fernandez Gómez-Skarmeta Extending the Common Services of eduGAIN with a Credential Conversion Service. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Lanxiang Chen, Dan Feng An Efficient Credential-Based Scheme for Cross-Domain File Sharing. Search on Bibsonomy CIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Ajith Kamath, Ramiro Liscano, Abdulmotaleb El-Saddik User-credential based role mapping in multi-domain environment. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Jim Basney, Marty Humphrey, Von Welch The MyProxy online credential repository. Search on Bibsonomy Softw. Pract. Exp. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Hristo Koshutanski, Fabio Massacci Interactive Credential Negotiation for Stateful Business Processes. Search on Bibsonomy iTrust The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Jacek Jonczy, Rolf Haenni Credential Networks: a General Model for Distributed Trust and Authenticity Management. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
18Dale Gustafson, Mike Just, Magnus Nyström Securely Available Credentials (SACRED) - Credential Server Framework. Search on Bibsonomy RFC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Andreas Pashalidis, Chris J. Mitchell A Security Model for Anonymous Credential Systems. Search on Bibsonomy International Information Security Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Stig Fr. Mjølsnes, Chunming Rong On-Line E-Wallet System with Decentralized Credential Keepers. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2003 DBLP  BibTeX  RDF
18Ninghui Li, William H. Winsborough, John C. Mitchell Distributed Credential Chain Discovery in Trust Management. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Pierangela Samarati Towards Flexible Credential Negotiation Protocols (Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati Towards Flexible Credential Negotiation Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Theodoros Balopoulos, Stefanos Gritzalis Towards a Logic of Privacy-Preserving Selective Disclosure Credential Protocols. Search on Bibsonomy DEXA Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Jason E. Holt, Kent E. Seamons Selective disclosure credential sets. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2002 DBLP  BibTeX  RDF
18Joachim Biskup Credential-basierte Zugriffskontrolle: Wurzeln und ein Ausblick. Search on Bibsonomy GI Jahrestagung The full citation details ... 2002 DBLP  BibTeX  RDF
18Pierangela Samarati Enriching Access Control to Support Credential-Based Specificatons. Search on Bibsonomy GI Jahrestagung The full citation details ... 2002 DBLP  BibTeX  RDF
18Pierangela Samarati Enriching Access Control to Support Credential-Based Specifications. Search on Bibsonomy GI Jahrestagung The full citation details ... 2002 DBLP  BibTeX  RDF
18Olga Kornievskaia, Peter Honeyman, Bill Doster, Kevin Coffman Kerberized Credential Translation: A Solution to Web Access Control. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2001 DBLP  BibTeX  RDF
18Jason Novotny, Steven Tuecke, Von Welch An Online Credential Repository for the Grid: MyProxy. Search on Bibsonomy HPDC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Yücel Karabulut Credential Management for Secure Mediators. Search on Bibsonomy Grundlagen von Datenbanken The full citation details ... 1999 DBLP  BibTeX  RDF
18Detlef Hühnlein Credential Management and Secure Single Login for SPKM. Search on Bibsonomy NDSS The full citation details ... 1998 DBLP  BibTeX  RDF
18Kent E. Seamons, William H. Winsborough, Marianne Winslett Internet Credential Acceptance Policies. Search on Bibsonomy APPIA-GULP-PRODE The full citation details ... 1997 DBLP  BibTeX  RDF
11Jan Camenisch, Sebastian Mödersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer A card requirements language enabling privacy-preserving access control. Search on Bibsonomy SACMAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF privacy, access control, policy languages, anonymous credentials, digital credentials
11Gregory Neven Privacy-enhanced access control in primelife. Search on Bibsonomy Digital Identity Management The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
11Hristo Koshutanski, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori Enhancing grid security by fine-grained behavioral control and negotiation-based authorization. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Access control, Authorization, Trust negotiation, Grid security, Behavioral control
11Ke Chen 0005, Kai Hwang 0001, Gang Chen 0001 Heuristic Discovery of Role-Based Trust Chains in Peer-to-Peer Networks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Emerson Ribeiro de Mello, Michelle S. Wangham, Joni da Silva Fraga, Edson Tavares de Camargo, Davi da Silva Böger A Model for Authentication Credentials Translation in Service Oriented Architecture. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, Web Services, Single Sign-on
11Kari Kostiainen, Jan-Erik Ekberg, N. Asokan, Aarne Rantala On-board credentials with open provisioning. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF provisioning protocols, trusted computing, credentials, secure hardware
11Sherman S. M. Chow Real Traceable Signatures. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF efficient tracing, anonymity management, group signatures, standard model, bilinear groups, traceable signatures
11Virginia N. L. Franqueira, Raul H. C. Lopes, Pascal van Eck Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hypergraph, attack graph, vulnerability assessment, network attack
11Janani C. Sriram, Minho Shin, Tanzeem Choudhury, David Kotz Activity-aware ECG-based patient authentication for remote health monitoring. Search on Bibsonomy ICMI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, mobile computing, biometrics, ECG
11Bo Wang, Ruizhong Wei Zero-knowledge trust negotiation. Search on Bibsonomy CSCWD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Adam J. Lee, Ting Yu 0001 Towards a dynamic and composable model of trust. Search on Bibsonomy SACMAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF trust, policy, reputation, credentials
11Akiko Orita, Hisakazu Hada Is that really you?: an approach to assure identity without revealing real-name online. Search on Bibsonomy Digital Identity Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anonymity, identity, twitter, identity theft, linkability, impersonation
11Ueli M. Maurer Unifying Zero-Knowledge Proofs of Knowledge. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Sarbari Gupta Personal identity verification (PIV) cards as federated identities: challenges and opportunities. Search on Bibsonomy IDtrust The full citation details ... 2009 DBLP  DOI  BibTeX  RDF federal bridge certification authority, authentication, authorization, smart cards, PKI, assurance
11Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham Randomizable Proofs and Delegatable Anonymous Credentials. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Siani Pearson, Marco Casassa Mont, Manny Novoa Securing Information Transfer in Distributed Computing Environments. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Jan-Erik Ekberg, N. Asokan, Kari Kostiainen, Aarne Rantala Scheduling execution of credentials in constrained secure environments. Search on Bibsonomy STC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF onboard credentials, secure execution environments, trusted hardware, scheduling
11Vicente Benjumea, Seung Geol Choi, Javier López 0001, Moti Yung Fair Traceable Multi-Group Signatures. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Bart De Decker, Mohamed Layouni, Hans Vangheluwe, Kristof Verslype A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF electronic healthcare, privacy, anonymous credentials
11Manuel Sánchez, Óscar Cánovas Reverte, Gabriel López 0001, Antonio Fernandez Gómez-Skarmeta Levels of Assurance and Reauthentication in Federated Environments. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF reauthentication, LoA, eduGAIN, authorization, federation, SSO
11Jason Crampton, Hoon Wei Lim Role Signatures for Access Control in Open Distributed Systems. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Qianhong Wu, Bo Qin, Yi Mu 0001, Willy Susilo Privacy for Private Key in Signatures. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anonymous identity, Key indistinguishability, Key leakage, Pairing groups, Key privacy, Chosen message attack
11Carlo Argiolas, Nicoletta Dessì, Maria Grazia Fugini Modeling Trust Relationships in Collaborative Engineering Projects. Search on Bibsonomy UNISCON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF engineering projects, Security, Web services, trust, grid services
11Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya P-signatures and Noninteractive Anonymous Credentials. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Vladimir Kolesnikov, Charles Rackoff Password Mistyping in Two-Factor-Authenticated Key Exchange. Search on Bibsonomy ICALP (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Stanislaw Jarecki, Xiaomin Liu Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials. Search on Bibsonomy ICALP (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Daniel Díaz Sánchez, Andrés Marín López, Florina Almenárez, Celeste Campo, Alberto Cortés, Carlos García-Rubio Trust Negotiation Protocol Support for Secure Mobile Network Service Deployment. Search on Bibsonomy MWCN/PWC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Jan Camenisch, Rafik Chaabouni, Abhi Shelat Efficient Protocols for Set Membership and Range Proofs. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Range proofs, set membership proofs, bi-linear maps, proofs of knowledge
11Sergey Bratus, Nihal D'Cunha, Evan R. Sparks, Sean W. Smith TOCTOU, Traps, and Trusted Computing. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Yan He 0001, Miaoliang Zhu, Chunying Zheng An Efficient and Minimum Sensitivity Cost Negotiation Strategy in Automated Trust Negotiation. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Deholo Nali, Paul C. van Oorschot CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Ramaswamy Chandramouli Policy Specification and Enforcement for Smart ID Cards Deployment. Search on Bibsonomy POLICY The full citation details ... 2008 DBLP  DOI  BibTeX  RDF XML, Smart Cards, XSLT, Identity Management
11Yu Zhang An Open Framework for Remote Electronic Elections. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Dan Boneh, Shai Halevi, Michael Hamburg, Rafail Ostrovsky Circular-Secure Encryption from Decision Diffie-Hellman. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Chuan Yue, Haining Wang Anti-Phishing in Offense and Defense. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Karl Krukow, Mogens Nielsen Trust structures. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Trust structures, Denotational and operational semantics, Trust management, I/O automata, Foundations
11Jesus Luna, Manel Medina, Oscar Manso Using OGRO and CertiVeR to improve OCSP validation for Grids. Search on Bibsonomy J. Supercomput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF CertiVeR, Grid validation, Grid validation policy, Online Certificate Status Protocol, Open Grid OCSP, Prevalidation
11Ramaswamy Chandramouli, Philip Lee Infrastructure Standards for Smart ID Card Deployment. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 597 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license