|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1026 occurrences of 508 keywords
|
|
|
Results
Found 1679 publication records. Showing 1679 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
26 | Blerim Rexha |
Increasing User Privacy in Online Transactions with X.509 v3 Certificate Private Extensions and Smartcards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 19-22 July 2005, München, Germany, pp. 293-300, 2005, IEEE Computer Society, 0-7695-2277-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
X.509 v3 identity and attribute certificates, security, privacy, digital signature, encryption, smartcards, non-repudiation, SET, online transaction |
26 | Javier López 0001, Antonio Mana, José A. Montenegro, Juan J. Ortega |
PKI design based on the use of on-line certification authorities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 2(2), pp. 91-102, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Certification authories, Authentication, PKI, Revocation, Public-key certificates |
26 | Simon N. Foley |
Using Trust Management to Support Transferable Hash-Based Micropayments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers, pp. 1-14, 2003, Springer, 3-540-40663-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Trust Management, Delegation, Public Key Certificates, One-way Hash Functions, Digital Cash |
26 | Ninghui Li, Joan Feigenbaum |
Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings, pp. 157-168, 2001, Springer, 3-540-44079-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
Certificates, PKI, Revocation, CRL |
26 | Vishwa Prasad, Sreenivasa Potakamuri, Michael Ahern, Igor Balabine, Michah Lerner, Partha Dutta |
Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 138-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
interoperable security infrastructure, AT? Labs, multiple certificate authorities, third-party CA systems, uniform enrollment procedures, Verisign, authenticated IP services, policy descriptions, certificate sources, X.509v3 certificates, CRML, PKCS, X509, XML, software architecture, authentication, public key cryptography, certification, client-server systems, public key infrastructure, revocation, intranets, message authentication, CRL, OCSP, middleware platform |
26 | Shai Halevi, Hugo Krawczyk |
Public-Key Cryptography and Password Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 2(3), pp. 230-268, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
hand-held certificates, public passwords, public-key protocols, passwords, key exchange, dictionary attacks |
26 | Michael K. Reiter, Stuart G. Stubblebine |
Toward Acceptable Metrics of Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 10-20, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
authentication metrics design, trusted intermediaries, intersecting paths, key interdependencies, certificates, ambiguities, message authentication, large-scale system, confidence, acceptability, multiple paths |
26 | Marta Teresa Acevedo, David Fillingham, John Lucas Nicolettos |
Enterprise Security Applications of Partition Rule Based Access Control (PRBAC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 6th Workshop on Enabling Technologies (WET-ICE '97), Infrastructure for Collaborative Enterprises, 18-20 June 1997, MIT, Cambridge, MA, USA, Proceedings, pp. 285-292, 1997, IEEE Computer Society, 0-8186-7967-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
enterprise security applications, partition rule-based access control, electronically managed information, information misuse, economic well-being, military access control needs, business enterprise access control needs, PRBAC, information sensitivity, individual authorizations, user-defined security policy, data security labels, user public-key certificates, authorisation, information loss, global markets |
26 | Aviel D. Rubin |
Extending NCP for protocols using public keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN '95), September 20-23, 1995, Las Vegas, Nevada, USA, pp. 94, 1995, IEEE Computer Society, 0-8186-7180-7. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
nonmonotonic cryptographic protocols, asymmetric keys, update function, principals, binding requirements, public key protocol, protocols, certificates, inference rules |
25 | Rodolfo Pellizzoni, Patrick O'Neil Meredith, Min-Young Nam, Mu Sun, Marco Caccamo, Lui Sha |
Handling mixed-criticality in SoC-based real-time embedded systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EMSOFT ![In: Proceedings of the 9th ACM & IEEE International conference on Embedded software, EMSOFT 2009, Grenoble, France, October 12-16, 2009, pp. 235-244, 2009, ACM, 978-1-60558-627-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
mixed-criticality, system-on-chip, runtime monitoring, platform-based design, AADL |
25 | Mihaela Ion, Hristo Koshutanski, Volker Hoyer, Luigi Telesca |
Rating Agencies Interoperation for Peer-to-Peer Online Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France, pp. 173-178, 2008, IEEE Computer Society, 978-0-7695-3329-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Kenneth P. Laberteaux, Jason J. Haas, Yih-Chun Hu |
Security certificate revocation list distribution for vanet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Vehicular Ad Hoc Networks ![In: Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, VANET 2008, San Francisco, California, USA, September 15, 2008, pp. 88-89, 2008, ACM, 978-1-60558-191-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, simulation, vanet, revocation, crl |
25 | Gilles Barthe, César Kunz |
Certificate Translation in Abstract Interpretation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESOP ![In: Programming Languages and Systems, 17th European Symposium on Programming, ESOP 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings, pp. 368-382, 2008, Springer, 978-3-540-78738-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Paul Rabinovich |
ECL: A TLS Extension for Authentication in Complex PKIs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2210-2215, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | André Zúquete, Helder Gomes, João Paulo da Silva Cunha |
Authentication Architecture for Region-Wide e-Health System with Smartcards and a PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIOSTEC (Selected Papers) ![In: Biomedical Engineering Systems and Technologies, International Joint Conference, BIOSTEC 2008, Funchal, Madeira, Portugal, January 28-31, 2008, Revised Selected Papers, pp. 479-492, 2008, Springer, 978-3-540-92218-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Daryl Walleck, Yingjiu Li, Shouhuai Xu |
Empirical Analysis of Certificate Revocation Lists. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings, pp. 159-174, 2008, Springer, 978-3-540-70566-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
public key infrastructure, empirical analysis, certificate revocation |
25 | Stefan Piger, Christian Grimm, Ralf Groeper, Christopher Kunz |
A Comprehensive Approach to Self-Restricted Delegation of Rights in Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 19-22 May 2008, Lyon, France, pp. 114-121, 2008, IEEE Computer Society, 978-0-7695-3156-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
restricted delegation, Grid Computing, authorization policy, proxy certificate |
25 | Ahmed Bouajjani, Javier Esparza, Stefan Schwoon, Dejvuth Suwimonteerabuth |
SDSIrep: A Reputation System Based on SDSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TACAS ![In: Tools and Algorithms for the Construction and Analysis of Systems, 14th International Conference, TACAS 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings, pp. 501-516, 2008, Springer, 978-3-540-78799-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothblum |
Delegating computation: interactive proofs for muggles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008, pp. 113-122, 2008, ACM, 978-1-60558-047-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
muggles, delegation, interactive proofs |
25 | Stanislaw Jarecki, Xiaomin Liu |
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings, pp. 270-287, 2007, Springer, 978-3-540-72737-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Jan Camenisch, Dieter Sommer, Roger Zimmermann |
A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 25-37, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | N. V. Narendra Kumar, R. K. Shyamasundar |
Specification and Realization of Access Control in SPKI/SDSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 177-193, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Mark Sherriff, Laurie A. Williams |
DevCOP: A Software Certificate Management System for Eclipse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: 17th International Symposium on Software Reliability Engineering (ISSRE 2006), 7-10 November 2006, Raleigh, North Carolina, USA, pp. 375-384, 2006, IEEE Computer Society, 0-7695-2684-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Somesh Jha, Stefan Schwoon, Hao Wang, Thomas W. Reps |
Weighted Pushdown Systems and Trust-Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TACAS ![In: Tools and Algorithms for the Construction and Analysis of Systems, 12th International Conference, TACAS 2006 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2006, Vienna, Austria, March 25 - April 2, 2006, Proceedings, pp. 1-26, 2006, Springer, 3-540-33056-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda |
Certificate-based Access Control in Pure P2P Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer-to-Peer Computing ![In: Sixth IEEE International Conference on Peer-to-Peer Computing (P2P 2006), 2-4 October 2006, Cambridge, United Kingdom, pp. 177-184, 2006, IEEE Computer Society, 0-7695-2679-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Mohamed G. Gouda, Eunjin Jung |
Stabilizing Certificate Dispersal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Self-Stabilizing Systems ![In: Self-Stabilizing Systems, 7th International Symposium, SSS 2005, Barcelona, Spain, October 26-27, 2005, Proceedings, pp. 140-152, 2005, Springer, 3-540-29814-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Heng Pan, JingFeng Li, Yuefei Zhu, DaWei Wei |
A Practical Scheme of Merging Multiple Public Key Infrastructures in E-commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCNMC ![In: Networking and Mobile Computing, Third International Conference, ICCNMC 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings, pp. 1287-1294, 2005, Springer, 3-540-28102-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Dae Hyun Yum, Pil Joong Lee |
Identity-Based Cryptography in Public Key Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 71-84, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Kemal Bicakci, Nazife Baykal |
A New Design of Privilege Management Infrastructure with Binding Signature Semantics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 306-313, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
binding signature semantics, digital signature, revocation, attribute certificate, PMI |
25 | Thomas Walter 0001, Laurent Bussard, Philip Robinson, Yves Roudier |
Security and Trust Issues in Ubiquitous Environments - The Business-to-Employee Dimension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2004 Symposium on Applications and the Internet Workshops (SAINT 2004 Workshops), 26-30 January 2004, Tokyo, Japan, pp. 696-701, 2004, IEEE Computer Society, 0-7695-2050-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Delia Critchlow, Ning Zhang 0001 |
Revocation invocation for accountable anonymous PKI certificate trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28 - July 1, 2004, Alexandria, Egypt, pp. 386-392, 2004, IEEE Computer Society, 0-7803-8623-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Dae Hyun Yum, Pil Joong Lee |
Generic Construction of Certificateless Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 200-211, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
public-key signature, identity-based signature, Certificateless signature |
25 | Dae Hyun Yum, Pil Joong Lee |
Generic Construction of Certificateless Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 802-811, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Sang Seok Lim, Jong Hyuk Choi, Kurt D. Zeilenga |
Secure and flexible certificate access in WS-security through LDAP component matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 1st ACM Workshop On Secure Web Services, SWS 2004, Fairfax, VA, USA, October 29, 2004, pp. 87-96, 2004, ACM, 1-58113-973-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
certificate repository, component matching, PKI, LDAP, X.509 certificate |
25 | Dianne P. Bills |
Marketing higher education in information technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 5th Conference on Information Technology Education, SIGITE 2004, 2004, Salt Lake City, UT, USA, October 28-30, 2004, pp. 101-105, 2004, ACM, 1-58113-936-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
marketing IT education, student recruiting, tuition reimbursement |
25 | Mads Dam |
Regular SPKI (Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 151-152, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Michael Kaminsky, George Savvides, David Mazières, M. Frans Kaashoek |
Decentralized user authentication in a global file system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, SOSP 2003, Bolton Landing, NY, USA, October 19-22, 2003, pp. 60-73, 2003, ACM, 1-58113-757-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
authentication, authorization, file system, groups, users, credentials, ACL, SFS |
25 | Claudine Conrado, Frank Kamperman, Geert Jan Schrijen, Willem Jonker |
Privacy in an Identity-based DRM System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic, pp. 389-395, 2003, IEEE Computer Society, 0-7695-1993-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Yuh-Jong Hu, Chao-Wei Tang |
Agent-Oriented Public Key Infrastructure for Multi-agent E-service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES ![In: Knowledge-Based Intelligent Information and Engineering Systems, 7th International Conference, KES 2003, Oxford, UK, September 3-5, 2003, Proceedings, Part I, pp. 1215-1221, 2003, Springer, 3-540-40803-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano |
Efficient Offline Certificate Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIPS ![In: Interactive Multimedia on Next Generation Networks, First International Workshop on Multimedia Interactive Protocols and Systems, MIPS 2003, Napoli, Italy, November 18-21, 2003, Proceedings, pp. 319-330, 2003, Springer, 3-540-20534-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano |
E-MHT. An Efficient Protocol for Certificate Status Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers, pp. 410-424, 2003, Springer, 3-540-20827-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli |
Automated Analysis of Some Security Mechanisms of SCEP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings, pp. 414-427, 2002, Springer, 3-540-44270-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Bogdan C. Popescu, Maarten van Steen, Andrew S. Tanenbaum |
A Security Architecture for Object-Based Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 18th Annual Computer Security Applications Conference (ACSAC 2002), 9-13 December 2002, Las Vegas, NV, USA, pp. 161-171, 2002, IEEE Computer Society, 0-7695-1828-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Yuji Watanabe, Hideki Imai |
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 290-305, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
25 | Ilari Lehti, Pekka Nikander |
Certifying Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings, pp. 83-98, 1998, Springer, 3-540-64693-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
25 | Anas Tarah, Christian Huitema |
Associating Metrics to Certification Paths. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 175-189, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
23 | Ahmad Samer Wazan, Romain Laborde, François Barrère, Abdelmalek Benzekri |
Validating X.509 Certificates Based on their Quality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2055-2060, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Shinsaku Kiyomoto, Toshiaki Tanaka |
Anonymous attribute authentication scheme using self-blindable certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings, pp. 215-217, 2008, IEEE, 978-1-4244-2414-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Ana Isabel González-Tablas Ferreres, Benjamín Ramos Álvarez, Arturo Ribagorda Garnacho |
Spatial-Temporal Certification Framework and Extension of X.509 Attribute Certificate Framework and SAML Standard to Support Spatial-Temporal Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 321-329, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Spatial-temporal certification, X.509 AC, SAML |
23 | Wun-She Yap, Swee-Huay Heng, Bok-Min Goi |
Cryptanalysis of Some Proxy Signature Schemes Without Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings, pp. 115-126, 2007, Springer, 978-3-540-72353-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
attack, Proxy signature, identity-based, certificateless |
23 | Jiangtao Li 0001, Ninghui Li |
OACerts: Oblivious Attribute Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 3(4), pp. 340-352, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, access controls, Security and privacy protection, cryptographic controls |
23 | C. Corzo, F. Corzo S., Ning Zhang 0001, Andy Carpenter |
Using Automated Banking Certificates to Detect Unauthorised Financial Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers, pp. 36-51, 2006, Springer, 3-540-46255-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
financial fraud, Data integrity, Security architecture, Insider threats |
23 | Thomas P. Jensen |
Certificates of Resource Usage on Mobile Telephones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISoLA ![In: Leveraging Applications of Formal Methods, Second International Symposium, ISoLA 2006, Paphos, Cyprus, 15-19 November 2006, pp. 6-7, 2006, IEEE Computer Society, 978-0-7695-3071-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Nitesh Saxena |
Public Key Cryptography Sans Certificates in Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, pp. 375-389, 2006, 3-540-34703-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | M. Francisca Hinarejos, Jordi Forné |
Revocation Scheme for PMI Based Upon the Tracing of Certificates Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part IV, pp. 1098-1106, 2006, Springer, 3-540-34077-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Srecko Brlek, Sardaouna Hamadou, John Mullins |
Some Remarks on the Certificates Registration of the Electronic Commerce Protocol SET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICT/ICIW ![In: Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 19-25 February 2006, Guadeloupe, French Caribbean, pp. 119, 2006, IEEE Computer Society, 0-7695-2522-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Sonja Glavaski, Antonis Papachristodoulou, Kartik B. Ariyur |
Safety Verification of Controlled Advanced Life Support System Using Barrier Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HSCC ![In: Hybrid Systems: Computation and Control, 8th International Workshop, HSCC 2005, Zurich, Switzerland, March 9-11, 2005, Proceedings, pp. 306-321, 2005, Springer, 3-540-25108-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Jiangtao Li 0001, Ninghui Li |
OACerts: Oblivious Attribute Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, pp. 301-317, 2005, 3-540-26223-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Mark Sherriff |
Utilizing verification and validation certificates to estimate software defect density. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEC/SIGSOFT FSE ![In: Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2005, Lisbon, Portugal, September 5-9, 2005, pp. 381-384, 2005, ACM, 1-59593-014-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
validation and verification management, reliability estimation, software reliability engineering |
23 | Klaus Vogstad |
Combining System Dynamics and Experimental Economics to Analyse the Design of Tradable Green Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Satoshi Koga, Jae-Cheol Ryou 0001, Kouichi Sakurai |
Pre-production Methods of a Response to Certificates with the Common Status - Design and Theoretical Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 85-97, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Babak Sadighi Firozabadi |
Using Attribute Certificates for Creating Management Structures (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers, pp. 146-150, 2001, Springer, 3-540-44263-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
23 | Douglas R. Stinson, Reto Strobl |
Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings, pp. 417-434, 2001, Springer, 3-540-42300-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
23 | Petra Wohlmacher |
Digital certificates: a survey of revocation methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia Workshops ![In: Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30 - November 3, 2000, pp. 111-114, 2000, ACM Press, 1-58113-311-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
CRS, CRT, revocation, digital certificate, CRL, public-key certificate, X.509, attribute certificate, OCSP |
23 | Georg Gottlob, Nicola Leone, Francesco Scarcello |
Computing LOGCFL Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 26th International Colloquium, ICALP'99, Prague, Czech Republic, July 11-15, 1999, Proceedings, pp. 361-371, 1999, Springer, 3-540-66224-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
23 | Magnus Nyström, John G. Brainard |
An X.509-Compatible Syntax for Compact Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CQRE ![In: Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30 - December 2, 1999, Proceedings, pp. 76-93, 1999, Springer, 3-540-66800-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
23 | Pekka Nikander, Yki Kortesniemi, Jonna Partanen |
Preserving Privacy in Distributed Delegation with Fast Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 136-153, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
23 | James M. Hayes |
Secure In-Band Update of Trusted Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 8th Workshop on Enabling Technologies (WETICE '99), Infrastructure for Collaborative Enterprises, 16-18 June 1999, Stanford, CA, USA, Proceedings, pp. 168-173, 1999, IEEE Computer Society, 0-7695-0365-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
23 | Stefan Brands |
Restrictive Blinding of Secret-Key Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding, pp. 231-247, 1995, Springer, 3-540-59409-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
23 | Don Davis, Ralph R. Swick |
Network Security via Private-Key Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 24(4), pp. 64-67, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
17 | H. Gilbert Miller, James L. Fisher |
Requiring Strong Credentials: What's Taking So Long?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IT Prof. ![In: IT Prof. 12(1), pp. 57-60, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Smart IT, authentication, authorization, cybersecurity, digital certificates, public-key infrastructure (PKI) |
17 | Stefan Miltchev, Jonathan M. Smith, Vassilis Prevelakis, Angelos D. Keromytis, Sotiris Ioannidis |
Decentralized access control in distributed file systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Comput. Surv. ![In: ACM Comput. Surv. 40(3), pp. 10:1-10:30, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
decentralized access control, Authentication, authorization, certificates, trust management, credentials, networked file systems |
17 | Esben Dalsgaard, Kåre Kjelstrøm, Jan Riis |
A federation of web services for Danish health care. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA, pp. 112-121, 2008, ACM, 978-1-60558-066-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
WS-trust, X509 certificates, security token service, web services, SOA, digital signatures, SOAP, health care, single sign on, SAML, federated identity management, electronic patient records |
17 | Paul C. van Oorschot, Tao Wan 0004, Evangelos Kranakis |
On interdomain routing security and pretty secure BGP (psBGP). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 10(3), pp. 11, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authentication, trust, certificates, BGP, public-key infrastructure, interdomain routing, secure routing protocols |
17 | Katerina Stamou, Fredrik Hedman, Anthony Iliopoulos |
Extending UNICORE 5 Authentication Model by Supporting Proxy Certificate Profile Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Euro-Par Workshops ![In: Euro-Par 2007 Workshops: Parallel Processing, HPPC 2007, UNICORE Summit 2007, and VHPC 2007, Rennes, France, August 28-31, 2007, Revised Selected Papers, pp. 104-111, 2007, Springer, 978-3-540-78472-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RFC 3280, authentication, grid, interoperability, authorization, X.509, UNICORE, proxy certificates |
17 | Billy Bob Brumley, Kaisa Nyberg |
Differential Properties of Elliptic Curves and Blind Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 376-389, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
differential uniformity, implicit public key certificates, key issuing protocols, provable security, Elliptic curves, blind signatures, digital signature schemes, message recovery |
17 | Alain P. Hiltgen, Thorsten Kramp, Thomas Weigold |
Secure Internet Banking Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(2), pp. 21-29, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
short-time passwords, short-lived passwords, taxonomy of attacks, authentication, Internet banking, public-key certificates |
17 | Changjie Wang, Dickson K. W. Chiu, Ho-fung Leung |
Anonymity and Security Support for Persistent Enterprise Conversation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 16-20 October 2006, Hong Kong, China, pp. 471-476, 2006, IEEE Computer Society, 0-7695-2558-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
alias certificates, Anonymity, privacy protection, verifiability, anonymity revocation, cryptograph |
17 | Ezra Brown, Bruce T. Myers, Jerome A. Solinas |
Hyperelliptic Curves with Compact Parameters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 36(3), pp. 245-261, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
public-key cryptography, certificates, hyperelliptic curves, complex multiplication |
17 | Yuqun Chen, Mehmet Kivanç Mihçak, Darko Kirovski |
Certifying authenticity via fiber-infused paper. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGecom Exch. ![In: SIGecom Exch. 5(3), pp. 29-37, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
anti-piracy, certificates of authenticity, counterfeit deterrence, security, economics |
17 | Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum |
How to incorporate revocation status information into the trust metrics for public-key certification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 1594-1598, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
PKI, revocation, public key certificates, trust metrics |
17 | Douglas E. Ennis |
The wireless tightrope: an economical, secure, and user friendly approach for the wireless campus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 33rd Annual ACM SIGUCCS Conference on User Services 2005, Monterey, CA, USA, November 6-9, 2005, pp. 62-67, 2005, ACM, 1-59593-200-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
EAP-TLS, MSCHAPv2, PEAP, SSL certificates, SWAN, WLCCP, WEP, 802.1X |
17 | Mary Anne Patton, Audun Jøsang |
Technologies for Trust in Electronic Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Commer. Res. ![In: Electron. Commer. Res. 4(1-2), pp. 9-21, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
payment intermediaries, trustmark seals, mathematical trust models, alternative dispute resolution mechanisms, security, privacy, cryptography, trust, e-commerce, embodied conversational agents, reputation systems, digital certificates |
17 | Marian Ventuneac, Tom Coffey, Ioan Salomie |
A policy-based security framework for Web-enabled applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISICT ![In: Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, Dublin, Ireland, September 24-26, 2003, pp. 487-492, 2003, Trinity College Dublin. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
software architectures, security policy, security model, Web-based applications, digital certificates, security framework |
17 | Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati |
Securing SOAP e-services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 1(2), pp. 100-115, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Access control, SOAP, E-services, Digital certificates |
17 | C. Joncheng Kuo, Polar Humenn |
Dynamically authorized role-based access control for secure distributed computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
XML Security ![In: Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002, pp. 97-103, 2002, ACM, 1-58113-632-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
XML-based security assertions, authorization domain, CORBA, Role-based access control, attribute certificates |
17 | Ninghui Li, John C. Mitchell, William H. Winsborough |
Design of a Role-Based Trust-Management Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2002 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002, pp. 114-130, 2002, IEEE Computer Society, 0-7695-1543-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
access control, role-based access control, trust management, distributed system security, attribute-based access control, attribute certificates |
17 | Lisa Hellerstein, Vijay Raghavan 0002 |
Exact learning of DNF formulas using DNF hypotheses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings on 34th Annual ACM Symposium on Theory of Computing, May 19-21, 2002, Montréal, Québec, Canada, pp. 465-473, 2002, ACM, 1-58113-495-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
representations of boolean functions, algorithms, certificates, complexity theory, computational learning theory, disjunctive normal form, DNF |
17 | Joon S. Park, Ravi S. Sandhu, Gail-Joon Ahn |
Role-based access control on the web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 4(1), pp. 37-71, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
WWW security, World Wide Web (WWW), role-based access control, cookies, digital certificates |
17 | Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati |
Fine grained access control for SOAP E-services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the Tenth International World Wide Web Conference, WWW 10, Hong Kong, China, May 1-5, 2001, pp. 504-513, 2001, ACM, 1-58113-348-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Internet, XML, XML, access control, certificates, roles, SOAP |
17 | Walt Yao, Ken Moody, Jean Bacon |
A model of OASIS role-based access control and its support for active security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 171-181, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
RBAC, role based access control, policy, service level agreements, certificates, OASIS |
17 | Lisa Hellerstein, Krishnan Pillaipakkamnatt, Vijay Raghavan 0002, Dawn Wilkins |
How Many Queries Are Needed to Learn? ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 43(5), pp. 840-862, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
exact identification, polynomial-query learning, polynomial-time learning, proper learning, certificates, membership queries, equivalence queries, polynomial-time hierarchy |
17 | Jose L. Muñoz, Oscar Esparza, Jordi Forné, Esteve Pallarès |
Design and implementation of a lightweight online certificate validation service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 41(3), pp. 229-241, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Certification, Public key infrastructure, Revocation, OCSP |
17 | Chung-Ming Ou, Chung-Ren Ou |
Security of Intelligent Agents in the Web-Based Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Agents in the Evolution of Web and Applications ![In: Intelligent Agents in the Evolution of Web and Applications, pp. 303-329, 2009, Springer, 978-3-540-88070-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Minkyoung Cho, David M. Mount, Eunhui Park |
Maintaining Nets and Net Trees under Incremental Motion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISAAC ![In: Algorithms and Computation, 20th International Symposium, ISAAC 2009, Honolulu, Hawaii, USA, December 16-18, 2009. Proceedings, pp. 1134-1143, 2009, Springer, 978-3-642-10630-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy |
TruWallet: trustworthy and migratable wallet-based web authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, STC 2009, Chicago, Illinois, USA, November 13, 2009, pp. 19-28, 2009, ACM, 978-1-60558-788-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
password wallet, secure migration, trusted computing, phishing, identity theft |
17 | Dingguo Yu, Nan Chen |
The Improving of IKE with PSK for Using in Mobile Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 331-334, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Vanderson Botelho, Fabrício Enembreck, Bráulio Coelho Ávila, Hilton de Azevedo, Edson Emílio Scalabrin |
Encrypted certified trust in multi-agent system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the 13th International Conference on Computers Supported Cooperative Work in Design, CSCWD 2009, April 22-24, 2009, Santiago, Chile, pp. 227-232, 2009, IEEE, 978-1-4244-3534-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Bo Zhang 0020, Qiuliang Xu |
Certificateless Proxy Blind Signature Scheme from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, WKDD 2009, Moscow, Russia, 23-25 January 2009, pp. 573-576, 2009, IEEE Computer Society, 978-0-7695-3543-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Mansoor Alicherry, Angelos D. Keromytis |
DoubleCheck: Multi-path verification against man-in-the-middle attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), July 5-8, Sousse, Tunisia, pp. 557-563, 2009, IEEE Computer Society, 978-1-4244-4672-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 1679 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|