|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 859 occurrences of 387 keywords
|
|
|
Results
Found 989 publication records. Showing 989 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
26 | John G. Brainard |
SecurSight: An Architecture for Secure Information Access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 349-357, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
authentication, architecture, authorization, PKI |
25 | Carl Wallace, Geoff Beier |
Practical and secure trust anchor management and usage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDtrust 2010, Gaithersburg, Maryland, USA, April 13-15, 2010, pp. 97-107, 2010, ACM, 978-1-60558-895-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
trust anchor management, public key infrastructure (PKI) |
25 | Rafael Martínez-Peláez, Cristina Satizábal, Francisco Rico-Novella, Jordi Forné |
Efficient Certificate Path Validation and Its Application in Mobile Payment Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 701-708, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Certification Path Validation, SET protocol, Mobile Payment, Public Key Infrastructure (PKI) |
25 | Arshad Noor |
Securing the core with an Enterprise Key Management Infrastructure (EKMI). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA, pp. 98-111, 2008, ACM, 978-1-60558-066-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
XML encryption (XENC), XML signature (DSIG), enterprise key management infrastructure (EKMI), symmetric key client library (SKCL), symmetric key management system (SKMS), symmetric key services (SKS), symmetric key services markup language (SKSML), key-management (KM), public key infrastructure (PKI) |
25 | Jae Hyung Koo, Bum Han Kim, Dong Hoon Lee 0001 |
Authenticated Public Key Distribution Scheme Without Trusted Third Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 926-935, 2005, Springer, 3-540-30803-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Key Management and Authentication, Public-key Cryptography, Public Key Infrastructure (PKI) |
25 | Xiaohui Li 0001, Weidong Kou |
A Secure M-Commerce Model Based On Wireless Local Area Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 520-523, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
PKI/CA, WLAN, m-commerce |
25 | Adam L. Young, Moti Yung |
Towards Signature-Only Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 97-115, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Public Key Cryptosystems (PKCS), nested trapdoor, abuse freeness, (subliminal) leakage, design validation proofs, FIPS, digital signature, decryption, Public Key Infrastructure (PKI), NIST |
19 | Jose L. Muñoz, Oscar Esparza, Jordi Forné, Esteve Pallarès |
Design and implementation of a lightweight online certificate validation service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 41(3), pp. 229-241, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Certification, Public key infrastructure, Revocation, OCSP |
19 | Yang Lu 0001, Jiguo Li 0001 |
Forward-Secure Certificate-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 57-60, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Zhongying Niu, Ke Zhou 0001, Hong Jiang 0001, Tianming Yang, Wei Yan |
Identification and Authentication in Large-Scale Storage Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NAS ![In: International Conference on Networking, Architecture, and Storage, NAS 2009, 9-11 July 2009, Zhang Jia Jie, Hunan, China, pp. 421-427, 2009, IEEE Computer Society, 978-0-7695-3741-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Qian Liu, Shuo Lu, Yuan Hong, Lingyu Wang 0001, Rachida Dssouli |
Securing Telehealth Applications in a Web-Based e-Health Portal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 3-9, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Wenbo Zhang, Hongqi Zhang, Bin Zhang 0015, Yan Yang |
An Identity-Based Authentication Model for Multi-domain in Grid Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 165-169, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Ning Liu, Jianhua Li 0001, Liming Hao, Yue Wu 0010, Ping Yi |
Group-Based Trust Model in P2P System Based on Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 797-801, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Paul C. van Oorschot, Tao Wan 0004, Evangelos Kranakis |
On interdomain routing security and pretty secure BGP (psBGP). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 10(3), pp. 11, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authentication, trust, certificates, BGP, public-key infrastructure, interdomain routing, secure routing protocols |
19 | Serge Vaudenay |
E-Passport Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(6), pp. 61-64, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Shouhuai Xu, Moti Yung |
K-Anonymous Multi-party Secret Handshakes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 72-87, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy-preserving authentication, reusable credentials, multiple personality prevention, anonymity, unlinkability, secret handshake, credential systems |
19 | Stanislaw Jarecki, Xiaomin Liu |
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings, pp. 270-287, 2007, Springer, 978-3-540-72737-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Dan Forsberg |
Use Cases of Implicit Authentication and Key Establishment with Sender and Receiver ID Binding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 2007 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2007), 18-21 June 2007, Helsinki, Finland, Proceedings, pp. 1-8, 2007, IEEE Computer Society, 1-4244-0992-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Akitoshi Izumi, Yoshifumi Ueshige |
A proposal of efficient scheme of key management using ID-based encryption and Biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 26-28 April 2007, Seoul, Korea, pp. 29-34, 2007, IEEE Computer Society, 978-0-7695-2777-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Zhe Wu, Jie Tian 0001, Liang Li, Cai-Ping Jiang, Xin Yang 0001 |
A Secure Email System Based on Fingerprint Authentication Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings, pp. 250-253, 2007, IEEE, 1-4244-1329-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Christine Laurendeau, Michel Barbeau |
Secure Anonymous Broadcasting in Vehicular Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 15-18 October 2007, Clontarf Castle, Dublin, Ireland, Proceedings, pp. 661-668, 2007, IEEE Computer Society, 0-7695-3000-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Shiquan Cong, Zhiyi Fang, Chao Zhang, Xiaonan Liu, Yingrui Zhang |
A CA-Based Security e-Government System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the 10th International Conference on CSCW in Design, CSCWD 2006, May 3-5, 2006, Southeast University, Nanjing, China, pp. 941-945, 2006, IEEE, 1-4244-0165-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Christian Veigner, Chunming Rong |
On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 521-530, 2006, Springer, 3-540-38619-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Chul Sur, Kyung Hyune Rhee |
An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Management of Convergence Networks and Services, 9th Asia-Pacific Network Operations and Management Symposium, APNOMS 2006 Busan, Korea, September 27-29, 2006, Proceedings, pp. 273-282, 2006, Springer, 3-540-45776-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Jonathan Katz, Chiu-Yuen Koo |
On Expected Constant-Round Protocols for Byzantine Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings, pp. 445-462, 2006, Springer, 3-540-37432-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Guido Appenzeller |
Identity-based encryption from algorithm to enterprise deployment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 406, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Bing Wu, Jie Wu 0001, Eduardo B. Fernández, Spyros S. Magliveras |
Secure and Efficient Key Management in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), CD-ROM / Abstracts Proceedings, 4-8 April 2005, Denver, CO, USA, 2005, IEEE Computer Society, 0-7695-2312-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Félix J. García Clemente, Gabriel López Millán, Jesús D. Jiménez Re, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta |
Deployment of a Policy-Based Management System for the Dynamic Provision of IPsec-Based VPNs in IPv6 Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January - 4 February 2005, Trento, Italy, pp. 10-13, 2005, IEEE Computer Society, 0-7695-2263-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Laith A. Al-Sulaiman, Hussein M. Abdel-Wahab |
CACMAN: A Framework for Efficient and Highly Available CA Services in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 27-30 June 2005, Murcia, Cartagena, Spain, pp. 10-15, 2005, IEEE Computer Society, 0-7695-2373-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Jiannong Cao 0001, Lin Liao, Guojun Wang 0001, Bin Xiao 0001 |
A Novel Dual-Key Management Protocol Based on a Hierarchical Multicast Infrastructure in Mobile Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCNMC ![In: Networking and Mobile Computing, Third International Conference, ICCNMC 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings, pp. 560-569, 2005, Springer, 3-540-28102-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Jiaohong Shi, Jinsong Ouyang |
eSign: an enterprise portal for secure document management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IRI ![In: Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, IRI - 2005, August 15-17, 2005, Las Vegas Hilton, Las Vegas, NV, USA, pp. 481-486, 2005, IEEE Systems, Man, and Cybernetics Society, 0-7803-9093-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Gabriel López Millán, Félix J. García Clemente, Manuel Gil Pérez, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta |
Deploying Secure Cryptographic Services in Multi-Domain IPv6 Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan, pp. 785-789, 2005, IEEE Computer Society, 0-7695-2249-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Diego R. López, Chelo Malagon, Licia Florio |
TACAR: a Simple and Fast Way for Building Trust among PKIs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 173-179, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
trust link, trust anchor, policy, Certificate, repository |
19 | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone |
Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 98-111, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano |
CERVANTES - A Certificate Validation Test-Bed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 28-42, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Matthias Enzmann, Elli Giessler, Michael Haisch, Brian Hunter, Mohammad Ilyas, Markus Schneider 0002 |
A Note on Certificate Path Verification in Next Generation Mobile Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARCS ![In: Organic and Pervasive Computing - ARCS 2004, International Conference on Architecture of Computing Systems, Augsburg, Germany, March 23-26, 2004, Proceedings, pp. 273-287, 2004, Springer, 3-540-21238-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Satoshi Koga, Kouichi Sakurai |
A Distributed Online Certificate Status Protocol with a Single Public Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 389-401, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Alec Yasinsac |
Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks (Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 283-287, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Sanghoon Song, Taekyoung Kwon 0002, Ki Song Yoon |
Practical Security Improvement of PKCS#5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2003, 18th International Symposium, Antalya, Turkey, November 3-5, 2003, Proceedings, pp. 869-876, 2003, Springer, 3-540-20409-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Marco Casassa Mont, Pete Bramhall, Keith Harrison |
A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology for Privacy in Health Care. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic, pp. 432-437, 2003, IEEE Computer Society, 0-7695-1993-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano |
Efficient Offline Certificate Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIPS ![In: Interactive Multimedia on Next Generation Networks, First International Workshop on Multimedia Interactive Protocols and Systems, MIPS 2003, Napoli, Italy, November 18-21, 2003, Proceedings, pp. 319-330, 2003, Springer, 3-540-20534-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano |
E-MHT. An Efficient Protocol for Certificate Status Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers, pp. 410-424, 2003, Springer, 3-540-20827-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | He Huang, Shyhtsun Felix Wu |
An approach to certificate path discovery in mobile Ad Hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2003, Fairfax, Virginia, USA, 2003, pp. 41-52, 2003, ACM, 1-58113-783-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
certificate path discovery, security, MANET, public key infrastructure |
19 | Seong-Eun Lee, Hong-Jong Jang, Sun-Young Han |
Implementation of Smartcard Using Multi Authentication Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2003, International Conference, Montreal, Canada, May 18-21, 2003, Proceedings, Part I, pp. 348-357, 2003, Springer, 3-540-40155-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Chang-ji Wang, Jianping Wu |
Applications of Peer to Peer Technology in CERNET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (1) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part I, pp. 436-439, 2003, Springer, 3-540-21988-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng |
An Efficient Public-Key Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings, pp. 88-99, 2003, Springer, 3-540-20150-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano |
A Certificate Status Checking Protocol for the Authenticated Dictionary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings, pp. 255-266, 2003, Springer, 3-540-40797-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Altair Olivo Santin, Joni da Silva Fraga, Frank Siqueira, Emerson Ribeiro de Mello |
Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 6-8 October 2003, Florence, Italy, pp. 66-75, 2003, IEEE Computer Society, 0-7695-1955-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Yoichi Seto |
Development of personal authentication systems using fingerprint with smart cards and digital signature technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARCV ![In: Seventh International Conference on Control, Automation, Robotics and Vision, ICARCV 2002, Singapore, 2-5 December 2002, Proceedings, pp. 996-1001, 2002, IEEE, 981-04-8364-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Diana Berbecaru, Antonio Lioy, Marius Marian |
Security aspects in standard certificate revocation mechanisms: a case study for OCSP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 1-4 July 2002, Taormina, Italy, pp. 484-489, 2002, IEEE Computer Society, 0-7695-1671-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Yuh-Jong Hu |
Some thoughts on agent trust and delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Agents ![In: Proceedings of the Fifth International Conference on Autonomous Agents, AGENTS 2001, Montreal, Canada, May 28 - June 1, 2001, pp. 489-496, 2001, ACM, 1-58113-326-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
XML |
19 | Arun K. Singh |
Deployment of Public-Key Infrastructure in Wireless Data Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN (2) ![In: Networking - ICN 2001, First International Conference, Colmar, France, July 9-13, 2001 Proceedings, Part 2, pp. 217-224, 2001, Springer, 3-540-42303-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Patrick D. McDaniel, Aviel D. Rubin |
A Response to ''Can We Eliminate Certificate Revocation Lists?''. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings, pp. 245-258, 2000, Springer, 3-540-42700-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Ferdinand J. Dafelmair |
Improvements in Process Control Dependability through Internet Security Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability and Security, 19th International Conference, SAFECOMP 2000, Rotterdam, The Netherlands, October 24-27, 2000, Proceedings, pp. 321-332, 2000, Springer, 3-540-41186-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Eugenio Faldella, Marco Prandini |
A Novel Approach to On-Line Status Authentication of Public-Key Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 270-277, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
online status authentication, sensitive data exchange, security constraints, revoked certificates, certificate status handling scheme, one-way accumulator, Owa-based Revocation Scheme, Online Certificate Status Protocol, Internet, scalability, authentication, cryptography, protocols, data integrity, data integrity, computer networks, public key cryptography, public key infrastructure, message authentication, telecommunication security, certification authority, public-key certificates, computational load, public networks |
19 | Klaus Schmeh |
A Method for Developing Public Key Infrastructure Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CQRE ![In: Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30 - December 2, 1999, Proceedings, pp. 119-126, 1999, Springer, 3-540-66800-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
19 | Shabnam Erfani, C. Sekar Chandersekaran |
Generic Support for PKIX Certificate Management in CDSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 269-275, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
CDSA, PKIX, Certificate management, architecture |
19 | Jon Ølnes, Matthieu Verdier, Nicolas Ganivet, Dominique Maillot, Jonn Skretting |
Public Key Infrastructure and Certification Policy for Inter - domain Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IS&N ![In: Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services, 5th International Conference on Intelligence and Services in Networks, IS&N'98, Antwerp, Belgium, May 25-28, 1998, Proceedings, pp. 521-534, 1998, Springer, 3-540-64598-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Xiaodong Yang 0006, Songyu Li, Muzi Li, Xiaoni Du, Caifen Wang |
Heterogeneous Signcryption Scheme From PKI to IBC With Multi-Ciphertext Equality Test in Internet of Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(8), pp. 14178-14191, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Pouyan Fotouhi Tehrani, Eric Osterweil, Thomas C. Schmidt, Matthias Wählisch |
How to Measure TLS, X.509 Certificates, and Web PKI: A Tutorial and Brief Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.18053, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Meng Luo 0002, Bo Feng 0002, Long Lu, Engin Kirda, Kui Ren 0001 |
On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 21(1), pp. 419-433, January - February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Fetulhak Abdurahman Shewajo, Abdelwahab Boualouache, Sidi Mohammed Senouci, Inès El Korbi, Bouziane Brik, Kinde Anlay Fante |
Integrating Blockchain Technology with PKI for Secure and Interoperable Communication in 5G and Beyond Vehicular Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 21st IEEE Consumer Communications & Networking Conference, CCNC 2024, Las Vegas, NV, USA, January 6-9, 2024, pp. 998-1001, 2024, IEEE, 979-8-3503-0457-2. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Weibiao Liang, Lin You, Gengran Hu |
LRS_PKI: A novel blockchain-based PKI framework using linkable ring signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 237, pp. 110043, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Diana Gratiela Berbecaru, Antonio Lioy |
An Evaluation of X.509 Certificate Revocation and Related Privacy Issues in the Web PKI Ecosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 79156-79175, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Joel Höglund, Shahid Raza, Martin Furuhed |
Towards Automated PKI Trust Transfer for IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.16562, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Matthieu Rambaud |
Adaptively Secure Consensus with Linear Complexity and Constant Round under Honest Majority in the Bare PKI Model, and Separation Bounds from the Idealized Message-Authentication Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1757, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
17 | Lizhe Zhang, Zhuoning Bai, Zhijun Wu 0001, Kenian Wang |
Unified identity authentication scheme of system wide information management based on SAML-PKI-LDAP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 22(2), pp. 186-209, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Han Bao, Xiaoping Zhang, Gaoyuan Wang, Renrui Tian, Jinrong Duan, Youjian Zhao |
Smart-PKI: A Blockchain-based Distributed Identity Validation Scheme for IoT Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: IEEE International Conference on Communications, ICC 2023, Rome, Italy, May 28 - June 1, 2023, pp. 4749-4754, 2023, IEEE, 978-1-5386-7462-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Hassan Farran, David J. Khoury |
Performance Improvements of Vehicular PKI Protocol for the Security of V2X Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TSP ![In: 46th International Conference on Telecommunications and Signal Processing, TSP 2023, Prague, Czech Republic, July 12-14, 2023, pp. 177-182, 2023, IEEE, 979-8-3503-0396-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Yibing Wang, Xiaoxiao Wang, Chin-Tser Huang, Dejun Wang, Binhao Ma, Bo Meng |
SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature Between PKI and IBC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable and Practical Security - 17th International Conference, ProvSec 2023, Wuhan, China, October 20-22, 2023, Proceedings, pp. 115-130, 2023, Springer, 978-3-031-45512-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | M. Gayathri Santhosh, T. R. Reshmi |
Enhancing PKI Security in Hyperledger Fabric with an Indigenous Certificate Authority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PKIA ![In: IEEE International Conference on Public Key Infrastructure and its Applications, PKIA 2023, Bangalore, India, September 8-9, 2023, pp. 1-5, 2023, IEEE, 979-8-3503-1055-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Anna Angelogianni, Ioannis Krontiris, Thanassis Giannetsos |
Comparative Evaluation of PKI and DAA-based Architectures for V2X Communication Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VNC ![In: IEEE Vehicular Networking Conference, VNC 2023, Istanbul, Turkey, April 26-28, 2023, pp. 199-206, 2023, IEEE, 979-8-3503-3549-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Fengyin Li, Zhongxing Liu, Tao Li 0043, Hongwei Ju, Hua Wang, Huiyu Zhou 0001 |
Privacy-aware PKI model with strong forward security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Intell. Syst. ![In: Int. J. Intell. Syst. 37(12), pp. 10049-10065, December 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Tania Saleem, Muhammad Umar Janjua, Muhammad Hassan 0001, Talha Ahmad, Filza Tariq, Khadija Hafeez, Muhammad Ahsan Salal, Muhammad Danish Bilal |
ProofChain: An X.509-compatible blockchain-based PKI framework with decentralized trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 213, pp. 109069, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Zeeshan Siddiqui, Jiechao Gao, Muhammad Khurram Khan |
An Improved Lightweight PUF-PKI Digital Certificate Authentication Scheme for the Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 9(20), pp. 19744-19756, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Arno Fiedler, Ernst-Günter Giessmann, Kim Nguyen |
Die Bedeutung von PKI - Gestern, Heute und Morgen. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 46(4), pp. 209-214, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Hu Xiong, Yingzhe Hou, Xin Huang, Yanan Zhao, Chien-Ming Chen 0001 |
Heterogeneous Signcryption Scheme From IBC to PKI With Equality Test for WBANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Syst. J. ![In: IEEE Syst. J. 16(2), pp. 2391-2400, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Amrutanshu Panigrahi, Ajit Kumar Nayak, Rourab Paul |
Smart Contract Assisted Blockchain based PKI System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2207.09127, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Shuo Jiang, Xue Chen, Yibo Cao, Tianrun Xu, Jiahuan He, Yu Cui |
APKI: An Anonymous Authentication Scheme Based on PKI for VANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCS ![In: 7th International Conference on Computer and Communication Systems, ICCCS 2022, Wuhan, China, April 22-25, 2022, pp. 530-536, 2022, IEEE, 978-1-6654-5060-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Art Sedighi, Thomas Daniels, Doug Jacobson |
On the Feasibility of T-PKI as an Anonymization Protocol for TPMs in Trusted Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BigDataSecurity/HPSC/IDS ![In: 8th IEEE Intl Conference on Big Data Security on Cloud, IEEE Intl Conference on High Performance and Smart Computing and IEEE Intl Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS, Jinan, China, May 6-8, 2022, pp. 189-193, 2022, IEEE, 978-1-6654-8069-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Abu Faisal, Mohammad Zulkernine |
DKS-PKI: A Distributed Key Server Architecture for Public Key Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 18th International Conference, ICISS 2022, Tirupati, India, December 16-20, 2022, Proceedings, pp. 23-43, 2022, Springer, 978-3-031-23689-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Laurent Chuat, Cyrill Krähenbühl, Prateek Mittal, Adrian Perrig |
F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 29th Annual Network and Distributed System Security Symposium, NDSS 2022, San Diego, California, USA, April 24-28, 2022, 2022, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
17 | Sameera Basit, Yuichi Goto |
An Extension of Reciprocal Logic for Trust Reasoning: A Case Study in PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIIDS (1) ![In: Intelligent Information and Database Systems - 14th Asian Conference, ACIIDS 2022, Ho Chi Minh City, Vietnam, November 28-30, 2022, Proceedings, Part I, pp. 496-506, 2022, Springer, 978-3-031-21742-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Xinyi Luo, Zhuo Xu, Kaiping Xue, Qiantong Jiang, Ruidong Li, David S. L. Wei |
ScalaCert: Scalability-Oriented PKI with Redactable Consortium Blockchain Enabled "On-Cert" Certificate Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 42nd IEEE International Conference on Distributed Computing Systems, ICDCS 2022, Bologna, Italy, July 10-13, 2022, pp. 1236-1246, 2022, IEEE, 978-1-6654-7177-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Aditi Roy, Kokila Jagadeesh, Ramasubramanian Natarajan, B. Shameedha Begum |
Random Number Generation for PKI Using Controlled Anderson PUF. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PKIA ![In: IEEE International Conference on Public Key Infrastructure and its Applications, PKIA 2022, Bangalore, India, September 9-10, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-8883-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Joel Höglund, Shahid Raza, Martin Furuhed |
Towards Automated PKI Trust Transfer for IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PKIA ![In: IEEE International Conference on Public Key Infrastructure and its Applications, PKIA 2022, Bangalore, India, September 9-10, 2022, pp. 1-8, 2022, IEEE, 978-1-6654-8883-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Vishwas T. Patil, R. K. Shyamasundar |
Evolving Role of PKI in Facilitating Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PKIA ![In: IEEE International Conference on Public Key Infrastructure and its Applications, PKIA 2022, Bangalore, India, September 9-10, 2022, pp. 1-7, 2022, IEEE, 978-1-6654-8883-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Lavanya Palani, Anoop Kumar Pandey, Balaji Rajendran, B. S. Bindhumadhava, Sithu D. Sudarsan |
A Study of PKI Ecosystem in South Asian and Oceania Countries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PKIA ![In: IEEE International Conference on Public Key Infrastructure and its Applications, PKIA 2022, Bangalore, India, September 9-10, 2022, pp. 1-5, 2022, IEEE, 978-1-6654-8883-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Ashwin A Krishnan, Satish Kumar Rajendran, T. K. Sunil Kumar |
Improved PKI Certificate Lifecycle Management With Centralized Device Management For Industrial IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PKIA ![In: IEEE International Conference on Public Key Infrastructure and its Applications, PKIA 2022, Bangalore, India, September 9-10, 2022, pp. 1-5, 2022, IEEE, 978-1-6654-8883-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Souvik Pan, Dhiman Saha, Rajat Moona |
Radian: Leveraging PKI for Long-Term Validation Enabled Digital Academic Testimonials - A Case-Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PKIA ![In: IEEE International Conference on Public Key Infrastructure and its Applications, PKIA 2022, Bangalore, India, September 9-10, 2022, pp. 1-8, 2022, IEEE, 978-1-6654-8883-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Sandoche Balakrichenan, Ibrahim Ayoub, Benoît Ampeau |
PKI for IoT using the DNS infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PKIA ![In: IEEE International Conference on Public Key Infrastructure and its Applications, PKIA 2022, Bangalore, India, September 9-10, 2022, pp. 1-8, 2022, IEEE, 978-1-6654-8883-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Daniel Díaz Sánchez, Florina Almenárez Mendoza, Andrés Marín López, María Isabel Rojo-Rivas |
A Hybrid Approach to Ephemeral PKI Credentials Validation and Auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UCAmI ![In: Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence, UCAmI 2022, Córdoba, Spain, 29 November - 2 December 2022, pp. 1043-1054, 2022, Springer, 978-3-031-21332-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Thomas Sermpinis, George Vlahavas, Konstantinos Karasavvas, Athena Vakali |
DeTRACT: a decentralized, transparent, immutable and open PKI certificate framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 20(4), pp. 553-570, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Xavier Boyen, Udyani Herath, Matthew McKague, Douglas Stebila |
Associative Blockchain for Decentralized PKI Transparency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptogr. ![In: Cryptogr. 5(2), pp. 14, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Yingzhe Hou, Xin Huang, Yanan Chen, Sachin Kumar Gupta, Hu Xiong |
Heterogeneous Signcryption Scheme Supporting Equality Test from PKI to CLC toward IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Emerg. Telecommun. Technol. ![In: Trans. Emerg. Telecommun. Technol. 32(8), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Laurent Chuat, Cyrill Krähenbühl, Prateek Mittal, Adrian Perrig |
F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2108.08581, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
17 | Jinnan Fan, Fabian Willems, Jafar Zahed, John Gray, Serge Mister, Mike Ounsworth, Carlisle Adams |
Impact of post-quantum hybrid certificates on PKI, common libraries, and protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Secur. Networks ![In: Int. J. Secur. Networks 16(3), pp. 200-211, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Daniel Masny, Gaven J. Watson |
A PKI-based Framework for Establishing Efficient MPC Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 1627, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
17 | Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar |
KORGAN: An Efficient PKI Architecture Based on PBFT Through Dynamic Threshold Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 64(4), pp. 564-574, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Markus Brandt, Haya Schulmann, Michael Waidner |
Evaluating Resilience of Domains in PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021, pp. 2444-2446, 2021, ACM, 978-1-4503-8454-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
Displaying result #201 - #300 of 989 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|