|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2584 occurrences of 1325 keywords
|
|
|
Results
Found 5165 publication records. Showing 5165 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
50 | ShaoHua Qin, Zimu Li, Cai Qingsong, Jianping Hu |
Segment-Based Adaptive Caching for Streaming Media Delivery on the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCW ![In: Web Content Caching and Distribution: 9th International Workshop, WCW 2004, Beijing, China, October 18-20, 2004. Proceedings, pp. 116-128, 2004, Springer, 3-540-23516-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
prefix caching, streaming media delivery, multicast, Streaming media, proxy caching |
48 | Jun Shao, Zhenfu Cao |
CCA-Secure Proxy Re-encryption without Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 357-376, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Unidirectional PRE, DDH, CCA security, random oracle, collusion-resistance |
48 | Olatunde O. Abiona, Tricha Anjali, Lawrence O. Kehinde |
Simulation of a cyclic multicast proxy server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIT ![In: 2008 IEEE International Conference on Electro/Information Technology, EIT 2008, held at Iowa State University, Ames, Iowa, USA, May 18-20, 2008, pp. 102-107, 2008, IEEE, 978-1-4244-2030-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Faustina Hwang, Helen Batson, Nitin Williams |
Bringing the target to the cursor: proxy targets for older adults. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, CHI 2008, Florence, Italy, April 5-10, 2008, pp. 2775-2780, 2008, ACM, 978-1-60558-012-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ageing, fitts' law, pointing device, target selection |
48 | Zoe Lin Jiang, Siu-Ming Yiu, Lucas Chi Kwong Hui, Y. Dong, Starsky H. Y. Wong |
Chained Threshold Proxy Signature without and with Supervision. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 837-840, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Yanlin Qin, Xiaoping Wu |
Cryptanalysis and Improvement of Two Blind Proxy Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 762-765, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Youan Xiao, Zude Zhou |
A New Kind of Self-Certified Proxy Digital Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 766-769, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Jianhong Zhang |
An Improved Designated-Verifier Proxy Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE NAS ![In: International Conference on Networking, Architecture, and Storage, NAS 2007, 29-31 July 2007, Guilin, China, pp. 77-82, 2007, IEEE Computer Society, 0-7695-2927-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Chiung-Chou Tsai, Kuan-Chieh Liao, Tzungher Chen, Wei-Bin Lee |
Security enhancement of a novel proxy key generation protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, Beijing, China, July 24-27, 2007. Volume 2, pp. 681-688, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Min-Shiang Hwang, Shiang-Feng Tzeng, Chun-Ta Li |
A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings. Part III, pp. 273-284, 2007, Springer, 978-3-540-74482-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Atsushi Kawano, Junichi Funasaka, Kenji Ishida |
Parallel Downloading Using Variable Length Blocks for Proxy Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), June 25-29, 2007, Toronto, Ontario, Canada, pp. 59, 2007, IEEE Computer Society, 0-7695-2881-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Wai Kong Cheuk, Tai-Chiu Hsung, Daniel Pak-Kong Lun |
Design and implementation of contractual based real-time scheduler for multimedia streaming proxy server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 28(1-2), pp. 69-88, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Young-Seol Kim, Jik-Hyun Chang |
Provably Secure Proxy Blind Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISM ![In: Eigth IEEE International Symposium on Multimedia (ISM 2006), 11-13 December 2006, San Diego, CA, USA, pp. 998-1003, 2006, IEEE Computer Society, 0-7695-2746-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Sung-Kwan Youm, Meejoung Kim, Chul-Hee Kang |
Performance analysis of reliable multicast protocol using transparent proxy servers over hybrid networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 24th IEEE International Performance Computing and Communications Conference, IPCCC 2005, April 7-9, 2005, Phoenix, Arizona, USA, pp. 257-264, 2005, IEEE, 0-7803-8991-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Zhiwen Xu, Xiaoxin Guo, Zhengxuan Wang, Yunjie Pang |
The Dynamic Cache Algorithm of Proxy for Streaming Media. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (1) ![In: Advances in Intelligent Computing, International Conference on Intelligent Computing, ICIC 2005, Hefei, China, August 23-26, 2005, Proceedings, Part I, pp. 1065-1074, 2005, Springer, 3-540-28226-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Bing Wang 0001, Subhabrata Sen, Micah Adler, Donald F. Towsley |
Optimal proxy cache allocation for efficient streaming media distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 6(2), pp. 366-374, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
48 | Weimin Lang, Yunmeng Tan, Zongkai Yang, Gan Liu, Bing Peng |
A new efficient ID-based proxy blind signature scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28 - July 1, 2004, Alexandria, Egypt, pp. 407-411, 2004, IEEE Computer Society, 0-7803-8623-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
48 | Javier Herranz, Germán Sáez |
Revisiting Fully Distributed Proxy Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings, pp. 356-370, 2004, Springer, 3-540-24130-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
48 | Khaled E. A. Negm |
CARP Compliant Proxy Enforcer Frame Work. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Web Intelligence ![In: 2003 IEEE / WIC International Conference on Web Intelligence, (WI 2003), 13-17 October 2003, Halifax, Canada, pp. 118-124, 2003, IEEE Computer Society, 0-7695-1932-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
48 | Wei-hsiu Ma, David Hung-Chang Du |
Reducing bandwidth requirement for delivering video over wide area networks with proxy server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 4(4), pp. 539-550, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
48 | Naoki Wakamiya, Masayuki Murata 0001, Hideo Miyahara |
On Proxy-Caching Mechanisms for Cooperative Video Streaming in Heterogeneous Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMNS ![In: Management of Multimedia on the Internet, 5th IFIP/IEEE International Conference on Management of Multimedia Networks and Services, MMNS 2002, Santa Barbara, CA, USA, October 6-9, 2002, Proceedings, pp. 127-139, 2002, Springer, 3-540-44271-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
48 | Nayden Markatchev, Carey L. Williamson |
WebTraff: A GUI for Web Proxy Cache Workload Modeling and Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MASCOTS ![In: 10th International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2002), 11-16 October 2002, Fort Worth, Texas, USA, pp. 356-363, 2002, IEEE Computer Society, 0-7695-1840-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
48 | Takuya Okamoto, Tatsuhiko Terai, Go Hasegawa, Masayuki Murata 0001 |
A Resource/Connection Management Scheme for HTTP Proxy Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2002, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; and Mobile and Wireless Communications, Second International IFIP-TC6 Networking Conference, Pisa, Italy, May 19-24, 2002, Proceedings, pp. 252-263, 2002, Springer, 3-540-43709-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
48 | Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang 0001 |
Cut-and-Pick Transactions for Proxy Log Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: Advances in Database Technology - EDBT 2002, 8th International Conference on Extending Database Technology, Prague, Czech Republic, March 25-27, Proceedings, pp. 88-105, 2002, Springer, 3-540-43324-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
48 | Dang-Hai Hoang, Dietrich Reschke, Werner Horn |
Adaptive Quality of Service Management Using QoS Proxy and User Feedback for Wireless Links. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICS ![In: Innovative Internet Computing Systems, International Workshop IICS 2001, Ilmenau, Germany, June 21-22, 2001, Proceedings, pp. 31-40, 2001, Springer, 3-540-42275-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
48 | Kisup Kim, Hyukjoon Lee, Kwangsue Chung |
A Distributed Proxy Server System for Wireless Mobile Web Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: The 15th International Conference on Information Networking, ICOIN 2001, Beppu City, Oita, Japan, January 31 - February 2, 2001, pp. 749-756, 2001, IEEE Computer Society, 0-7695-0951-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
48 | Jongkuk Lee, Myungchul Kim, Hee Yong Youn, Yusik Hahm, Dongman Lee |
Class-Based Proxy Server for Mobile Computers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: Proceedings of the 2000 International Workshop on Parallel Processing, ICPPW 2000, Toronto, Canada, August 21-24, 2000, pp. 559-566, 2000, IEEE Computer Society, 0-7695-0771-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
48 | Sun Wu, Chang-Chain Liao |
Virtual Proxy Servers for WWW and Intelligent Agents on the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (4) ![In: 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 7-10 January 1997, Maui, Hawaii, USA, pp. 200-209, 1997, IEEE Computer Society, 0-8186-7734-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
47 | Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam 0001 |
Role-based access control (RBAC) in Java via proxy objects using annotations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings, pp. 79-88, 2010, ACM, 978-1-4503-0049-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
proxy objects, java, access control, RBAC, rmi |
47 | Hao-Ping Hung, Ming-Syan Chen |
On designing a shortest-path-based cache replacement in a transcoding proxy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 15(2), pp. 49-62, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Cache replacement, Transcoding proxy |
47 | Jian Weng 0001, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai |
Conditional proxy re-encryption secure against chosen-ciphertext attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 322-332, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
conditional proxy re-encryption, bilinear pairing, chosen-ciphertext security |
47 | Vipul Mathur, Sanket Dhopeshwarkar, Varsha Apte |
MASTH proxy: an extensible platform for web overload control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, Madrid, Spain, April 20-24, 2009, pp. 1113-1114, 2009, ACM, 978-1-60558-487-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
admission control, web server, proxy, overload, multi-class |
47 | Varad Kirtane, C. Pandu Rangan |
RSA-TBOS signcryption with proxy re-encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 8th ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008, pp. 59-66, 2008, ACM, 978-1-60558-290-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
signcryption, proxy re-encryption |
47 | Alan T. S. Ip, Jiangchuan Liu, John C. S. Lui |
COPACC: An Architecture of Cooperative Proxy-Client Caching System for On-Demand Media Streaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 18(1), pp. 70-83, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
peer-to-peer caching, media segmentation, resource allocation, Media streaming, proxy caching |
47 | Wei Wu 0001, Yi Mu 0001, Willy Susilo, Xinyi Huang 0001 |
Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, pp. 16-29, 2007, Springer, 978-3-540-77534-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security models, Proxy signatures, Undeniable signatures, Security proof, Convertible |
47 | Giuseppe Ateniese, Kevin Fu, Matthew Green 0001, Susan Hohenberger |
Improved proxy re-encryption schemes with applications to secure distributed storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 9(1), pp. 1-30, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
double decryption, key translation, bilinear maps, Proxy re-encryption |
47 | Wen-Chung Kuo, Ming-Yang Chen |
A Modified (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITA (2) ![In: Third International Conference on Information Technology and Applications (ICITA 2005), 4-7 July 2005, Sydney, Australia, pp. 576-579, 2005, IEEE Computer Society, 0-7695-2316-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
RSA, Secret Sharing, Proxy Signature |
47 | Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Futai Zhang |
Short Designated Verifier Proxy Signature from Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 835-844, 2005, Springer, 3-540-30803-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Authentication, Pairings, Proxy Signature, Short Signature |
47 | Jing Xu 0002, Zhenfeng Zhang, Dengguo Feng |
ID-Based Proxy Signature Using Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Parallel and Distributed Processing and Applications - ISPA 2005 Workshops, ISPA 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings, pp. 359-367, 2005, Springer, 3-540-29770-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
provable security, bilinear pairings, proxy signatures, ID-based signatures |
47 | Xin Li 0010, Mizuhito Ogawa |
A Lightweight Mutual Authentication Based on Proxy Certificate Trust List. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Parallel and Distributed Computing: Applications and Technologies, 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004, Proceedings, pp. 628-632, 2004, Springer, 3-540-24013-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Grid Computing, Mutual Authentication, Proxy Certificate |
47 | Peter R. Wurman, Gangshu Cai, Jie Zhong, Ashish Sureka |
An algorithm for computing the outcome of combinatorial auctions with proxy bidding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 5th International Conference on Electronic Commerce, ICEC 2003, Pittsburgh, Pennsylvania, USA, September 30 - October 03, 2003, pp. 1-8, 2003, ACM, 1-58113-788-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Auction Algorithms, Proxy Bidding, Combinatorial Auctions |
47 | Azzari Caillier Jarrett, Brian M. Dennis |
BuzzMaps: a prototype social proxy for predictive utility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Richard Tapia Celebration of Diversity in Computing Conference ![In: Proceedings of the Richard Tapia Celebration of Diversity in Computing Conference 2003, Atlanta, Georgia, USA, October 15-18, 2003, pp. 18-22, 2003, ACM. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
news syndication, world wide web, human-computer interaction, weblogs, RSS, social translucence, social proxy |
47 | Siu Fung Yeung, John C. S. Lui, David K. Y. Yau |
A case for a multi-key secure video proxy: theory, design, and implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 10th ACM International Conference on Multimedia 2002, Juan les Pins, France, December 1-6, 2002., pp. 392-401, 2002, ACM, 1-58113-620-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
asymmetric parametric sequence functions, multi-key RSA, video proxy, security |
47 | Kin Yeung Wong, Kai-Hau Yeung |
Site-Based Approach in HTTP Proxy Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: Proceedings of the 1999 International Conference on Parallel Processing Workshops, ICPPW 1999, Wakamatsu, Japan, September 21-24, 1999, pp. 228-233, 1999, IEEE Computer Society, 0-7695-0353-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Site names, Web caching, Web proxy, Internet systems |
46 | Qin Wang, Zhenfu Cao |
Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 167-172, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
46 | K. Shum, Victor K. Wei |
A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 10-12 June 2002, Pittsburgh, PA, USA, pp. 55-56, 2002, IEEE Computer Society, 0-7695-1748-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
44 | Qing Li 0063 |
A Novel Approach to Manage Asymmetric Traffic Flows for Secure Network Proxies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC ![In: Network and Parallel Computing, IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008. Proceedings, pp. 196-209, 2008, Springer, 978-3-540-88139-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Ewa Kusmierek, Yingfei Dong, David Hung-Chang Du |
Loopback: exploiting collaborative caches for large-scale streaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 8(2), pp. 233-242, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Omaima Bamasak, Ning Zhang 0001 |
A secure method for signature delegation to mobile agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004, pp. 813-818, 2004, ACM, 1-58113-812-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
signature delegation, non-repudiation, mobile agent security |
44 | Marko Niinimäki, John White, Wim Som de Cerff, Joni Hahkala, Tapio Niemi, Mikko Pitkänen |
Using Virtual Organizations Membership System with EDG's Grid Security and Database Access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August - 3 September 2004, Zaragoza, Spain, pp. 517-522, 2004, IEEE Computer Society, 0-7695-2195-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
databases, Grid, virtual organizations |
44 | Li Xiao 0001, Xiaodong Zhang 0001, Zhichen Xu |
On Reliable and Scalable Peer-to-Peer Web Document Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 15-19 April 2002, Fort Lauderdale, FL, USA, CD-ROM/Abstracts Proceedings, 2002, IEEE Computer Society, 0-7695-1573-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
44 | Ratan K. Guha, James Zijun Wang |
Improving Web Access Efficiency Using P2P Proxies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDC ![In: Distributed Computing, Mobile and Wireless Computing 4th International Workshop, IWDC 2002, Calcutta, India, December 28-31, 2002, Proceedings, pp. 24-34, 2002, Springer, 3-540-00355-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
44 | Xiaoqi Jia, Jun Shao 0001, Jiwu Jing, Peng Liu 0005 |
CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 1299-1305, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Type-based proxy re-encryption, CCA security, invisible proxy |
43 | Stefan Piger, Christian Grimm, Ralf Groeper, Christopher Kunz |
A Comprehensive Approach to Self-Restricted Delegation of Rights in Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 19-22 May 2008, Lyon, France, pp. 114-121, 2008, IEEE Computer Society, 978-0-7695-3156-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
restricted delegation, Grid Computing, authorization policy, proxy certificate |
43 | Taek-Young Youn, Young-Ho Park 0001, Chang Han Kim, Jongin Lim 0001 |
An Efficient ID-Based Delegation Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (1) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I, pp. 382-391, 2006, Springer, 3-540-48269-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Delegation Network, Proxy Signatures, ID-based Signatures |
43 | Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Identity Based Delegation Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 99-115, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Delegation network, bilinear pairings, proxy signature, identity-based cryptography, batch verification |
43 | Li Xiao 0001, Xiaodong Zhang 0001, Artur Andrzejak 0001, Songqing Chen |
Building a Large and Efficient Hybrid Peer-to-Peer Internet Caching System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 16(6), pp. 754-769, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
browser caching, communication anonymity, data integrity, peer-to-peer systems, proxy caching, Internet systems |
43 | Seyed Masoud Sadjadi, Philip K. McKinley |
Transparent Self-Optimization in Existing CORBA Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAC ![In: 1st International Conference on Autonomic Computing (ICAC 2004), 17-19 May 2004, New York, NY, USA, pp. 88-95, 2004, IEEE Computer Society, 0-7695-2114-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
generic proxy, quality-of-service, mobile computing, CORBA, autonomic computing, dynamic adaptation, adaptive middleware, self-optimization, transparent adaptation |
43 | Carey L. Williamson |
On filter effects in web caching hierarchies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 2(1), pp. 47-77, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Web proxy caching hierarchies, Performance evaluation, World-Wide-Web, Web performance |
43 | Alan Harbitter, Daniel A. Menascé |
The performance of public key-enabled kerberos authentication in mobile computing applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001., pp. 78-85, 2001, ACM, 1-58113-385-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
mobile computing, authentication, performance modeling, public key cryptography, proxy servers, kerberos |
42 | Jeffrey Nichols 0001, Zhigang Hua, John Barton |
Highlight: a system for creating and deploying mobile web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIST ![In: Proceedings of the 21st Annual ACM Symposium on User Interface Software and Technology, Monterey, CA, USA, October 19-22, 2008, pp. 249-258, 2008, ACM, 978-1-59593-975-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
proxy browser, javascript, mobile web, proxy server, highlight, dynamic html |
42 | Ziqing Mao, Cormac Herley |
A robust link-translating proxy server mirroring the whole web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 818-825, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
42 | Ying Sun, Chunxiang Xu, Qi Xia, Yong Yu 0002 |
Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 661-664, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Liming Fang 0001, Willy Susilo, Jiandong Wang |
Anonymous Conditional Proxy Re-encryption without Random Oracle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 47-60, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
42 | William Conner, Klara Nahrstedt |
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISM ![In: Tenth IEEE International Symposium on Multimedia (ISM2008), December 15-17, 2008, Berkeley, California, USA, pp. 340-347, 2008, IEEE Computer Society, 978-0-7695-3454-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Chunming Gao, Xiaojuan Yuan, Huowang Chen |
Execution Mechanism of Service Proxy in Web Services Composition Execution Engine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, Beijing, China, July 24-27, 2007. Volume 1, pp. 647-648, 2007, IEEE Computer Society, 978-0-7695-2870-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Ji-Seon Lee, Jik Hyun Chang |
Generating a Proxy Signature on a Confidential Message. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA, pp. 971, 2007, IEEE Computer Society, 978-0-7695-2776-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Guosheng Xu 0001, Yixian Yang, Lize Gu, Xinxin Niu |
ID-Based Multi-proxy Sequential Signature System from Bilinear Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Web Intelligence/IAT Workshops ![In: Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, 2-5 November 2007, Silicon Valley, CA, USA, pp. 315-318, 2007, IEEE Computer Society, 0-7695-3028-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Weiping He, Ing-Ray Chen, Baoshan Gu |
A Proxy-Based Integrated Cache Consistency and Mobility Management Scheme for Mobile IP Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), May 21-23, 2007, Niagara Falls, Canada, pp. 354-361, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Miguel Jimeno, Kenneth J. Christensen |
A Prototype Power Management Proxy for Gnutella Peer-to-Peer File Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 15-18 October 2007, Clontarf Castle, Dublin, Ireland, Proceedings, pp. 210-212, 2007, IEEE Computer Society, 0-7695-3000-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Stephen Frechette, Dimiter R. Avresky |
A Proxy Network Topology and Reconfiguration Algorithm for Resistance to DoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Fifth IEEE International Symposium on Network Computing and Applications, NCA 2006, 24-26 July 2006, Cambridge, Massachusetts, USA, pp. 137-144, 2006, IEEE Computer Society, 0-7695-2640-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Haiyong Bao, Zhenfu Cao, Shengbao Wang |
Identity-Based Threshold Proxy Signature Scheme with Known Signers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TAMC ![In: Theory and Applications of Models of Computation, Third International Conference, TAMC 2006, Beijing, China, May 15-20, 2006, Proceedings, pp. 538-546, 2006, Springer, 3-540-34021-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Gang Yao, Dengguo Feng |
Proxy Oblivious Transfer Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 190-197, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Xing Gao, John P. Sustersic, Ali R. Hurson |
Window Query Processing with Proxy Cache. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MDM ![In: 7th International Conference on Mobile Data Management (MDM 2006), Nara, Japan, May 9-13, 2006, pp. 39, 2006, IEEE Computer Society, 0-7695-2526-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Bo Yang, Jianxin Liao, Xiaomin Zhu 0002 |
Two-Level Proxy: The Media Streaming Cache Architecture for GPRS Mobile Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Advances in Data Communications and Wireless Networks, International Conference, ICOIN 2006, Sendai, Japan, January 16-19, 2006, Revised Selected Papers, pp. 852-861, 2006, Springer, 3-540-48563-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Jie Jiang, Deren Chen, Tim Chen 0004, Xiaodong Shen |
A Security Grid Portal Using PKI and Online Proxy Certificate Repository. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS (2) ![In: Interdisciplinary and Multidisciplinary Research in Computer Science, IEEE CS Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS|06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2, pp. 93-96, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Feng Cao, Zhenfu Cao |
Security Model of Proxy-Multi Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings, pp. 144-152, 2006, Springer, 3-540-49462-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Fagen Li, Yupu Hu, Shuanggen Liu |
ID-Based ( t , n ) Threshold Proxy Signcryption for Multi-agent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 406-416, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Kyung-Ah Shim |
An Identity-Based Proxy Signature Scheme from Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 60-71, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Himanshu Khurana, Jin Heo, Meenal Pant |
From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 260-281, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Claudiu Cobârzan |
Dynamic Proxy-Cache Multiplication Inside LANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Euro-Par ![In: Euro-Par 2005, Parallel Processing, 11th International Euro-Par Conference, Lisbon, Portugal, August 30 - September 2, 2005, Proceedings, pp. 890-900, 2005, Springer, 3-540-28700-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Kuei-Chung Chang, Ren-Yo Wu, Tien-Fu Chen |
Efficient Segment-Based Video Transcoding Proxy for Mobile Multimedia Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, ICME 2005, July 6-9, 2005, Amsterdam, The Netherlands, pp. 755-758, 2005, IEEE Computer Society, 0-7803-9331-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Shin-Jia Hwang, Kuang-Hsi Chen |
A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan, pp. 649-654, 2005, IEEE Computer Society, 0-7695-2249-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | James Zijun Wang, Vipul Bhulawala |
Design and Implementation of a P2P Cooperative Proxy Cache System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Web Intelligence ![In: 2005 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2005), 19-22 September 2005, Compiegne, France, pp. 508-514, 2005, IEEE Computer Society, 0-7695-2415-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Shuanghe Peng, Zhen Han |
Proxy Cryptography for Secure Inter-domain Information Exchanges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 12-14 December, 2005, Changsha, Hunan, China, pp. 193-199, 2005, IEEE Computer Society, 0-7695-2492-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Shaobin Wang, Fan Hong, Guohua Cui |
Secure Efficient Proxy Blind Signature Schemes Based DLP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 19-22 July 2005, München, Germany, pp. 452-455, 2005, IEEE Computer Society, 0-7695-2277-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Wenqing Cheng, Weimin Lang, Zongkai Yang, Gan Liu, Yunmeng Tan |
An identity-based proxy ring signature scheme from bilinear pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28 - July 1, 2004, Alexandria, Egypt, pp. 424-429, 2004, IEEE Computer Society, 0-7803-8623-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Yi Mu 0001, Fangguo Zhang, Willy Susilo |
Deniable Partial Proxy Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2004, Higher-Level Decision Making, 9th Asian Computing Science Conference, Dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday, Chiang Mai, Thailand, December 8-10, 2004, Proceedings, pp. 182-194, 2004, Springer, 3-540-24087-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Dong Zheng 0001, Huang Zheng, Kefei Chen, Weidong Kou |
ID-Based Proxy Blind Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 380-383, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Lixin Gao 0001, Zhi-Li Zhang, Donald F. Towsley |
Proxy-assisted techniques for delivering continuous multimedia streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 11(6), pp. 884-894, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Philip K. McKinley, Udiyan I. Padmanabhan, Nandagopal Ancha, Seyed Masoud Sadjadi |
Composable Proxy Services to Support Collaboration on the Mobile Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 52(6), pp. 713-726, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
heterogeneous collaborative computing, interactive audio streams, forward error correction, wireless local area networks, Adaptive middleware, component-based design, mobile hosts |
42 | Bruno Ciciani, Francesco Quaglia, Paolo Romano 0002, Daniel M. Dias |
Analysis of Design Alternatives for Reverse Proxy Cache Providers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MASCOTS ![In: 11th International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2003), 12-15 October 2003, Orlando, FL, USA, pp. 316-323, 2003, IEEE Computer Society, 0-7695-2039-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Yong Woon Park, Si Woong Jang |
A Proxy-Based Dynamic Multicasting Policy Using Stream's Access Pattern. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Euro-Par ![In: Euro-Par 2003. Parallel Processing, 9th International Euro-Par Conference, Klagenfurt, Austria, August 26-29, 2003. Proceedings, pp. 880-883, 2003, Springer, 3-540-40788-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Huaxiong Wang, Josef Pieprzyk |
Efficient One-Time Proxy Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings, pp. 507-522, 2003, Springer, 3-540-20592-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
42 | James Zijun Wang, Ratan K. Guha |
Proxy Ecology - Cooperative Proxies with Artificial Life. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAT ![In: 2003 IEEE/WIC International Conference on Intelligent Agent Technology (IAT 2003), 13-17 October 2003, Halifax, Canada, pp. 168-174, 2003, IEEE Computer Society, 0-7695-1931-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Jung-Yeun Lee, Jung Hee Cheon, Seungjoo Kim |
An Analysis of Proxy Signatures: Is a Secure Channel Necessary? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 68-79, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Azer Bestavros, Shudong Jin |
Popularity-Aware Greedy Dual-Size Web Proxy Caching Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: Proceedings of the 20th International Conference on Distributed Computing Systems, Taipei, Taiwan, April 10-13, 2000, pp. 254-261, 2000, IEEE Computer Society, 0-7695-0601-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
42 | Narn-Yih Lee, Tzonelih Hwang, Chih-Hung Wang |
On Zhang's Nonrepudiable Proxy Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings, pp. 415-422, 1998, Springer, 3-540-64732-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
41 | Xiaohui Liang, Zhenfu Cao, Huang Lin, Jun Shao |
Attribute based proxy re-encryption with delegating capabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 276-286, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
key delegation, attribute based encryption, proxy re-encryption |
41 | Hala ElAarag, Sam Romano |
Improvement of the neural network proxy cache replacement strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim ![In: Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, San Diego, California, USA, March 22-27, 2009, 2009, SCS/ACM. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
NNPCR, Squid, cache replacement strategies, neural network, web caching, proxy server |
Displaying result #101 - #200 of 5165 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|