|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 859 occurrences of 387 keywords
|
|
|
Results
Found 989 publication records. Showing 989 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
36 | Namje Park, Kiyoung Moon, Jongsu Jang, Sungwon Sohn, Dongho Won |
Implementation of Streamlining PKI System for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part I, pp. 609-618, 2005, Springer, 3-540-25860-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Sara Sinclair, Sean W. Smith |
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA, pp. 419-430, 2005, IEEE Computer Society, 0-7695-2461-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Roshan K. Thomas |
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 232-245, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Tobias Straub, Harald Baier |
A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 112-125, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Jabeom Gu, Sehyun Park, Ohyoung Song, Jaeil Lee |
A PKI-Based Authentication Framework for Next Generation Mobile Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Human.Society@Internet 2003 ![In: Web Communication Technologies and Internet-Related Social Issues - HSI 2003, Second International Conference on Human Society@Internet, Seoul, Korea, June 18-20, 2003, Proceedings, pp. 34-43, 2003, Springer, 3-540-40456-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Jianying Zhou 0001 |
Efficient Signature Validation Based on a New PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies, 4th International Conference, EC-Web, Prague, Czech Republic, September 2-5, 2003, Proceedings, pp. 94-103, 2003, Springer, 3-540-40808-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Jaepil Yoo, Keecheon Kim, Hyunseung Choo, Jaeil Lee, JooSeok Song |
Secure and Scalable Mobile IP Registration Scheme Using PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2003, International Conference, Montreal, Canada, May 18-21, 2003, Proceedings, Part II, pp. 220-229, 2003, Springer, 3-540-40161-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Edward Bubnis, Shelby Evans, Peter Fischer, Elizabeth Meighan, Aswin Almeida |
Open-Source PKI on SELinux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISCEX (2) ![In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 22-24 April 2003, Washington, DC, USA, pp. 170-175, 2003, IEEE Computer Society, 0-7695-1897-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Qi He, Katia P. Sycara, Zhongmin Su |
A Solution to Open Standard of PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings, pp. 99-110, 1998, Springer, 3-540-64732-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
36 | Dae Hyun Yum, Pil Joong Lee |
A Distributed Online Certificate Status Protocol Based on GQ Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 471-480, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Security, distributed system, PKI, certificate revocation, OCSP |
36 | Carl M. Ellison, Steve Dohrmann |
Public-key support for group collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 6(4), pp. 547-565, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
S/MIME, SDSI, PKI, Human-computer interface, IPsec, PGP, SSH, SPKI |
36 | Mehdi-Laurent Akkar, Nicolas T. Courtois, Romain Duteuil, Louis Goubin |
A Fast and Secure Implementation of Sflash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, pp. 267-278, 2003, Springer, 3-540-00324-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Matsumoto-Imai cryptosystem C*, C*- trapdoor function, Digital Signatures, Smart cards, DPA, PKI, Power Analysis, SPA, portable devices, Addition Chains, Multivariate Cryptography, HFE |
36 | Kapali Viswanathan, Ashutosh Saxena |
Towards Logically and Physically Secure Public-Key Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002, pp. 122-134, 2002, Springer, 3-540-00263-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
critical keys, private keys, controlled use, PKI, backup |
35 | Josep Domingo-Ferrer |
On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 180-190, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
PKI and eCommerce, Certificate Directories, Coin-Based Payments, PayTree, Certificate Verification Trees, Protocols, Micropayments |
35 | Yuh-Jong Hu |
Trusted Agent-Mediated E-Commerce Transaction Services via Digital Certificate Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Commer. Res. ![In: Electron. Commer. Res. 3(3-4), pp. 221-243, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
agent-oriented PKI, agent-mediated e-commerce (AMEC), agent trust and delegation, FIPA standards, digital certificate |
33 | Pavan Kumar Pandey, Vineet Kansal, Abhishek Swaroop |
PKI-SMR: PKI based secure multipath routing for unmanned military vehicles (UMV) in VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 30(2), pp. 595-615, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
33 | Amrutanshu Panigrahi, Ajit Kumar Nayak, Rourab Paul, Bibhuprasad Sahu, Shashi Kant |
CTB-PKI: Clustering and Trust Enabled Blockchain Based PKI System for Efficient Communication in P2P Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 124277-124290, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
33 | Louise Axon, Michael Goldsmith |
PB-PKI: A Privacy-aware Blockchain-based PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017., pp. 311-318, 2017, SciTePress, 978-989-758-259-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
33 | Martín A. Gagliotti Vigil, Cristian Thiago Moecke, Ricardo Felipe Custódio, Melanie Volkamer |
The Notary Based PKI - A Lightweight PKI for Long-Term Signatures on Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructures, Services and Applications - 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers, pp. 85-97, 2012, Springer, 978-3-642-40011-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
33 | Gisela Quiring-Kock |
PKI für Bürger - transparent, sicher, datenschutzgerecht? - Teil I: Public Key Infrastrukturen (PKI) - Anforderungen an die Anwendungen. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 33(7), pp. 391-395, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Gisela Quiring-Kock |
PKI für Bürger - transparent, sicher, datenschutzgerecht? - Teil II: Public Key Infrastrukturen (PKI) - Anforderungen an die technischen Standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 33(7), pp. 396-398, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Benamar Kadri, Mohammed Feham, Abdallah M'hamed |
Securing reactive routing protocols in MANETs using PKI (PKI-DSR). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2(4), pp. 341-350, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Sachar Paulus |
PKI als Grundlage für SOA - Service-Vertrauensmanagement ist nur mit PKI in den Griff zu bekommen. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 31(9), pp. 676-680, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Dionysis Kefallinos, Maria A. Lambrou, Efstathios D. Sykas |
Secure PKI-enabled e-government infrastructures implementation: the SYZEFXIS-PKI case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Gov. an Int. J. ![In: Electron. Gov. an Int. J. 3(4), pp. 420-438, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Peter Gutmann |
Plug-and-Play PKI: A PKI Your Mother Can Use. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
33 | Tilo Schürer |
Zentrale PKI-Lösungen und deren Anwendung in TrustServices - Eine Übergangslösung für das Dezentralisierungsproblem herkömmlicher PKI am Beispiel des SET WalletServers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 24(10), 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
33 | Stephen Farrell |
Not Reinventing PKI until We Have Something Better. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 15(5), pp. 95-98, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
reinvention, PKI, Internet security, X.509 |
33 | Shigeaki Tanimoto, Masahiko Yokoi, Hiroyuki Sato, Atsushi Kanai |
Quantifying Cost Structure of Campus PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 11th Annual International Symposium on Applications and the Internet, SAINT 2011, Munich, Germany, 18-21 July, 2011, Proceedings, pp. 315-320, 2011, IEEE Computer Society, 978-1-4577-0531-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Work Breakdown Structure, Cost Structure, PKI |
33 | Chun-Ta Li, Min-Shiang Hwang |
Improving the Security of Non-PKI Methods for Public Key Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009, pp. 1695-1696, 2009, IEEE Computer Society, 978-0-7695-3596-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Security, Cryptanalysis, PKI, X.509 |
33 | Radia J. Perlman, Charlie Kaufman |
User-centric PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA, pp. 59-71, 2008, ACM, 978-1-60558-066-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
web services, authentication, PKI, single sign-on |
33 | Ralph Holz, Heiko Niedermayer, Peter Hauck, Georg Carle |
Trust-Rated Authentication for Domain-Structured Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 74-88, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Trust-Rating, Distributed Systems, Peer-to-Peer, Authentication, Protocols, PKI, Multi-Domain |
33 | Klaus Schmeh |
A Critical View on RFC 3647. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 369-374, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Certification Practice Statement, Certificate Policy, CP, PKI, CPS |
33 | Bob Blakley 0001, G. R. Blakley |
All sail, no anchor II: Acceptable high-end PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 2(2), pp. 66-77, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Digital signature, Signature, PKI, Law, RSA cryptosystem, Nonrepudiation |
29 | David J. Boyd |
TLS client handshake with a payment card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 23rd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2009, Rome, Italy, May 23-29, 2009, pp. 1-8, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Alexandra Boldyreva, Vipul Goyal, Virendra Kumar |
Identity-based encryption with efficient revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 417-426, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
provable security, revocation, identity-based encryption |
29 | Sun Jing, Ma Yu-Jian, Zhao Hui-Qun, Xiao Hui-Bin |
A Study on the Design and Implementation of EPCIS Trust Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 713-716, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Pierre Parrend, Samuel Galice, Stéphane Frénot, Stéphane Ubéda |
Identity-Based Cryptosystems for Enhanced Deployment of OSGi Bundles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the First International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2007, October 14-20, 2007, Valencia, Spain, pp. 193-200, 2007, IEEE Computer Society, 0-7695-2989-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Michelle S. Wangham, Emerson Ribeiro de Mello, Joni da Silva Fraga, Davi da Silva Böger |
A Model to support SPKI Federations management through XKMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2007 IEEE International Conference on Web Services (ICWS 2007), July 9-13, 2007, Salt Lake City, Utah, USA, pp. 338-345, 2007, IEEE Computer Society, 0-7695-2924-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
Achieving DRBAC Authorization in Multi-trust Domains with MAS Architecture and PMI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRIMA ![In: Agent Computing and Multi-Agent Systems, 10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007, Bangkok, Thailand, November 21-23, 2007. Revised Papers, pp. 339-348, 2007, Springer, 978-3-642-01638-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Distributed Role Based Access Control, Privilege Management Infrastructure, Multi-Agent Systems, Authentication, Public Key Infrastructure |
29 | Hyeokchan Kwon, Sangchoon Kim, Jaehoon Nah, Jongsoo Jang |
Public Key Management Framework for Two-tier Super Peer Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), June 25-29, 2007, Toronto, Ontario, Canada, pp. 72, 2007, IEEE Computer Society, 0-7695-2881-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Hisashi Mohri, Ikuya Yasuda, Yoshiaki Takata, Hiroyuki Seki |
Certificate Chain Discovery in Web of Trust for Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (2) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 2, May 21-23, 2007, Niagara Falls, Canada, pp. 479-485, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | David Galindo, Javier Herranz, Eike Kiltz |
On the Generic Construction of Identity-Based Signatures with Additional Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 178-193, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Haeryong Park, Hak Soo Ju, Kilsoo Chun, Jaeil Lee, Seungho Ahn, Bongnam Noh |
The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS (2) ![In: 12th International Conference on Parallel and Distributed Systems, ICPADS 2006, Minneapolis, Minnesota, USA, July 12-15, 2006, pp. 55-60, 2006, IEEE Computer Society, 0-7695-2612-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ID-based threshold decryption(ID-ThD), Dynamic group management, Wireless network, Key escrow |
29 | Heng Pan, Yuefei Zhu, ZhengYun Pan, XianLing Lu |
An Efficient Scheme of Merging Multiple Public Key Infrastructures in ERP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIM ![In: Advances in Web-Age Information Management, 6th International Conference, WAIM 2005, Hangzhou, China, October 11-13, 2005, Proceedings, pp. 919-924, 2005, Springer, 3-540-29227-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Kemal Bicakci, Nazife Baykal |
A New Design of Privilege Management Infrastructure with Binding Signature Semantics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 306-313, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
binding signature semantics, digital signature, revocation, attribute certificate, PMI |
29 | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Josep Pegueroles, Esteve Pallarès |
Reducing the Communication Overhead of an Offline Revocation Dictionary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings, pp. 269-278, 2004, Springer, 3-540-22919-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Anwitaman Datta, Manfred Hauswirth, Karl Aberer |
Beyond "web of trust": Enabling P2P E-commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 24-27 June 2003, Newport Beach, CA, USA, pp. 303-312, 2003, IEEE Computer Society, 0-7695-1969-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Montse Rubia, Juan Carlos Cruellas, Manuel Medina |
The DEDICA Project: The Solution to the Interoperability Problems between the X.509 and EDIFACT Public Key Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CQRE ![In: Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30 - December 2, 1999, Proceedings, pp. 242-250, 1999, Springer, 3-540-66800-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
29 | Montse Rubia, Juan Carlos Cruellas, Manuel Medina |
Removing Interoperability Barriers Between the X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 245-262, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
29 | Barbara Fox, Brian A. LaMacchia |
Certificate Recocation: Mechanics and Meaning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings, pp. 158-164, 1998, Springer, 3-540-64951-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
29 | Ueli M. Maurer |
Modelling a Public-Key Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings, pp. 325-350, 1996, Springer, 3-540-61770-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
cryptography, trust, recommendations, key management, probabilistic logic, Distributed system security, public-key certification |
26 | André Zúquete, Helder Gomes, João Paulo da Silva Cunha |
Authentication Architecture for Region-Wide e-Health System with Smartcards and a PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIOSTEC (Selected Papers) ![In: Biomedical Engineering Systems and Technologies, International Joint Conference, BIOSTEC 2008, Funchal, Madeira, Portugal, January 28-31, 2008, Revised Selected Papers, pp. 479-492, 2008, Springer, 978-3-540-92218-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Konstantin Hyppönen, Marko Hassinen, Elena Trichina |
Pseudonymous Mobile Identity Architecture Based on Government-Supported PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 107-118, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Maryline Laurent-Maknavicius |
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECUMN ![In: Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 14-16 February 2007, Toulouse, France, pp. 433-438, 2007, IEEE Computer Society, 978-0-7695-2768-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han |
Home Device Authentication Method Based on PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (2) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 7-11, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Chung-Ming Ou, Chung-Ren Ou |
Non-repudiation Mechanism of Agent-Based Mobile Payment Systems: Perspectives on Wireless PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES-AMSTA ![In: Agent and Multi-Agent Systems: Technologies and Applications, First KES International Symposium, KES-AMSTA 2007, Wroclaw, Poland, May 31- June 1, 2007, Proceedings, pp. 298-307, 2007, Springer, 978-3-540-72829-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Gabriel Vanrenen, Sean W. Smith, John Marchesini |
Distributing security-mediated PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 5(1), pp. 3-17, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Peer-to-peer, Trusted computing, SEM |
26 | Marko Hassinen, Konstantin Hyppönen, Keijo Haataja |
An Open, PKI-Based Mobile Payment System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETRICS ![In: Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings, pp. 86-100, 2006, Springer, 3-540-34640-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Lenka Kadlcáková |
A Guide to the Nightmares of the Certification Service Provider. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 251-253, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Jae-Pyo Park, Hong-jin Kim, Keun-Wang Lee, Keun-Soo Lee |
A PKI Based Digital Rights Management System for Safe Playback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (2) ![In: Advances in Intelligent Computing, International Conference on Intelligent Computing, ICIC 2005, Hefei, China, August 23-26, 2005, Proceedings, Part II, pp. 801-810, 2005, Springer, 3-540-28227-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Florina Almenárez, Mildrey Carbonell, Jordi Forné, M. Francisca Hinarejos, Marc Lacoste, Andrés Marín López, José A. Montenegro |
Design of an Enhanced PKI for Ubiquitous Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 22-26 August 2005, Copenhagen, Denmark, pp. 262-266, 2005, IEEE Computer Society, 0-7695-2424-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Liang Cai, Xiaohu Yang 0001, Chun Chen |
Design and Implementation of a Server-Aided PKI Service (SaPKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan, pp. 859-864, 2005, IEEE Computer Society, 0-7695-2249-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Mark Franklin, Kevin Mitcham, Sean W. Smith, Joshua Stabiner, Omen Wild |
CA-in-a-Box. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 180-190, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Aleksej Jerman Blazic, Peter Sylvester |
Provision of Long-Term Archiving Service for Digitally Signed Documents Using an Archive Interaction Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 240-254, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 191-205, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Keun-Wang Lee, Jae-Pyo Park, Kwang-Hyoung Lee, Jong-Hee Lee, HeeSook Kim |
The Design of a DRM System Using PKI and a Licensing Agent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC ![In: Network and Parallel Computing, IFIP International Conference, NPC 2004, Wuhan, China, October 18-20, 2004, Proceedings, pp. 611-617, 2004, Springer, 3-540-23388-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Gabriel Vanrenen, Sean W. Smith |
Distributing Security-Mediated PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 218-231, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Agapios N. Platis, Costas Lambrinoudakis, Assimakis K. Leros |
A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 149-159, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Inkyoung Jeun, Jongwook Park, TaeKyu Choi, Sang Wan Park, BaeHyo Park, ByungKwon Lee, YongSup Shin |
A Best Practice for Root CA Key Update in PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 278-291, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Francesco Palmieri 0002 |
A Scalable PKI for Secure Routing in the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 882-894, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Antonio Fernandez Gómez-Skarmeta, Gregorio Martínez Pérez, Óscar Cánovas Reverte, Gabriel López Millán |
PKI Services for IPv6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 7(3), pp. 36-42, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Edward Bubnis, Shelby Evans, Peter Fischer, Elizabeth Meighan, Aswin Almeida |
Open-Source PKI on SELinux A Technology Description. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISCEX (2) ![In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 22-24 April 2003, Washington, DC, USA, pp. 4-6, 2003, IEEE Computer Society, 0-7695-1897-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Stephen T. Kent |
Rethinking PKI: What's Trust Got to Do with It? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 398-399, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Grit Denker, Jonathan K. Millen, Yutaka Miyake |
Cross-Domain Access Control via PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 5-7 June 2002, Monterey, CA, USA, pp. 202-205, 2002, IEEE Computer Society, 0-7695-1611-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Tin-Wo Cheung, Samuel T. Chanson |
Design and Implementation of a PKI-Based End-to-End Secure Infrastructure for Mobile E-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE (1) ![In: Proceedings of the 2nd International Conference on Web Information Systems Engineering, WISE'01, Organized by WISE Society and Kyoto University, Kyoto, Japan, 3-6 December 2001, Volume 1 (Main program), pp. 3-7, 2001, IEEE Computer Society, 0-7695-1393-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Luigi Romano, Antonino Mazzeo, Nicola Mazzocca |
SECURE: A Simulation Tool for PKI Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CQRE ![In: Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30 - December 2, 1999, Proceedings, pp. 17-29, 1999, Springer, 3-540-66800-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
26 | Jim Basney, Terry Fleury, Von Welch |
Federated login to TeraGrid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDtrust 2010, Gaithersburg, Maryland, USA, April 13-15, 2010, pp. 1-11, 2010, ACM, 978-1-60558-895-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
GridShib, MyProxy, grid computing, PKI, SAML, identity federation, Shibboleth, TeraGrid |
26 | Chung-Ming Ou, Chung-Ren Ou |
Adaptation of proxy certificates to non-repudiation protocol of agent-based mobile payment systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Intell. ![In: Appl. Intell. 30(3), pp. 233-243, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mobile agent, PKI, Non-repudiation, Mobile payment, Proxy certificate |
26 | Shouhuai Xu, Moti Yung |
Expecting the Unexpected: Towards Robust Credential Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers, pp. 201-221, 2009, Springer. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Credential infrastructures, key compromise, hit-and-run attack, hit-and-stick attack, digital signatures, PKI, insider attack |
26 | Flutra Osmani, Adriaan Slabbert |
A scalable distributed security infrastructure for industrial control and sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009, pp. 84-89, 2009, ACM, 978-1-60558-569-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
decentralized security, industrial control and sensor networks, PKI, IEEE 802.15.4, XACML |
26 | Frank Siebenlist, Rachana Ananthakrishnan, David E. Bernholdt, Luca Cinquini, Ian T. Foster, Don Middleton, Neill Miller, Dean N. Williams |
Enhancing the earth system grid security infrastructure through single sign-on and autoprovisioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SC-GCE ![In: Proceedings of the 5th Grid Computing Environments Workshop, GCE 2009, November 20, 2009, Portland, Oregon, USA, 2009, ACM, 978-1-60558-887-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ESG, SLCS, authentication, authorization, PKI, SAML, OpenID |
26 | Pei-Yih Ting, Fang-Dar Chu |
Enhancing the Security Promise of a Digital Time-Stamp. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, GinoWan, Okinawa, Japan, March 25-28, 2008, pp. 342-347, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
hierarchical distributed time source, forward-secure digital signature, PKI, time-stamps |
26 | David Mera, José Manuel Cotos, José Ramon Rios Viqueira, José Varela 0001 |
A User Management Web System Based on Portlets for a Grid Environment Integrating Shibboleth, PURSe, PERMIS and Gridsphere. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DCAI ![In: International Symposium on Distributed Computing and Artificial Intelligence, DCAI 2008, University of Salamanca, Spain, 22th-24th October 2008, pp. 19-23, 2008, Springer, 978-3-540-85862-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
PERMIS, PURSe, Grid Computing, RBAC, PKI, Portlets, Shibboleth |
26 | Yinan Yang 0002, Edward Lewis, Lawrie Brown |
Cultural and Social Aspects of Security and Privacy - The Critical Elements of Trusted Online Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (11) ![In: Usability and Internationalization. Global and Local User Interfaces, Second International Conference on Usability and Internationalization, UI-HCII 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part II, pp. 546-553, 2007, Springer, 978-3-540-73288-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Trust, PKI, social factors |
26 | Helder Gomes, João Paulo da Silva Cunha, André Zúquete |
Authentication Architecture for eHealth Professionals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II, pp. 1583-1600, 2007, Springer, 978-3-540-76835-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
role-based authorization, Authentication, certificates, PKI, eHealth |
26 | Yueh-Min Huang, Hua-Yi Lin, Tzone-I Wang |
Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 21(6), pp. 997-1011, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
CBSRP, inter-cluster, cluster-based, CA (Certificate Authority), ad hoc network, PKI, ID-based |
26 | Lars Eilebrecht |
Ciphire Mail Email Encryption and Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 211-224, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Ciphire, secure email, email encryption, email authentication, fingerprint system, digital signatures, fingerprints, certificates, PKI |
26 | Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum |
How to incorporate revocation status information into the trust metrics for public-key certification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 1594-1598, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
PKI, revocation, public key certificates, trust metrics |
26 | Dickson K. W. Chiu, Changjie Wang, Ho-fung Leung, Irene Kafeza, Eleanna Kafeza |
Supporting the legal identities of contracting agents with an agent authorization platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, Xi'an, China, August 15-17, 2005, pp. 721-728, 2005, ACM, 1-59593-112-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
agent certificate, legal identity, intelligent agents, authorization, PKI, e-contract |
26 | Cristian Marinescu, Nicolae Tapus |
Some Critical Aspects of the PKIX TSP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings, pp. 286-288, 2005, Springer, 3-540-28791-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
TSA, PKIX TSP, security, PKI, time-stamp |
26 | Brian Lehane, Linda Doyle, Donal O'Mahony |
Ad Hoc Key Management Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (2) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 2, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 540-545, 2005, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
SKI, Security, Ad hoc networks, Key Management, PKI |
26 | Richard Guida, Robert Stahl, Thomas Bunt, Gary Secrest, Joseph Moorcones |
Deploying and Using Public Key Technology: Lessons Learned in Real Life. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(4), pp. 67-71, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Johnson & Johnson, PKI, public key infrastructure |
26 | Georgios Kambourakis, Angelos N. Rouskas, Dimitris Gritzalis |
Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 287-296, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
AKA, WLAN, UMTS, PKI, TLS, EAP |
26 | Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis |
Delivering Attribute Certificates over GPRS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004, pp. 1166-1170, 2004, ACM, 1-58113-812-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
performance evaluation, UMTS, PKI, GPRS, attribute certificates |
26 | Dae Hyun Yum, Pil Joong Lee |
Separable Implicit Certificate Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 121-136, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
certificate-based encryption, PKI, certificate revocation |
26 | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano |
Implementation of an Efficient Authenticated Dictionary for Certificate Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey, pp. 238-243, 2003, IEEE Computer Society, 0-7695-1961-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
AD and OCSP, Public key cryptography, PKI, CRT, certificate revocation, CRL |
26 | Dae Hyun Yum, Jae Eun Kang, Pil Joong Lee |
Advanced Certificate Status Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings, pp. 229-240, 2003, Springer, 3-540-40797-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
ACSP, PKI, certificate revocation, CRL, OCSP |
26 | Ninghui Li, Joan Feigenbaum |
Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings, pp. 157-168, 2001, Springer, 3-540-44079-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
Certificates, PKI, Revocation, CRL |
26 | Diana Berbecaru, Antonio Lioy, Marius Marian |
On the Complexity of Public-Key Certificate Validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings, pp. 183-203, 2001, Springer, 3-540-42662-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
certificate validation, DPD, DPV, PKI, certificate revocation, CRL, OCSP |
26 | Peter Gutmann |
A Reliable, Scalable General-Purpose Certificate Store. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 278-287, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
general-purpose certificate store, scalability, standards, operating system, software reliability, software reliability, availability, public key cryptography, public key cryptography, PKI, error recovery, authorisation |
Displaying result #101 - #200 of 989 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|