The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Certificates with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1979-1992 (17) 1993-1996 (17) 1997-1998 (30) 1999 (31) 2000 (41) 2001 (41) 2002 (57) 2003 (63) 2004 (104) 2005 (110) 2006 (110) 2007 (96) 2008 (97) 2009 (78) 2010 (27) 2011 (27) 2012 (32) 2013 (28) 2014 (26) 2015 (36) 2016 (45) 2017 (63) 2018 (73) 2019 (64) 2020 (67) 2021 (86) 2022 (98) 2023 (97) 2024 (18)
Publication types (Num. hits)
article(516) data(2) incollection(5) inproceedings(1146) phdthesis(10)
Venues (Conferences, Journals, ...)
CoRR(162) RFC(33) EuroPKI(25) CDC(20) Financial Cryptography(16) HSCC(15) IACR Cryptol. ePrint Arch.(15) ACSAC(14) ISCC(14) ACC(13) SAC(13) ARES(12) CCS(12) CLEF (Working Notes)(12) ISSAC(12) NeurIPS(12) More (+10 of total 742)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1026 occurrences of 508 keywords

Results
Found 1679 publication records. Showing 1679 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
26Blerim Rexha Increasing User Privacy in Online Transactions with X.509 v3 Certificate Private Extensions and Smartcards. Search on Bibsonomy CEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF X.509 v3 identity and attribute certificates, security, privacy, digital signature, encryption, smartcards, non-repudiation, SET, online transaction
26Javier López 0001, Antonio Mana, José A. Montenegro, Juan J. Ortega PKI design based on the use of on-line certification authorities. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Certification authories, Authentication, PKI, Revocation, Public-key certificates
26Simon N. Foley Using Trust Management to Support Transferable Hash-Based Micropayments. Search on Bibsonomy Financial Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Trust Management, Delegation, Public Key Certificates, One-way Hash Functions, Digital Cash
26Ninghui Li, Joan Feigenbaum Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation. Search on Bibsonomy Financial Cryptography The full citation details ... 2001 DBLP  BibTeX  RDF Certificates, PKI, Revocation, CRL
26Vishwa Prasad, Sreenivasa Potakamuri, Michael Ahern, Igor Balabine, Michah Lerner, Partha Dutta Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI). Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF interoperable security infrastructure, AT? Labs, multiple certificate authorities, third-party CA systems, uniform enrollment procedures, Verisign, authenticated IP services, policy descriptions, certificate sources, X.509v3 certificates, CRML, PKCS, X509, XML, software architecture, authentication, public key cryptography, certification, client-server systems, public key infrastructure, revocation, intranets, message authentication, CRL, OCSP, middleware platform
26Shai Halevi, Hugo Krawczyk Public-Key Cryptography and Password Protocols. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF hand-held certificates, public passwords, public-key protocols, passwords, key exchange, dictionary attacks
26Michael K. Reiter, Stuart G. Stubblebine Toward Acceptable Metrics of Authentication. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF authentication metrics design, trusted intermediaries, intersecting paths, key interdependencies, certificates, ambiguities, message authentication, large-scale system, confidence, acceptability, multiple paths
26Marta Teresa Acevedo, David Fillingham, John Lucas Nicolettos Enterprise Security Applications of Partition Rule Based Access Control (PRBAC). Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF enterprise security applications, partition rule-based access control, electronically managed information, information misuse, economic well-being, military access control needs, business enterprise access control needs, PRBAC, information sensitivity, individual authorizations, user-defined security policy, data security labels, user public-key certificates, authorisation, information loss, global markets
26Aviel D. Rubin Extending NCP for protocols using public keys. Search on Bibsonomy ICCCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF nonmonotonic cryptographic protocols, asymmetric keys, update function, principals, binding requirements, public key protocol, protocols, certificates, inference rules
25Rodolfo Pellizzoni, Patrick O'Neil Meredith, Min-Young Nam, Mu Sun, Marco Caccamo, Lui Sha Handling mixed-criticality in SoC-based real-time embedded systems. Search on Bibsonomy EMSOFT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mixed-criticality, system-on-chip, runtime monitoring, platform-based design, AADL
25Mihaela Ion, Hristo Koshutanski, Volker Hoyer, Luigi Telesca Rating Agencies Interoperation for Peer-to-Peer Online Transactions. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Kenneth P. Laberteaux, Jason J. Haas, Yih-Chun Hu Security certificate revocation list distribution for vanet. Search on Bibsonomy Vehicular Ad Hoc Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, simulation, vanet, revocation, crl
25Gilles Barthe, César Kunz Certificate Translation in Abstract Interpretation. Search on Bibsonomy ESOP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Paul Rabinovich ECL: A TLS Extension for Authentication in Complex PKIs. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25André Zúquete, Helder Gomes, João Paulo da Silva Cunha Authentication Architecture for Region-Wide e-Health System with Smartcards and a PKI. Search on Bibsonomy BIOSTEC (Selected Papers) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Daryl Walleck, Yingjiu Li, Shouhuai Xu Empirical Analysis of Certificate Revocation Lists. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF public key infrastructure, empirical analysis, certificate revocation
25Stefan Piger, Christian Grimm, Ralf Groeper, Christopher Kunz A Comprehensive Approach to Self-Restricted Delegation of Rights in Grids. Search on Bibsonomy CCGRID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF restricted delegation, Grid Computing, authorization policy, proxy certificate
25Ahmed Bouajjani, Javier Esparza, Stefan Schwoon, Dejvuth Suwimonteerabuth SDSIrep: A Reputation System Based on SDSI. Search on Bibsonomy TACAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothblum Delegating computation: interactive proofs for muggles. Search on Bibsonomy STOC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF muggles, delegation, interactive proofs
25Stanislaw Jarecki, Xiaomin Liu Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Jan Camenisch, Dieter Sommer, Roger Zimmermann A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25N. V. Narendra Kumar, R. K. Shyamasundar Specification and Realization of Access Control in SPKI/SDSI. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Mark Sherriff, Laurie A. Williams DevCOP: A Software Certificate Management System for Eclipse. Search on Bibsonomy ISSRE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Somesh Jha, Stefan Schwoon, Hao Wang, Thomas W. Reps Weighted Pushdown Systems and Trust-Management Systems. Search on Bibsonomy TACAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda Certificate-based Access Control in Pure P2P Networks. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Mohamed G. Gouda, Eunjin Jung Stabilizing Certificate Dispersal. Search on Bibsonomy Self-Stabilizing Systems The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Heng Pan, JingFeng Li, Yuefei Zhu, DaWei Wei A Practical Scheme of Merging Multiple Public Key Infrastructures in E-commerce. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Dae Hyun Yum, Pil Joong Lee Identity-Based Cryptography in Public Key Management. Search on Bibsonomy EuroPKI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Kemal Bicakci, Nazife Baykal A New Design of Privilege Management Infrastructure with Binding Signature Semantics. Search on Bibsonomy EuroPKI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF binding signature semantics, digital signature, revocation, attribute certificate, PMI
25Thomas Walter 0001, Laurent Bussard, Philip Robinson, Yves Roudier Security and Trust Issues in Ubiquitous Environments - The Business-to-Employee Dimension. Search on Bibsonomy SAINT Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Delia Critchlow, Ning Zhang 0001 Revocation invocation for accountable anonymous PKI certificate trees. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Dae Hyun Yum, Pil Joong Lee Generic Construction of Certificateless Signature. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF public-key signature, identity-based signature, Certificateless signature
25Dae Hyun Yum, Pil Joong Lee Generic Construction of Certificateless Encryption. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Sang Seok Lim, Jong Hyuk Choi, Kurt D. Zeilenga Secure and flexible certificate access in WS-security through LDAP component matching. Search on Bibsonomy SWS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF certificate repository, component matching, PKI, LDAP, X.509 certificate
25Dianne P. Bills Marketing higher education in information technology. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF marketing IT education, student recruiting, tuition reimbursement
25Mads Dam Regular SPKI (Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Michael Kaminsky, George Savvides, David Mazières, M. Frans Kaashoek Decentralized user authentication in a global file system. Search on Bibsonomy SOSP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF authentication, authorization, file system, groups, users, credentials, ACL, SFS
25Claudine Conrado, Frank Kamperman, Geert Jan Schrijen, Willem Jonker Privacy in an Identity-based DRM System. Search on Bibsonomy DEXA Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Yuh-Jong Hu, Chao-Wei Tang Agent-Oriented Public Key Infrastructure for Multi-agent E-service. Search on Bibsonomy KES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano Efficient Offline Certificate Revocation. Search on Bibsonomy MIPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano E-MHT. An Efficient Protocol for Certificate Status Checking. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli Automated Analysis of Some Security Mechanisms of SCEP. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
25Bogdan C. Popescu, Maarten van Steen, Andrew S. Tanenbaum A Security Architecture for Object-Based Distributed Systems. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
25Yuji Watanabe, Hideki Imai Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
25Ilari Lehti, Pekka Nikander Certifying Trust. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
25Anas Tarah, Christian Huitema Associating Metrics to Certification Paths. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
23Ahmad Samer Wazan, Romain Laborde, François Barrère, Abdelmalek Benzekri Validating X.509 Certificates Based on their Quality. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Shinsaku Kiyomoto, Toshiaki Tanaka Anonymous attribute authentication scheme using self-blindable certificates. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Ana Isabel González-Tablas Ferreres, Benjamín Ramos Álvarez, Arturo Ribagorda Garnacho Spatial-Temporal Certification Framework and Extension of X.509 Attribute Certificate Framework and SAML Standard to Support Spatial-Temporal Certificates. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Spatial-temporal certification, X.509 AC, SAML
23Wun-She Yap, Swee-Huay Heng, Bok-Min Goi Cryptanalysis of Some Proxy Signature Schemes Without Certificates. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF attack, Proxy signature, identity-based, certificateless
23Jiangtao Li 0001, Ninghui Li OACerts: Oblivious Attribute Certificates. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, access controls, Security and privacy protection, cryptographic controls
23C. Corzo, F. Corzo S., Ning Zhang 0001, Andy Carpenter Using Automated Banking Certificates to Detect Unauthorised Financial Transactions. Search on Bibsonomy Financial Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF financial fraud, Data integrity, Security architecture, Insider threats
23Thomas P. Jensen Certificates of Resource Usage on Mobile Telephones. Search on Bibsonomy ISoLA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Nitesh Saxena Public Key Cryptography Sans Certificates in Ad Hoc Networks. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23M. Francisca Hinarejos, Jordi Forné Revocation Scheme for PMI Based Upon the Tracing of Certificates Chains. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Srecko Brlek, Sardaouna Hamadou, John Mullins Some Remarks on the Certificates Registration of the Electronic Commerce Protocol SET. Search on Bibsonomy AICT/ICIW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Sonja Glavaski, Antonis Papachristodoulou, Kartik B. Ariyur Safety Verification of Controlled Advanced Life Support System Using Barrier Certificates. Search on Bibsonomy HSCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Jiangtao Li 0001, Ninghui Li OACerts: Oblivious Attribute Certificates. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Mark Sherriff Utilizing verification and validation certificates to estimate software defect density. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF validation and verification management, reliability estimation, software reliability engineering
23Klaus Vogstad Combining System Dynamics and Experimental Economics to Analyse the Design of Tradable Green Certificates. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Satoshi Koga, Jae-Cheol Ryou 0001, Kouichi Sakurai Pre-production Methods of a Response to Certificates with the Common Status - Design and Theoretical Evaluation. Search on Bibsonomy EuroPKI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Babak Sadighi Firozabadi Using Attribute Certificates for Creating Management Structures (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Douglas R. Stinson, Reto Strobl Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Petra Wohlmacher Digital certificates: a survey of revocation methods. Search on Bibsonomy ACM Multimedia Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF CRS, CRT, revocation, digital certificate, CRL, public-key certificate, X.509, attribute certificate, OCSP
23Georg Gottlob, Nicola Leone, Francesco Scarcello Computing LOGCFL Certificates. Search on Bibsonomy ICALP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
23Magnus Nyström, John G. Brainard An X.509-Compatible Syntax for Compact Certificates. Search on Bibsonomy CQRE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
23Pekka Nikander, Yki Kortesniemi, Jonna Partanen Preserving Privacy in Distributed Delegation with Fast Certificates. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
23James M. Hayes Secure In-Band Update of Trusted Certificates. Search on Bibsonomy WETICE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
23Stefan Brands Restrictive Blinding of Secret-Key Certificates. Search on Bibsonomy EUROCRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
23Don Davis, Ralph R. Swick Network Security via Private-Key Certificates. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
17H. Gilbert Miller, James L. Fisher Requiring Strong Credentials: What's Taking So Long?. Search on Bibsonomy IT Prof. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Smart IT, authentication, authorization, cybersecurity, digital certificates, public-key infrastructure (PKI)
17Stefan Miltchev, Jonathan M. Smith, Vassilis Prevelakis, Angelos D. Keromytis, Sotiris Ioannidis Decentralized access control in distributed file systems. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF decentralized access control, Authentication, authorization, certificates, trust management, credentials, networked file systems
17Esben Dalsgaard, Kåre Kjelstrøm, Jan Riis A federation of web services for Danish health care. Search on Bibsonomy IDtrust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF WS-trust, X509 certificates, security token service, web services, SOA, digital signatures, SOAP, health care, single sign on, SAML, federated identity management, electronic patient records
17Paul C. van Oorschot, Tao Wan 0004, Evangelos Kranakis On interdomain routing security and pretty secure BGP (psBGP). Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication, trust, certificates, BGP, public-key infrastructure, interdomain routing, secure routing protocols
17Katerina Stamou, Fredrik Hedman, Anthony Iliopoulos Extending UNICORE 5 Authentication Model by Supporting Proxy Certificate Profile Extensions. Search on Bibsonomy Euro-Par Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RFC 3280, authentication, grid, interoperability, authorization, X.509, UNICORE, proxy certificates
17Billy Bob Brumley, Kaisa Nyberg Differential Properties of Elliptic Curves and Blind Signatures. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF differential uniformity, implicit public key certificates, key issuing protocols, provable security, Elliptic curves, blind signatures, digital signature schemes, message recovery
17Alain P. Hiltgen, Thorsten Kramp, Thomas Weigold Secure Internet Banking Authentication. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF short-time passwords, short-lived passwords, taxonomy of attacks, authentication, Internet banking, public-key certificates
17Changjie Wang, Dickson K. W. Chiu, Ho-fung Leung Anonymity and Security Support for Persistent Enterprise Conversation. Search on Bibsonomy EDOC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF alias certificates, Anonymity, privacy protection, verifiability, anonymity revocation, cryptograph
17Ezra Brown, Bruce T. Myers, Jerome A. Solinas Hyperelliptic Curves with Compact Parameters. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF public-key cryptography, certificates, hyperelliptic curves, complex multiplication
17Yuqun Chen, Mehmet Kivanç Mihçak, Darko Kirovski Certifying authenticity via fiber-infused paper. Search on Bibsonomy SIGecom Exch. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF anti-piracy, certificates of authenticity, counterfeit deterrence, security, economics
17Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum How to incorporate revocation status information into the trust metrics for public-key certification. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF PKI, revocation, public key certificates, trust metrics
17Douglas E. Ennis The wireless tightrope: an economical, secure, and user friendly approach for the wireless campus. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF EAP-TLS, MSCHAPv2, PEAP, SSL certificates, SWAN, WLCCP, WEP, 802.1X
17Mary Anne Patton, Audun Jøsang Technologies for Trust in Electronic Commerce. Search on Bibsonomy Electron. Commer. Res. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF payment intermediaries, trustmark seals, mathematical trust models, alternative dispute resolution mechanisms, security, privacy, cryptography, trust, e-commerce, embodied conversational agents, reputation systems, digital certificates
17Marian Ventuneac, Tom Coffey, Ioan Salomie A policy-based security framework for Web-enabled applications. Search on Bibsonomy ISICT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF software architectures, security policy, security model, Web-based applications, digital certificates, security framework
17Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati Securing SOAP e-services. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Access control, SOAP, E-services, Digital certificates
17C. Joncheng Kuo, Polar Humenn Dynamically authorized role-based access control for secure distributed computation. Search on Bibsonomy XML Security The full citation details ... 2002 DBLP  DOI  BibTeX  RDF XML-based security assertions, authorization domain, CORBA, Role-based access control, attribute certificates
17Ninghui Li, John C. Mitchell, William H. Winsborough Design of a Role-Based Trust-Management Framework. Search on Bibsonomy S&P The full citation details ... 2002 DBLP  DOI  BibTeX  RDF access control, role-based access control, trust management, distributed system security, attribute-based access control, attribute certificates
17Lisa Hellerstein, Vijay Raghavan 0002 Exact learning of DNF formulas using DNF hypotheses. Search on Bibsonomy STOC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF representations of boolean functions, algorithms, certificates, complexity theory, computational learning theory, disjunctive normal form, DNF
17Joon S. Park, Ravi S. Sandhu, Gail-Joon Ahn Role-based access control on the web. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF WWW security, World Wide Web (WWW), role-based access control, cookies, digital certificates
17Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati Fine grained access control for SOAP E-services. Search on Bibsonomy WWW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Internet, XML, XML, access control, certificates, roles, SOAP
17Walt Yao, Ken Moody, Jean Bacon A model of OASIS role-based access control and its support for active security. Search on Bibsonomy SACMAT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF RBAC, role based access control, policy, service level agreements, certificates, OASIS
17Lisa Hellerstein, Krishnan Pillaipakkamnatt, Vijay Raghavan 0002, Dawn Wilkins How Many Queries Are Needed to Learn? Search on Bibsonomy J. ACM The full citation details ... 1996 DBLP  DOI  BibTeX  RDF exact identification, polynomial-query learning, polynomial-time learning, proper learning, certificates, membership queries, equivalence queries, polynomial-time hierarchy
17Jose L. Muñoz, Oscar Esparza, Jordi Forné, Esteve Pallarès Design and implementation of a lightweight online certificate validation service. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Certification, Public key infrastructure, Revocation, OCSP
17Chung-Ming Ou, Chung-Ren Ou Security of Intelligent Agents in the Web-Based Applications. Search on Bibsonomy Intelligent Agents in the Evolution of Web and Applications The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Minkyoung Cho, David M. Mount, Eunhui Park Maintaining Nets and Net Trees under Incremental Motion. Search on Bibsonomy ISAAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy TruWallet: trustworthy and migratable wallet-based web authentication. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF password wallet, secure migration, trusted computing, phishing, identity theft
17Dingguo Yu, Nan Chen The Improving of IKE with PSK for Using in Mobile Computing Environments. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Vanderson Botelho, Fabrício Enembreck, Bráulio Coelho Ávila, Hilton de Azevedo, Edson Emílio Scalabrin Encrypted certified trust in multi-agent system. Search on Bibsonomy CSCWD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Bo Zhang 0020, Qiuliang Xu Certificateless Proxy Blind Signature Scheme from Bilinear Pairings. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Mansoor Alicherry, Angelos D. Keromytis DoubleCheck: Multi-path verification against man-in-the-middle attacks. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 1679 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license