The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for PKI with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1995-1999 (31) 2000 (27) 2001 (30) 2002 (39) 2003 (72) 2004 (76) 2005 (94) 2006 (89) 2007 (108) 2008 (86) 2009 (62) 2010 (30) 2011 (29) 2012-2013 (28) 2014 (16) 2015-2016 (30) 2017 (25) 2018 (26) 2019 (16) 2020 (19) 2021 (20) 2022 (21) 2023-2024 (15)
Publication types (Num. hits)
article(202) book(1) incollection(12) inproceedings(765) phdthesis(5) proceedings(4)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 859 occurrences of 387 keywords

Results
Found 989 publication records. Showing 989 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Feng Hao 0001, Peter Y. A. Ryan J-PAKE: Authenticated Key Exchange without PKI. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Feng Hao 0001, Peter Y. A. Ryan J-PAKE: Authenticated Key Exchange Without PKI. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
17Gabriel López Millán, Manuel Gil Pérez, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta PKI-based trust management in inter-domain scenarios. Search on Bibsonomy Comput. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Massimiliano Pala, Sean W. Smith Finding the PKI needles in the Internet haystack. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Ryu Watanabe, Yuto Nakano, Toshiaki Tanaka Single Sign-on Techniques with PKI-based Authentication for Mobile Phones. Search on Bibsonomy Security and Management The full citation details ... 2010 DBLP  BibTeX  RDF
17Dan Kaminsky, Meredith L. Patterson, Len Sassaman PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure. Search on Bibsonomy Financial Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Massimiliano Pala, Sara Sinclair, Sean W. Smith PorKI: Portable PKI Credentials via Proxy Certificates. Search on Bibsonomy EuroPKI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Walter J. Scheirer, William Bishop, Terrance E. Boult Beyond PKI: The Biocryptographic Key Infrastructure. Search on Bibsonomy WIFS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Joo-Kwan Lee, Moon-Seog Jun Security Protocol Design for Electronic-Cash Transactions in a Mobile-PKI Environment. Search on Bibsonomy ACIS-ICIS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Agapios N. Platis, Vasilis P. Koutras Software rejuvenation on a PKI. Search on Bibsonomy WoSAR@ISSRE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Suresh Kumar, Rakesh K. Prajapati, Manjeet Singh, Asok De Security enforcement using PKI in Semantic Web. Search on Bibsonomy CISIM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Wenliang Bian, Xuyun Nie Unattended Home Delivery System based on PKI Trust Model in Urban Areas. Search on Bibsonomy ICISO The full citation details ... 2010 DBLP  BibTeX  RDF
17Rishab Nithyanand, Gene Tsudik, Ersin Uzun Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Nasir Mahmood Malik, Tehmina Khalil, Samina Khalid, Faisal Munir Malik PKI Implementation Issues: A Comparative Study of Pakistan with some Asian Countries Search on Bibsonomy CoRR The full citation details ... 2009 DBLP  BibTeX  RDF
17 Optimized Public Key Infrastructure - A PKI to Support Efficient Document's Signatures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
17Rishab Nithyanand, Gene Tsudik, Ersin Uzun Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
17Massimiliano Pala, Shreyas Cholia, Scott A. Rea, Sean W. Smith Interoperable PKI Data Distribution in Computational Grids. Search on Bibsonomy Int. J. Grid High Perform. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Diana Berbecaru, Amarkumar Desai, Antonio Lioy A unified and flexible solution for integrating CRL and OCSP into PKI applications. Search on Bibsonomy Softw. Pract. Exp. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17José M. Alcaraz Calero, Gabriel López Millán, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta Towards the homogeneous access and use of PKI solutions: Design and implementation of a WS-XKMS server. Search on Bibsonomy J. Syst. Archit. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Christian Schanes, Andreas Mauczka, Uwe Kirchengast, Thomas Grechenig, Sven Marx Nationwide PKI Testing - Ensuring Interoperability of OCSP Server and Client Implementations Early during Component Tests. Search on Bibsonomy EuroPKI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Chris Masone, Sean W. Smith ABUSE: PKI for Real-World Email Trust. Search on Bibsonomy EuroPKI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Wiem Rekik, Maher Khemakhem, Abdelfettah Belghith, Jacques Fayolle PKI and UDDI based trust centre: An attempt to improve web service security. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Toshiyuki Kataoka, Takeshi Nishimura, Masaki Shimaoka, Kazutsuna Yamaji, Motonori Nakamura, Noboru Sonehara, Yasuo Okabe Leveraging PKI in SAML 2.0 Federation for Enhanced Discovery Service. Search on Bibsonomy SAINT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Yue-Hsun Lin, Ahren Studer, Hsu-Chun Hsiao, Jonathan M. McCune, King-Hang Wang, Maxwell N. Krohn, Phen-Lan Lin, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang SPATE: small-group PKI-less authenticated trust establishment. Search on Bibsonomy MobiSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF group protocol, security, implementation, key exchange
17Xiaoqi Zhang, Meina Song, Junde Song A Solution of Electronic Authentication Services Based on PKI for Enabling e-Business. Search on Bibsonomy ICEBE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Jean Everson Martina, Túlio Cicero Salvaro de Souza, Ricardo Felipe Custódio Ceremonies Formal Analysis in PKI's Context. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Phil D'Angio, Panos Vassilliadas, Phaidon Kaklamanis PKI - Crawling Out of the Grave & Into the Arms of Government. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17François Lesueur, Ludovic Mé, Valérie Viet Triem Tong An Efficient Distributed PKI for Structured P2P Networks. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Sudip Misra, Sumit Goswami, Gyan Prakash Pathak, Nirav Shah 0002, Isaac Woungang Dividing PKI in strongest availability zones. Search on Bibsonomy AICCSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Ali Nasrat Haidar, Ali E. Abdallah Formal Modelling of PKI Based Authentication. Search on Bibsonomy WWV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Chung-Ming Ou, Chung-Ren Ou Non-repudiation Mechanism of Agent-based Mobile Payment Systems: Perspectives on Wireless PKI. Search on Bibsonomy J. Univers. Comput. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17David Ahmad Two Years of Broken Crypto: Debian's Dress Rehearsal for a Global PKI Compromise. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Sang Seok Lim, Jong Hyuk Choi, Kurt D. Zeilenga Design, implementation, and performance analysis of PKI certificate repository using LDAP Component Matching. Search on Bibsonomy Softw. Pract. Exp. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Zhiqian Xu 0001, Hai Jiang 0003 A Framework of Decentralized PKI Key Management Based on Dynamic Trust. Search on Bibsonomy Security and Management The full citation details ... 2008 DBLP  BibTeX  RDF
17Sufatrio, Roland H. C. Yap Extending BAN Logic for Reasoning with Modern PKI-Based Protocols. Search on Bibsonomy NPC Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication logic, security protocol, Public-Key Infrastructure
17Stig Fr. Mjølsnes, Sjouke Mauw, Sokratis K. Katsikas (eds.) Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Hwajung Lee PKI Vulnerability and x-Cryptography in Grid Computing Networks. Search on Bibsonomy HPCNCS The full citation details ... 2008 DBLP  BibTeX  RDF
17Bhargav Bellur Certificate Assignment Strategies for a PKI-Based Security Architecture in a Vehicular Network. Search on Bibsonomy GLOBECOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Ahmad Samer Wazan, Romain Laborde, François Barrère, Abdelmalek Benzekri Authentication in Virtual Organizations: A Reputation Based PKI Interconnection Model. Search on Bibsonomy SVM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Wei Ren 0002, Kui Ren 0001, Wenjing Lou, Yanchao Zhang Efficient user revocation for privacy-aware PKI. Search on Bibsonomy QSHINE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Sibylle Hick, Luigi Lo Iacono Elliptic Curve Cryptography in x.509-based PKI. Search on Bibsonomy Sicherheit The full citation details ... 2008 DBLP  BibTeX  RDF
17Bart De Decker, Mohamed Layouni, Hans Vangheluwe, Kristof Verslype A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF electronic healthcare, privacy, anonymous credentials
17Konstantin Hyppönen An Open Mobile Identity Tool: An Architecture for Mobile Identity Management. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Basel Alomair, Krishna Sampigethaya, Radha Poovendran Efficient Generic Forward-Secure Signatures and Proxy Signatures. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF efficiency, Digital signatures, proxy, forward-security
17Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa An Efficient Strong Key-Insulated Signature Scheme and Its Application. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF strong key-insulated signature, key leakage, DL assumption, random oracle model, adaptive security
17Ricardo Felipe Custódio, Martín A. Gagliotti Vigil, Juliano Romani, Fernando Carlos Pereira, Joni da Silva Fraga Optimized Certificates - A New Proposal for Efficient Electronic Document Signature Validation. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF standard model, identity-based cryptography, identification scheme
17Billy Bob Brumley, Kimmo U. Järvinen Fast Point Decompression for Standard Elliptic Curves. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF square roots modulo p, elliptic curve cryptography, exponentiation, addition chains
17Chong Hee Kim, Philippe Bulens, Christophe Petit 0001, Jean-Jacques Quisquater Fault Attacks on Public Key Elements: Application to DLP-Based Schemes. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Smart cards, fault injection, faults attacks, DSA, ElGamal, side channel
17Manuel Sánchez, Óscar Cánovas Reverte, Gabriel López 0001, Antonio Fernandez Gómez-Skarmeta Levels of Assurance and Reauthentication in Federated Environments. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF reauthentication, LoA, eduGAIN, authorization, federation, SSO
17Alex Golod PKI Registration. Search on Bibsonomy Information Security Management Handbook, 6th ed. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Cristina Satizábal, Rafael Páez, Jordi Forné WAP PKI and certification path validation. Search on Bibsonomy Int. J. Internet Protoc. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Yong Lee 0001, Jaeil Lee, JooSeok Song Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce. Search on Bibsonomy Comput. Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Benjamin Aziz, Geoff W. Hamilton Modelling and Analysis of PKI-Based Systems Using Process Calculi. Search on Bibsonomy Int. J. Found. Comput. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Brian Korver The Internet IP Security PKI Profile of IKEv1/ISAKMP, IKEv2, and PKIX. Search on Bibsonomy RFC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Dakshi Agrawal, Charanjit S. Jutla Utility Sampling for Trust Metrics in PKI. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
17Georgios Kambourakis, Denise-Penelope N. Kontoni, Angelos N. Rouskas, Stefanos Gritzalis A PKI approach for deploying modern secure distributed e-learning and m-learning environments. Search on Bibsonomy Comput. Educ. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Javier López 0001, Pierangela Samarati, Josep L. Ferrer (eds.) Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Srijith Krishnan Nair, Muhammad Torabi Dashti, Bruno Crispo, Andrew S. Tanenbaum A Hybrid PKI-IBC Based Ephemerizer System. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Katsuya Tanaka, Mayumi Yoshida, Ryuichi Yamamoto Secure Remote Access for Web Based Clinical Information System Using Policy Control of PCs Healthcare PKI Authentication. Search on Bibsonomy MedInfo The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Vesselin Tzvetkov Decentralization of the Current PKI Infrastructure without Losing Backward Compatibility. Search on Bibsonomy CCNC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Xiaosu Chen, Dali Zhu, Jian Liu A Practical Digital Watermarking Protocol Based On PKI-CA. Search on Bibsonomy SNPD (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Zhiwei Gao 0001, Ping Luo, Zhimin Gu, Hongjun Liu A New and Scalable Certification Path Discovery Model in the Emerging Global PKI. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Chuanjun Wang, Xiamu Niu, Yong Zhang 0023 Anonymity in PKI Environment. Search on Bibsonomy IIH-MSP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Jin-Bao Liu, Xian-Qing Hu, Qiong Li, Xiamu Niu Design and Implementation of a PKI-Based Electronic Documents Protection Management System. Search on Bibsonomy IIH-MSP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Guido von der Heidt, Reinhard Schoepf PKI and Entitlement - Key Information Security Management Solutions for Business and IT Compliance. Search on Bibsonomy ISSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Elena Trichina, Konstantin Hyppönen, Marko Hassinen SIM-enabled Open Mobile Payment System Based on Nation-wide PKI. Search on Bibsonomy ISSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Marcus Hanke Embedded PKI in Industrial Facilities. Search on Bibsonomy ISSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Anja Beyer, Sophie Hellmann, Malte Hesse, Friedrich Holl, Peter Morcinek, Sachar Paulus, Helmut Reimer EKIAS - Success Criteria of PKI Implementations. Search on Bibsonomy ISSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Ana Isabel González-Tablas Ferreres, Benjamín Ramos Álvarez, Arturo Ribagorda Garnacho Spatial-Temporal Certification Framework and Extension of X.509 Attribute Certificate Framework and SAML Standard to Support Spatial-Temporal Certificates. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Spatial-temporal certification, X.509 AC, SAML
17Agusti Solanas, Antoni Martínez-Ballesté Privacy Protection in Location-Based Services Through a Public-Key Privacy Homomorphism. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF public-key privacy homomorphism, location privacy
17Vanesa Daza, Josep Domingo-Ferrer On Partial Anonymity in Secret Sharing. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Privacy, Protocols, Secret sharing
17Maithili Narasimha, Gene Tsudik Privacy-Preserving Revocation Checking with Modified CRLs. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Anonymity and Privacy, Certificate Revocation
17Shiqun Li, Guilin Wang, Jianying Zhou 0001, Kefei Chen Undeniable Mobile Billing Schemes. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Diana Berbecaru, Antonio Lioy On the Robustness of Applications Based on the SSL and TLS Security Protocols. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MITM attack, security, SSL/TLS, truncation attack
17Kristian Gjøsteen, Lillian Kråkmo Universally Composable Signcryption. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Secure messaging, signcryption, universal composability
17Yutaka Oiwa, Kazukuni Kobara, Hajime Watanabe A New Variant for an Attack Against RSA Signature Verification Using Parameter Field. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF List of Keywords vulnerability, certificate verification, attacks
17Sherman S. M. Chow, Duncan S. Wong Anonymous Identification and Designated-Verifiers Signatures from Insecure Batch Verification. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ad hoc anonymous identification, strong de- signated verifier signatures, bilinear pairings, ring signatures, Identity-based, linkability
17Mohamed Layouni, Hans Vangheluwe Anonymous k -Show Credentials. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Privacy-preserving digital credentials, multiple-show credentials, anonymity
17Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka, Ida Sri Rejeki Siahaan Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Jong Hwan Park, Dong Hoon Lee 0001 Direct Chosen-Ciphertext Secure Hierarchical ID-Based Encryption Schemes. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Chosen Ciphertext Security, Hierarchical Identity Based Encryption
17Son Thanh Nguyen, Chunming Rong Electronic Payment Scheme Using Identity-Based Cryptography. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF electronic wallet, Identity-based cryptography
17Yan Song One-More Extension of Paillier Inversion Problem and Concurrent Secure Identification. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Bessie C. Hu, Duncan S. Wong, Qiong Huang 0001, Guomin Yang, Xiaotie Deng Time Capsule Signature: Efficient and Provably Secure Constructions. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Time Capsule Signature
17Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow An Efficient Signcryption Scheme with Key Privacy. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Ciphertext Anonymity, Gap Diffie-Hellman, Signcryption, Key Privacy
17Ulrich Flegel, Michael Meier 0001 Authorization Architectures for Privacy-Respecting Surveillance. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy, Architecture, intrusion detection, authorization, surveillance, pseudonym, misuse detection
17Rodrigo Roman, Cristina Alcaraz Applicability of Public Key Infrastructures in Wireless Sensor Networks. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, Public Key Cryptography, Public Key Infrastructure
17David W. Chadwick, Sean Anthony Using WebDAV for Improved Certificate Revocation and Publication. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF HTPP, revocation, LDAP, WebDAV, CRLs
17Manuel Sánchez, Gabriel López Millán, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta Bootstrapping a Global SSO from Network Access Control Mechanisms. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authorization, federation, SSO, SAML
17Younho Lee, Yongsu Park, Heeyoul Kim, Seong-Min Hong 0001, Hyunsoo Yoon Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17George V. Neville-Neil Pointless PKI. Search on Bibsonomy ACM Queue The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, Masakatsu Nishigaki Mechanism-Based PKI - A Real-Time Key Generation from Fingerprints. Search on Bibsonomy Security and Management The full citation details ... 2006 DBLP  BibTeX  RDF
17Andrea S. Atzeni, Antonio Lioy (eds.) Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Lech J. Janczewski, Vladimir Petranovic Review of the PKI status in New Zealand. Search on Bibsonomy PACIS The full citation details ... 2006 DBLP  BibTeX  RDF
17Otto Dostál, Michal Javorník, Karel Slávicek PKI utilisation for PACS users authentication. Search on Bibsonomy ICN/ICONS/MCL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Yih-Chun Hu, David A. McGrew, Adrian Perrig, Brian Weis, Dan Wendlandt (R)Evolutionary Bootstrapping of a Global PKI for Securing BGP. Search on Bibsonomy HotNets The full citation details ... 2006 DBLP  BibTeX  RDF
17Milan Markovic, Milos Kilibarda, Aleksandar Milosevic PKi Consolidation Project and Multiapplicative Smart Payment Cards. Search on Bibsonomy ISSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Tobias Straub Usability challenges of PKI. Search on Bibsonomy 2006   RDF
17Willy Susilo, Yi Mu 0001 Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF repudiable, authentication, email, phishing, separable, ID-based, deniable
17Sherman S. M. Chow Identity-Based Strong Multi-Designated Verifiers Signatures. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 989 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license