|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1026 occurrences of 508 keywords
|
|
|
Results
Found 1679 publication records. Showing 1679 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
26 | Blerim Rexha |
Increasing User Privacy in Online Transactions with X.509 v3 Certificate Private Extensions and Smartcards. |
CEC |
2005 |
DBLP DOI BibTeX RDF |
X.509 v3 identity and attribute certificates, security, privacy, digital signature, encryption, smartcards, non-repudiation, SET, online transaction |
26 | Javier López 0001, Antonio Mana, José A. Montenegro, Juan J. Ortega |
PKI design based on the use of on-line certification authorities. |
Int. J. Inf. Sec. |
2004 |
DBLP DOI BibTeX RDF |
Certification authories, Authentication, PKI, Revocation, Public-key certificates |
26 | Simon N. Foley |
Using Trust Management to Support Transferable Hash-Based Micropayments. |
Financial Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Trust Management, Delegation, Public Key Certificates, One-way Hash Functions, Digital Cash |
26 | Ninghui Li, Joan Feigenbaum |
Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation. |
Financial Cryptography |
2001 |
DBLP BibTeX RDF |
Certificates, PKI, Revocation, CRL |
26 | Vishwa Prasad, Sreenivasa Potakamuri, Michael Ahern, Igor Balabine, Michah Lerner, Partha Dutta |
Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI). |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
interoperable security infrastructure, AT? Labs, multiple certificate authorities, third-party CA systems, uniform enrollment procedures, Verisign, authenticated IP services, policy descriptions, certificate sources, X.509v3 certificates, CRML, PKCS, X509, XML, software architecture, authentication, public key cryptography, certification, client-server systems, public key infrastructure, revocation, intranets, message authentication, CRL, OCSP, middleware platform |
26 | Shai Halevi, Hugo Krawczyk |
Public-Key Cryptography and Password Protocols. |
ACM Trans. Inf. Syst. Secur. |
1999 |
DBLP DOI BibTeX RDF |
hand-held certificates, public passwords, public-key protocols, passwords, key exchange, dictionary attacks |
26 | Michael K. Reiter, Stuart G. Stubblebine |
Toward Acceptable Metrics of Authentication. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
authentication metrics design, trusted intermediaries, intersecting paths, key interdependencies, certificates, ambiguities, message authentication, large-scale system, confidence, acceptability, multiple paths |
26 | Marta Teresa Acevedo, David Fillingham, John Lucas Nicolettos |
Enterprise Security Applications of Partition Rule Based Access Control (PRBAC). |
WETICE |
1997 |
DBLP DOI BibTeX RDF |
enterprise security applications, partition rule-based access control, electronically managed information, information misuse, economic well-being, military access control needs, business enterprise access control needs, PRBAC, information sensitivity, individual authorizations, user-defined security policy, data security labels, user public-key certificates, authorisation, information loss, global markets |
26 | Aviel D. Rubin |
Extending NCP for protocols using public keys. |
ICCCN |
1995 |
DBLP DOI BibTeX RDF |
nonmonotonic cryptographic protocols, asymmetric keys, update function, principals, binding requirements, public key protocol, protocols, certificates, inference rules |
25 | Rodolfo Pellizzoni, Patrick O'Neil Meredith, Min-Young Nam, Mu Sun, Marco Caccamo, Lui Sha |
Handling mixed-criticality in SoC-based real-time embedded systems. |
EMSOFT |
2009 |
DBLP DOI BibTeX RDF |
mixed-criticality, system-on-chip, runtime monitoring, platform-based design, AADL |
25 | Mihaela Ion, Hristo Koshutanski, Volker Hoyer, Luigi Telesca |
Rating Agencies Interoperation for Peer-to-Peer Online Transactions. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Kenneth P. Laberteaux, Jason J. Haas, Yih-Chun Hu |
Security certificate revocation list distribution for vanet. |
Vehicular Ad Hoc Networks |
2008 |
DBLP DOI BibTeX RDF |
security, simulation, vanet, revocation, crl |
25 | Gilles Barthe, César Kunz |
Certificate Translation in Abstract Interpretation. |
ESOP |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Paul Rabinovich |
ECL: A TLS Extension for Authentication in Complex PKIs. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
25 | André Zúquete, Helder Gomes, João Paulo da Silva Cunha |
Authentication Architecture for Region-Wide e-Health System with Smartcards and a PKI. |
BIOSTEC (Selected Papers) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Daryl Walleck, Yingjiu Li, Shouhuai Xu |
Empirical Analysis of Certificate Revocation Lists. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
public key infrastructure, empirical analysis, certificate revocation |
25 | Stefan Piger, Christian Grimm, Ralf Groeper, Christopher Kunz |
A Comprehensive Approach to Self-Restricted Delegation of Rights in Grids. |
CCGRID |
2008 |
DBLP DOI BibTeX RDF |
restricted delegation, Grid Computing, authorization policy, proxy certificate |
25 | Ahmed Bouajjani, Javier Esparza, Stefan Schwoon, Dejvuth Suwimonteerabuth |
SDSIrep: A Reputation System Based on SDSI. |
TACAS |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothblum |
Delegating computation: interactive proofs for muggles. |
STOC |
2008 |
DBLP DOI BibTeX RDF |
muggles, delegation, interactive proofs |
25 | Stanislaw Jarecki, Xiaomin Liu |
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Jan Camenisch, Dieter Sommer, Roger Zimmermann |
A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
25 | N. V. Narendra Kumar, R. K. Shyamasundar |
Specification and Realization of Access Control in SPKI/SDSI. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Mark Sherriff, Laurie A. Williams |
DevCOP: A Software Certificate Management System for Eclipse. |
ISSRE |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Somesh Jha, Stefan Schwoon, Hao Wang, Thomas W. Reps |
Weighted Pushdown Systems and Trust-Management Systems. |
TACAS |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda |
Certificate-based Access Control in Pure P2P Networks. |
Peer-to-Peer Computing |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Mohamed G. Gouda, Eunjin Jung |
Stabilizing Certificate Dispersal. |
Self-Stabilizing Systems |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Heng Pan, JingFeng Li, Yuefei Zhu, DaWei Wei |
A Practical Scheme of Merging Multiple Public Key Infrastructures in E-commerce. |
ICCNMC |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Dae Hyun Yum, Pil Joong Lee |
Identity-Based Cryptography in Public Key Management. |
EuroPKI |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Kemal Bicakci, Nazife Baykal |
A New Design of Privilege Management Infrastructure with Binding Signature Semantics. |
EuroPKI |
2004 |
DBLP DOI BibTeX RDF |
binding signature semantics, digital signature, revocation, attribute certificate, PMI |
25 | Thomas Walter 0001, Laurent Bussard, Philip Robinson, Yves Roudier |
Security and Trust Issues in Ubiquitous Environments - The Business-to-Employee Dimension. |
SAINT Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Delia Critchlow, Ning Zhang 0001 |
Revocation invocation for accountable anonymous PKI certificate trees. |
ISCC |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Dae Hyun Yum, Pil Joong Lee |
Generic Construction of Certificateless Signature. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
public-key signature, identity-based signature, Certificateless signature |
25 | Dae Hyun Yum, Pil Joong Lee |
Generic Construction of Certificateless Encryption. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Sang Seok Lim, Jong Hyuk Choi, Kurt D. Zeilenga |
Secure and flexible certificate access in WS-security through LDAP component matching. |
SWS |
2004 |
DBLP DOI BibTeX RDF |
certificate repository, component matching, PKI, LDAP, X.509 certificate |
25 | Dianne P. Bills |
Marketing higher education in information technology. |
SIGITE Conference |
2004 |
DBLP DOI BibTeX RDF |
marketing IT education, student recruiting, tuition reimbursement |
25 | Mads Dam |
Regular SPKI (Discussion). |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Michael Kaminsky, George Savvides, David Mazières, M. Frans Kaashoek |
Decentralized user authentication in a global file system. |
SOSP |
2003 |
DBLP DOI BibTeX RDF |
authentication, authorization, file system, groups, users, credentials, ACL, SFS |
25 | Claudine Conrado, Frank Kamperman, Geert Jan Schrijen, Willem Jonker |
Privacy in an Identity-based DRM System. |
DEXA Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Yuh-Jong Hu, Chao-Wei Tang |
Agent-Oriented Public Key Infrastructure for Multi-agent E-service. |
KES |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano |
Efficient Offline Certificate Revocation. |
MIPS |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano |
E-MHT. An Efficient Protocol for Certificate Status Checking. |
WISA |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli |
Automated Analysis of Some Security Mechanisms of SCEP. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Bogdan C. Popescu, Maarten van Steen, Andrew S. Tanenbaum |
A Security Architecture for Object-Based Distributed Systems. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Yuji Watanabe, Hideki Imai |
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
25 | Ilari Lehti, Pekka Nikander |
Certifying Trust. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
25 | Anas Tarah, Christian Huitema |
Associating Metrics to Certification Paths. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
|
23 | Ahmad Samer Wazan, Romain Laborde, François Barrère, Abdelmalek Benzekri |
Validating X.509 Certificates Based on their Quality. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Shinsaku Kiyomoto, Toshiaki Tanaka |
Anonymous attribute authentication scheme using self-blindable certificates. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Ana Isabel González-Tablas Ferreres, Benjamín Ramos Álvarez, Arturo Ribagorda Garnacho |
Spatial-Temporal Certification Framework and Extension of X.509 Attribute Certificate Framework and SAML Standard to Support Spatial-Temporal Certificates. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
Spatial-temporal certification, X.509 AC, SAML |
23 | Wun-She Yap, Swee-Huay Heng, Bok-Min Goi |
Cryptanalysis of Some Proxy Signature Schemes Without Certificates. |
WISTP |
2007 |
DBLP DOI BibTeX RDF |
attack, Proxy signature, identity-based, certificateless |
23 | Jiangtao Li 0001, Ninghui Li |
OACerts: Oblivious Attribute Certificates. |
IEEE Trans. Dependable Secur. Comput. |
2006 |
DBLP DOI BibTeX RDF |
privacy, access controls, Security and privacy protection, cryptographic controls |
23 | C. Corzo, F. Corzo S., Ning Zhang 0001, Andy Carpenter |
Using Automated Banking Certificates to Detect Unauthorised Financial Transactions. |
Financial Cryptography |
2006 |
DBLP DOI BibTeX RDF |
financial fraud, Data integrity, Security architecture, Insider threats |
23 | Thomas P. Jensen |
Certificates of Resource Usage on Mobile Telephones. |
ISoLA |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Nitesh Saxena |
Public Key Cryptography Sans Certificates in Ad Hoc Networks. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
23 | M. Francisca Hinarejos, Jordi Forné |
Revocation Scheme for PMI Based Upon the Tracing of Certificates Chains. |
ICCSA (4) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Srecko Brlek, Sardaouna Hamadou, John Mullins |
Some Remarks on the Certificates Registration of the Electronic Commerce Protocol SET. |
AICT/ICIW |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Sonja Glavaski, Antonis Papachristodoulou, Kartik B. Ariyur |
Safety Verification of Controlled Advanced Life Support System Using Barrier Certificates. |
HSCC |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Jiangtao Li 0001, Ninghui Li |
OACerts: Oblivious Attribute Certificates. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Mark Sherriff |
Utilizing verification and validation certificates to estimate software defect density. |
ESEC/SIGSOFT FSE |
2005 |
DBLP DOI BibTeX RDF |
validation and verification management, reliability estimation, software reliability engineering |
23 | Klaus Vogstad |
Combining System Dynamics and Experimental Economics to Analyse the Design of Tradable Green Certificates. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Satoshi Koga, Jae-Cheol Ryou 0001, Kouichi Sakurai |
Pre-production Methods of a Response to Certificates with the Common Status - Design and Theoretical Evaluation. |
EuroPKI |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Babak Sadighi Firozabadi |
Using Attribute Certificates for Creating Management Structures (Transcript of Discussion). |
Security Protocols Workshop |
2001 |
DBLP DOI BibTeX RDF |
|
23 | Douglas R. Stinson, Reto Strobl |
Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
23 | Petra Wohlmacher |
Digital certificates: a survey of revocation methods. |
ACM Multimedia Workshops |
2000 |
DBLP DOI BibTeX RDF |
CRS, CRT, revocation, digital certificate, CRL, public-key certificate, X.509, attribute certificate, OCSP |
23 | Georg Gottlob, Nicola Leone, Francesco Scarcello |
Computing LOGCFL Certificates. |
ICALP |
1999 |
DBLP DOI BibTeX RDF |
|
23 | Magnus Nyström, John G. Brainard |
An X.509-Compatible Syntax for Compact Certificates. |
CQRE |
1999 |
DBLP DOI BibTeX RDF |
|
23 | Pekka Nikander, Yki Kortesniemi, Jonna Partanen |
Preserving Privacy in Distributed Delegation with Fast Certificates. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
23 | James M. Hayes |
Secure In-Band Update of Trusted Certificates. |
WETICE |
1999 |
DBLP DOI BibTeX RDF |
|
23 | Stefan Brands |
Restrictive Blinding of Secret-Key Certificates. |
EUROCRYPT |
1995 |
DBLP DOI BibTeX RDF |
|
23 | Don Davis, Ralph R. Swick |
Network Security via Private-Key Certificates. |
ACM SIGOPS Oper. Syst. Rev. |
1990 |
DBLP DOI BibTeX RDF |
|
17 | H. Gilbert Miller, James L. Fisher |
Requiring Strong Credentials: What's Taking So Long?. |
IT Prof. |
2010 |
DBLP DOI BibTeX RDF |
Smart IT, authentication, authorization, cybersecurity, digital certificates, public-key infrastructure (PKI) |
17 | Stefan Miltchev, Jonathan M. Smith, Vassilis Prevelakis, Angelos D. Keromytis, Sotiris Ioannidis |
Decentralized access control in distributed file systems. |
ACM Comput. Surv. |
2008 |
DBLP DOI BibTeX RDF |
decentralized access control, Authentication, authorization, certificates, trust management, credentials, networked file systems |
17 | Esben Dalsgaard, Kåre Kjelstrøm, Jan Riis |
A federation of web services for Danish health care. |
IDtrust |
2008 |
DBLP DOI BibTeX RDF |
WS-trust, X509 certificates, security token service, web services, SOA, digital signatures, SOAP, health care, single sign on, SAML, federated identity management, electronic patient records |
17 | Paul C. van Oorschot, Tao Wan 0004, Evangelos Kranakis |
On interdomain routing security and pretty secure BGP (psBGP). |
ACM Trans. Inf. Syst. Secur. |
2007 |
DBLP DOI BibTeX RDF |
authentication, trust, certificates, BGP, public-key infrastructure, interdomain routing, secure routing protocols |
17 | Katerina Stamou, Fredrik Hedman, Anthony Iliopoulos |
Extending UNICORE 5 Authentication Model by Supporting Proxy Certificate Profile Extensions. |
Euro-Par Workshops |
2007 |
DBLP DOI BibTeX RDF |
RFC 3280, authentication, grid, interoperability, authorization, X.509, UNICORE, proxy certificates |
17 | Billy Bob Brumley, Kaisa Nyberg |
Differential Properties of Elliptic Curves and Blind Signatures. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
differential uniformity, implicit public key certificates, key issuing protocols, provable security, Elliptic curves, blind signatures, digital signature schemes, message recovery |
17 | Alain P. Hiltgen, Thorsten Kramp, Thomas Weigold |
Secure Internet Banking Authentication. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
short-time passwords, short-lived passwords, taxonomy of attacks, authentication, Internet banking, public-key certificates |
17 | Changjie Wang, Dickson K. W. Chiu, Ho-fung Leung |
Anonymity and Security Support for Persistent Enterprise Conversation. |
EDOC |
2006 |
DBLP DOI BibTeX RDF |
alias certificates, Anonymity, privacy protection, verifiability, anonymity revocation, cryptograph |
17 | Ezra Brown, Bruce T. Myers, Jerome A. Solinas |
Hyperelliptic Curves with Compact Parameters. |
Des. Codes Cryptogr. |
2005 |
DBLP DOI BibTeX RDF |
public-key cryptography, certificates, hyperelliptic curves, complex multiplication |
17 | Yuqun Chen, Mehmet Kivanç Mihçak, Darko Kirovski |
Certifying authenticity via fiber-infused paper. |
SIGecom Exch. |
2005 |
DBLP DOI BibTeX RDF |
anti-piracy, certificates of authenticity, counterfeit deterrence, security, economics |
17 | Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum |
How to incorporate revocation status information into the trust metrics for public-key certification. |
SAC |
2005 |
DBLP DOI BibTeX RDF |
PKI, revocation, public key certificates, trust metrics |
17 | Douglas E. Ennis |
The wireless tightrope: an economical, secure, and user friendly approach for the wireless campus. |
SIGUCCS |
2005 |
DBLP DOI BibTeX RDF |
EAP-TLS, MSCHAPv2, PEAP, SSL certificates, SWAN, WLCCP, WEP, 802.1X |
17 | Mary Anne Patton, Audun Jøsang |
Technologies for Trust in Electronic Commerce. |
Electron. Commer. Res. |
2004 |
DBLP DOI BibTeX RDF |
payment intermediaries, trustmark seals, mathematical trust models, alternative dispute resolution mechanisms, security, privacy, cryptography, trust, e-commerce, embodied conversational agents, reputation systems, digital certificates |
17 | Marian Ventuneac, Tom Coffey, Ioan Salomie |
A policy-based security framework for Web-enabled applications. |
ISICT |
2003 |
DBLP DOI BibTeX RDF |
software architectures, security policy, security model, Web-based applications, digital certificates, security framework |
17 | Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati |
Securing SOAP e-services. |
Int. J. Inf. Sec. |
2002 |
DBLP DOI BibTeX RDF |
Access control, SOAP, E-services, Digital certificates |
17 | C. Joncheng Kuo, Polar Humenn |
Dynamically authorized role-based access control for secure distributed computation. |
XML Security |
2002 |
DBLP DOI BibTeX RDF |
XML-based security assertions, authorization domain, CORBA, Role-based access control, attribute certificates |
17 | Ninghui Li, John C. Mitchell, William H. Winsborough |
Design of a Role-Based Trust-Management Framework. |
S&P |
2002 |
DBLP DOI BibTeX RDF |
access control, role-based access control, trust management, distributed system security, attribute-based access control, attribute certificates |
17 | Lisa Hellerstein, Vijay Raghavan 0002 |
Exact learning of DNF formulas using DNF hypotheses. |
STOC |
2002 |
DBLP DOI BibTeX RDF |
representations of boolean functions, algorithms, certificates, complexity theory, computational learning theory, disjunctive normal form, DNF |
17 | Joon S. Park, Ravi S. Sandhu, Gail-Joon Ahn |
Role-based access control on the web. |
ACM Trans. Inf. Syst. Secur. |
2001 |
DBLP DOI BibTeX RDF |
WWW security, World Wide Web (WWW), role-based access control, cookies, digital certificates |
17 | Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati |
Fine grained access control for SOAP E-services. |
WWW |
2001 |
DBLP DOI BibTeX RDF |
Internet, XML, XML, access control, certificates, roles, SOAP |
17 | Walt Yao, Ken Moody, Jean Bacon |
A model of OASIS role-based access control and its support for active security. |
SACMAT |
2001 |
DBLP DOI BibTeX RDF |
RBAC, role based access control, policy, service level agreements, certificates, OASIS |
17 | Lisa Hellerstein, Krishnan Pillaipakkamnatt, Vijay Raghavan 0002, Dawn Wilkins |
How Many Queries Are Needed to Learn? |
J. ACM |
1996 |
DBLP DOI BibTeX RDF |
exact identification, polynomial-query learning, polynomial-time learning, proper learning, certificates, membership queries, equivalence queries, polynomial-time hierarchy |
17 | Jose L. Muñoz, Oscar Esparza, Jordi Forné, Esteve Pallarès |
Design and implementation of a lightweight online certificate validation service. |
Telecommun. Syst. |
2009 |
DBLP DOI BibTeX RDF |
Certification, Public key infrastructure, Revocation, OCSP |
17 | Chung-Ming Ou, Chung-Ren Ou |
Security of Intelligent Agents in the Web-Based Applications. |
Intelligent Agents in the Evolution of Web and Applications |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Minkyoung Cho, David M. Mount, Eunhui Park |
Maintaining Nets and Net Trees under Incremental Motion. |
ISAAC |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy |
TruWallet: trustworthy and migratable wallet-based web authentication. |
STC |
2009 |
DBLP DOI BibTeX RDF |
password wallet, secure migration, trusted computing, phishing, identity theft |
17 | Dingguo Yu, Nan Chen |
The Improving of IKE with PSK for Using in Mobile Computing Environments. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Vanderson Botelho, Fabrício Enembreck, Bráulio Coelho Ávila, Hilton de Azevedo, Edson Emílio Scalabrin |
Encrypted certified trust in multi-agent system. |
CSCWD |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Bo Zhang 0020, Qiuliang Xu |
Certificateless Proxy Blind Signature Scheme from Bilinear Pairings. |
WKDD |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Mansoor Alicherry, Angelos D. Keromytis |
DoubleCheck: Multi-path verification against man-in-the-middle attacks. |
ISCC |
2009 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 1679 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|