The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for PKI with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1995-1999 (31) 2000 (27) 2001 (30) 2002 (39) 2003 (72) 2004 (76) 2005 (94) 2006 (89) 2007 (108) 2008 (86) 2009 (62) 2010 (30) 2011 (29) 2012-2013 (28) 2014 (16) 2015-2016 (30) 2017 (25) 2018 (26) 2019 (16) 2020 (19) 2021 (20) 2022 (21) 2023-2024 (15)
Publication types (Num. hits)
article(202) book(1) incollection(12) inproceedings(765) phdthesis(5) proceedings(4)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 859 occurrences of 387 keywords

Results
Found 989 publication records. Showing 989 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
10Chung-Ming Ou, Chung-Ren Ou, Yao-Tien Wang Security of Mobile Agent-Based Web Applications. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Ali Khalili, Shahriar Mohammadi Using Logically Hierarchical Meta Web Services to Support Accountability in Mashup Services. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Jian Wu, Zhimin Huang Proxy-Based Web Service Security. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Bing H. Cheung Data analysis on mobile ad-hoc networks with commercial pre-wimax, EVDO and Wi-Fi products. Search on Bibsonomy PE-WASUN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF evdo, wimax, ad-hoc, wi-fi, vpn, high speed, wlan, data rates
10Tong-Lee Lim, Anantharaman Lakshminarayanan, Vira Saksen A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Yang Lu 0001, Jiguo Li 0001, Junmo Xiao Generic Construction of Certificate-Based Encryption. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Zecheng Wang, Taozhi Si, Haifeng Qian, Zhibin Li 0005 A CDH-Based Multi-Signature Scheme with Tight Security Reduction. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Paul Rabinovich ECL: A TLS Extension for Authentication in Complex PKIs. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Izumi Fuse, Shigeto Okabe, Takashi Yamanoue, Atsushi Nakamura, Michio Nakanishi, Shozo Fukada, Takahiro Tagawa, Tatsumi Takeo, Ikuya Murata, Tetsutaro Uehara, Tsuneo Yamada Improving computer ethics video clips for higher education. Search on Bibsonomy SIGUCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF educational material, information security, computer ethics, video clips
10Kai Hwang 0001 Massively Distributed Systems : From Grids and P2P to Clouds. Search on Bibsonomy GPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Florina Almenárez, Andrés Marín López, Daniel Díaz Sánchez, Alberto Cortés, Celeste Campo, Carlos García-Rubio Building an Open Toolkit of Digital Certificate Validation for Mobile Web Services. Search on Bibsonomy PerCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF certificate validation, open toolkit, X.509 certificates
10Miranda Mowbray, Antonio Lain Dominator-tree analysis for distributed authorization. Search on Bibsonomy PLAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF access control, dominator tree, distributed authorization
10Liang Yan, Chunming Rong RFID System Security Using Identity-Based Cryptography. Search on Bibsonomy UIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Deqing Zou, Jong Hyuk Park, Laurence Tianruo Yang, Zhensong Liao, Tai-Hoon Kim A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment. Search on Bibsonomy UIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang An On-Line Secure E-Passport Protocol. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Liu Peng, Zong Rui, Liu Sizuo A New Model for Authentication and Authorization across Heterogeneous Trust-Domain. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Yiling Wen, Jianfeng Ma 0001 An Aggregate Signature Scheme with Constant Pairing Operations. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Guoyan Zhang, Shaohui Wang A Certificateless Signature and Group Signature Schemes against Malicious PKG. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF malicious PKG, group signature, certificateless signature
10Wen-Chao Yang, Che-Yen Wen, Chung-Hao Chen Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidence. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Integrity, Public-key Cryptography, Digital Image, Credibility, Digital Image Forensic
10Chung-Ming Ou, Chung-Ren Ou SETNR/A: An Agent-Based Secure Payment Protocol for Mobile Commerce. Search on Bibsonomy KES-AMSTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Ahren Studer, Christina Johns, Jaanus Kase, Kyle O'Meara, Lorrie Faith Cranor A Survey to Guide Group Key Protocol Development. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Guang Yao, Jun Bi A CGAbased IP source address authentication method in IPv6 access network. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Antonio Ruiz-Martínez, Daniel Sánchez-Martínez, C. Inmaculada Marín-López, Manuel Gil Pérez, Antonio Fernandez Gómez-Skarmeta ACVS: An Advanced Certificate Validation Service in Service-Oriented Architectures. Search on Bibsonomy ICIW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF certificate validation, xkms, long term validation
10Apu Kapadia A Case (Study) For Usability in Secure Email Communication. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Sebastian Rieger, Bernhard Neumair Towards usable and reasonable Identity Management in heterogeneous IT infrastructures. Search on Bibsonomy Integrated Network Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Zuhua Shao Self-certified Signatures Based on Discrete Logarithms. Search on Bibsonomy WAIFI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Self-certified public key signature, Discrete logarithm, strong unforgeability
10Luigi Liquori, Michel Cosnard Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems. Search on Bibsonomy TGC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Vipul Goyal Certificate Revocation Using Fine Grained Certificate Space Partitioning. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Yvo Desmedt, Tanja Lange 0001, Mike Burmester Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Tree based GKE, Ad-Hoc Groups, Authentication, Anonymity, Key Distribution, Forward Security, Group Key Exchange
10Ibrahim Mostafa Ibrahim, Sherif Hazem Nour El-Din, Abdel Fatah A. Hegazy An Effective and Secure Buyer-Seller Watermarking Protocol. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Alessandro Cilardo, Luigi Coppolino, Antonino Mazzeo, Luigi Romano Performance Evaluation of Security Services: An Experimental Approach. Search on Bibsonomy PDP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Web Services, Performance, Ubiquitous Computing, Mobile Devices
10Suk-Bok Lee, Gabriel Pan, Joon-Sang Park, Mario Gerla, Songwu Lu Secure incentives for commercial ad dissemination in vehicular networks. Search on Bibsonomy MobiHoc The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, cooperation, incentives, vehicular ad hoc networks
10Yi Mu 0001, Willy Susilo, Huafei Zhu Compact sequential aggregate signatures. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RSA problem, communication, computer, provably secure, signatures
10Aleksej Jerman Blazic Long Term Trusted Archive Services. Search on Bibsonomy ICDS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Electronic archive, authenticity, trust, protocol, integrity, validity, authority, document, evidence, record, long-term
10Qiong Ren, Yi Mu 0001, Willy Susilo SEFAP: An Email System for Anti-Phishing. Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Malicious Email, Digital Signature, Anti-Phishing
10Juan A. Garay, Jonathan Katz, Chiu-Yuen Koo, Rafail Ostrovsky Round Complexity of Authenticated Broadcast with a Dishonest Majority. Search on Bibsonomy FOCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt Exploiting X.509 Certificate and Multi-agent System Architecture for Role-Based Access Control and Authentication Management. Search on Bibsonomy CIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Raphaël Chand, Luigi Liquori, Michel Cosnard Improving Resource Discovery in the Arigatoni Overlay Network. Search on Bibsonomy ARCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Toshihiko Matsuo Proxy Re-encryption Systems for Identity-Based Encryption. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF proxy re-encryption system, public key encryption, identity-based encryption
10Liyi Zhang, Qihua Liu, Min Xu Research and application of EJBCA based on J2EE. Search on Bibsonomy I3E (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Valentina Casola, Jesus Luna, Oscar Manso, Nicola Mazzocca, Manel Medina, Massimiliano Rak Interoperable Grid PKIs Among Untrusted Domains: An Architectural Proposal. Search on Bibsonomy GPC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Tatsuaki Okamoto Authenticated Key Exchange and Key Encapsulation in the Standard Model. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Manabu Hirano, Takeshi Okuda, Suguru Yamaguchi Application for a Simple Device Authentication Framework: Device Authentication Middleware Using Novel Smart Card Software. Search on Bibsonomy SAINT Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Serena Pastore Distributed and local security policies for grid web-based resources. Search on Bibsonomy DEXA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Jan Paul Kolter, Rolf Schillinger, Günther Pernul A Privacy-Enhanced Attribute-Based Access Control System. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Junzuo Lai, Weidong Kou Self-Generated-Certificate Public Key Encryption Without Pairing. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Self-Generated-Certificate Public Key Cryptography, Self-Certified-Key, Certificateless Public Key Cryptography
10MohammadReza Gholami, Seyyed Mohsen Hashemi, Mohammad Teshnehlab A Framework for Secure Message Transmission Using SMS-Based VPN. Search on Bibsonomy CONFENIS (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Privacy, Trust, E-commerce, E-business, EAI, EDI
10Calvin Chun Yu, Paul Jen-Hwa Hu Examining the Impacts of Institutional Framework on E-Government Infrastructures: A Study of Hong Kong Experiences. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Reto Kohlas, Jacek Jonczy, Rolf Haenni A New Model for Public-Key Authentication. Search on Bibsonomy KiVS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Meng Yu 0001, Wanyu Zang, Barbara Reagor Decentralized Trust Management based on the Reputation of Information Sources. Search on Bibsonomy ICNSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Thomas Wölfl, Kai Fischbach A Method for the Certification and the Delegation of Trust in Distributed Systems. Search on Bibsonomy ICDCS Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Mihir Bellare, Gregory Neven Multi-signatures in the plain public-Key model and a general forking lemma. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF forking lemma, cryptography, digital signatures, multi-signatures
10Dae-Young Lee, Hyun-Cheol Jeong An Efficient Certificate Management for Mobile Ad-Hoc Network. Search on Bibsonomy ADHOC-NOW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Jan Camenisch, Dieter Sommer, Roger Zimmermann A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Sadie Creese, Michael Goldsmith, Bill Roscoe, Ming Xiao Bootstrapping multi-party ad-hoc security. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bootstrapping security, pervasive computing
10Won Jay Song, Moon Kyo Cho, Im Sook Há, Mun Kee Choi Healthcare System Architecture, Economic Value, and Policy Models in Large-Scale Wireless Sensor Networks. Search on Bibsonomy SAFECOMP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Samia Boucherkha, Mohamed Benmohamed A Multi-tier Architecture to Safely Share Digital Medical Images. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Muhammad Sher, Thomas Magedanz, Walter T. Penzhorn Inter-Domains Security Management (IDSM) Model for IP Multimedia Subsystem (IMS). Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Inter-Domains Security, Trust Relationship, IP Multimedia System (IMS), Keys and Certificate Management
10Zhenxing Luo, NuerMaimaiti Heilili, Dawei Xu, Chen Zhao 0001, Zuoquan Lin Web Application Security Gateway with Java Non-blocking IO. Search on Bibsonomy NGITS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Fabio Picconi, Nishkam Ravi, Marco Gruteser, Liviu Iftode Probabilistic validation of aggregated data in vehicular ad-hoc networks. Search on Bibsonomy Vehicular Ad Hoc Networks The full citation details ... 2006 DBLP  DOI  BibTeX  RDF aggregation, vehicular networks, malicious nodes, data validation
10N. V. Narendra Kumar, R. K. Shyamasundar Specification and Realization of Access Control in SPKI/SDSI. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Abderrezak Rachedi, Abderrahim Benslimane A Secure Architecture for Mobile Ad Hoc Networks. Search on Bibsonomy MSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, Wireless ad hoc networks, clustering algorithm
10Despina Polemi, Spyridon Papastergiou A Secure e-Ordering Web Service. Search on Bibsonomy I3E The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Liang Li, Jie Tian 0001, Xin Yang 0001 A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Christian Damsgaard Jensen, Paul O'Connell Trust-Based Route Selection in Dynamic Source Routing. Search on Bibsonomy iTrust The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Didier Benza, Michel Cosnard, Luigi Liquori, Marc Vesin Arigatoni: A Simple Programmable Overlay Network. Search on Bibsonomy John Vincent Atanasoff Symposium The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Tiefang Wang, Tao Li 0016, Xun Gong 0006, Jin Yang, Xiaoqin Hu, Diangang Wang, Hui Zhao 0007 Family Gene Based Grid Trust Model. Search on Bibsonomy ICNC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Slim Trabelsi, Jean-Christophe R. Pazzaglia, Yves Roudier Secure Web Service Discovery: Overcoming Challenges of Ubiquitous Computing. Search on Bibsonomy ECOWS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Secure Service discovery, Web Services, Service Oriented Architectures, Ubiquitous Computing, WS-Discovery, Attribute Based Encryption
10Fei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Won Jay Song, Im Sook Há, Mun Kee Choi System Architecture and Economic Value-Chain Models for Healthcare Privacy and Security Control in Large-Scale Wireless Sensor Networks. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Huaji Shi, Xibin Zhao Implementation Issues of Authorization Mechanisms in Grid Computing Systems. Search on Bibsonomy SOSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi Trusted-link: web-link enhancement for integrity and trustworthiness. Search on Bibsonomy Digital Identity Management The full citation details ... 2006 DBLP  DOI  BibTeX  RDF integrity, web, signature, link, trustworthiness
10Abderrezak Rachedi, Abderrahim Benslimane Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks. Search on Bibsonomy ICSNC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10GeneBeck Hahn, Taekyoung Kwon 0002, Sinkyu Kim, JooSeok Song Cluster-Based Certificate Chain for Mobile Ad Hoc Networks. Search on Bibsonomy ICCSA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10M. Francisca Hinarejos, Jordi Forné Revocation Scheme for PMI Based Upon the Tracing of Certificates Chains. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Jongpil Jeong, Min Young Chung, Hyunseung Choo Secure User Authentication Mechanism in Digital Home Network Environments. Search on Bibsonomy EUC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Richard O. Sinnott, Jipu Jiang, John P. Watt, Oluwafemi O. Ajayi Shibboleth-based Access to and Usage of Grid Resources. Search on Bibsonomy GRID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10SeongHan Shin, Kazukuni Kobara, Hideki Imai An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi Secure E-Commerce Transactions for Multicast Services. Search on Bibsonomy CEC/EEE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Anantharaman Lakshminarayanan, Aditya Liviandi, Tong-Lee Lim, William Chui Can CRLs Provide Bandwidth-Efficient Online Certificate Status? Search on Bibsonomy LCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Shanshan Song, Kai Hwang 0001, Yu-Kwong Kwok Trusted Grid Computing with Security Binding and Trust Integration. Search on Bibsonomy J. Grid Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF NAS and PSA benchmarks, performance evaluation, fuzzy logic, resource allocation, computational Grids, trust models, scalability analysis
10Vishwas Patil, R. K. Shyamasundar e-coupons: An Efficient, Secure and Delegable Micro-Payment System. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF PayWord, security, delegation, one-way hash function, micro-payment, TESLA, SPKI/SDSI
10Richard O. Sinnott, A. J. Stell, David W. Chadwick, O. Otenko Experiences of Applying Advanced Grid Authorisation Infrastructures. Search on Bibsonomy EGC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Hoon Wei Lim, Matthew J. B. Robshaw A Dynamic Key Infrastructure for Grid. Search on Bibsonomy EGC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Yevgeniy Dodis, Dae Hyun Yum Time Capsule Signature. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Hoon Wei Lim, Kenneth G. Paterson Identity-Based Cryptography for Grid Security. Search on Bibsonomy e-Science The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Gianluigi Me, Maurizio Adriano Strangio EC-PAY: An Efficient and Secure ECC-Based Wireless Local Payment Scheme. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Jin Park, Jeong-Tae Hwang, Young-Chul Kim 0001 FPGA and ASIC Implementation of ECC Processor for Security on Medical Embedded System. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10A. J. Stell, Richard O. Sinnott, John P. Watt Comparison of Advanced Authorisation Infrastructures for Grid Computing. Search on Bibsonomy HPCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Alessandro Cilardo, Luigi Coppolino, Antonino Mazzeo, Luigi Romano High-Performance and Interoperable Security Services for Mobile Environments. Search on Bibsonomy HPCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10H. W. Go, P. Y. Chan 0001, Y. Dong, Ai Fen Sui, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs). Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF performance evaluation, mobile ad hoc network (MANET), flooding, public-key infrastructure, certificate revocation
10SeongHan Shin, Kazukuni Kobara, Hideki Imai Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10David Del Vecchio, Marty Humphrey, Jim Basney, Nataraj Nagaratnam CredEx: User-Centric Credential Management for Grid and Web Services. Search on Bibsonomy ICWS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Yun-Sam Kim, Eun-Sun Cho Preventing Illegal Usage of Mobile Phone Software. Search on Bibsonomy COMPSAC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Norihiro Sakamoto, Jun Nakaya Towards the Construction of the Information Infrastructure for Genome Medicine. Search on Bibsonomy Human.Society@Internet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Mario Morelli, David Fernández, Antonio Fernandez Gómez-Skarmeta, Jordi Palet An IPv6 Internet Exchange Model: Lessons from Euro6IX Project. Search on Bibsonomy SAINT Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Seokhee Lee 0002, Hyunsang Kim, Sangjin Lee 0002, Jongin Lim 0001 Digital evidence collection process in integrity and memory information gathering. Search on Bibsonomy SADFE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 989 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license