|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 211 occurrences of 123 keywords
|
|
|
Results
Found 318 publication records. Showing 318 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Santosh Chokhani, Warwick Ford |
Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2527, pp. 1-45, March 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Russell Housley, Warwick Ford, W. Timothy Polk, David Solo |
Internet X.509 Public Key Infrastructure Certificate and CRL Profile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2459, pp. 1-129, January 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Michael Myers, Carlisle Adams, David Solo, David Kemp |
Internet X.509 Certificate Request Message Format. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2511, pp. 1-25, March 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Sharon Boeyen, Tim Howes, Patrick Richard |
Internet X.509 Public Key Infrastructure Operational Protocols - LDAPv2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2559, pp. 1-13, April 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Michael Myers, Rich Ankney, Ambarish Malpani, Slava Galperin, Carlisle Adams |
X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2560, pp. 1-23, June 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Russell Housley, Paul E. Hoffman |
Internet X.509 Public Key Infrastructure Operational Protocols: FTP and HTTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2585, pp. 1-8, May 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Montse Rubia, Juan Carlos Cruellas, Manuel Medina |
Bringing Together X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communication Security, Second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings, pp. 199-215, 1999, Springer, 3-540-66682-6. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
21 | D. T. Pham |
Control System Dynamics by R.N. Clark, Cambridge University Press, Cambridge, 1996, 509 pp., ISBN 0-521-47239-3 (£50; Hbk). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Robotica ![In: Robotica 16(6), pp. 702, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
21 | Montse Rubia, Juan Carlos Cruellas, Manuel Medina, Isabel Gallego |
Interoperability between the X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: Ninth International Workshop on Database and Expert Systems Applications, Vienna, Austria, August 24-28, 1998, Proceedings., pp. 661-666, 1998, IEEE Computer Society, 0-8186-8353-8. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
21 | Shaw-Cheng Chuang |
Improving the X.509 Protocol for ATM Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Concurrency and Parallelism, Programming, Networking, and Security: Second Asian Computing Science Conference, ASIAN '96, Singapore, December 2-5, 1996, Proceedings, pp. 339-340, 1996, Springer, 3-540-62031-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
21 | Paul J. Krause |
The art of Prolog - second edition by Leon Sterling and Ehud Shapiro, MIT Press, Cambridge, MA 1994, pp 509, £19.95 (paperback), £44.94 (hardback), ISBN 0-262-19338-8. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Eng. Rev. ![In: Knowl. Eng. Rev. 10(4), pp. 411, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
21 | Suzan Mendes, Christian Huitema |
A new approach to the X.509 framework: allowing a global authentication infrastructure without a global trust model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 1995 Symposium on Network and Distributed System Security, (S)NDSS '95, San Diego, California, USA, February 16-17, 1995, pp. 172-190, 1995, IEEE Computer Society, 0-8186-7027-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
21 | Klaus Gaarder, Einar Snekkenes |
Applying a Formal Analysis Technique to the CCITT X.509 Strong Two-Way Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 3(2), pp. 81-98, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
21 | H. L. Fox |
Conference Proceedings (IFAC Symposia Series 1990, Nos 12, 13, 16 and 17) 1.Low Cost Automation: Techniques, Components and Instruments Applications, edited by A. De Carli Pergamon Press, Oxford, 1990 xiv + 509 pp., author index, keyword index, No 12 of the Series (Hdb. £83.00).2. Information Control Problems in Manufacturing Technology, edited by E.A. Puente and L. Nemes Pergamon Press, Oxford, 1990 xviii + 691 pp., author index, keyword index, No 13 of the Series (Hdb. £110.00).3. Skill Based Automated Production, edited by P. Kopacek and R. Genser Pergamon Press, Oxford, 1990, x + 240 pp., author index, keyword index, No 16 of the Series (Hdb. £42.00).4. Safety of Computer Control Systems: Safety, Security and Reliability Related Computers for the 1990s, edited by G.B.K. Daniels Pergamon Press, Oxford, 1990, xi + 177 pp., author index, keyword index, No 17 of the Series (Hdb. £33.00). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Robotica ![In: Robotica 9(4), pp. 448, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
21 | Colin I'Anson, Chris J. Mitchell |
Security defects in CCITT recommendation X.509: the directory authentication framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 20(2), pp. 30-34, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
21 | Robert M. Haralick |
Robot vision: Berthold Horn. MIT Press, Cambridge, MA 1986, 509 pp. $39.50. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Vis. Graph. Image Process. ![In: Comput. Vis. Graph. Image Process. 34(1), pp. 118-119, 1986. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
|
21 | John G. Lewis |
Remark on "Algorithms 508 and 509: Matrix Bandwidth and Profile Reduction and A Hybrid Profile Reduction Algorith". ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Math. Softw. ![In: ACM Trans. Math. Softw. 8(2), pp. 221, 1982. The full citation details ...](Pics/full.jpeg) |
1982 |
DBLP DOI BibTeX RDF |
|
21 | Charles H. Davis |
An introduction to programming: A Structured Approach Using PL/1 and PL/C-7. Richard Conway and David Gries. Cambridge, Mass.: Winthrop Publishers, Inc., 509 p. (1975). ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Am. Soc. Inf. Sci. ![In: J. Am. Soc. Inf. Sci. 27(2), pp. 126, 1976. The full citation details ...](Pics/full.jpeg) |
1976 |
DBLP DOI BibTeX RDF |
|
13 | Andreas Haeberlen |
A case for the accountable cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 44(2), pp. 52-57, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
13 | David O'Callaghan, Louise Doran, Brian A. Coghlan |
Evaluating trust in grid certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 1449-1450, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
trust, grid, PKI |
13 | Hector Ouilhet |
Google Sky Map: using your phone as an interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile HCI ![In: Proceedings of the 12th Conference on Human-Computer Interaction with Mobile Devices and Services, Mobile HCI 2010, Lisbon, Portugal, September 7-10, 2010, pp. 419-422, 2010, ACM, 978-1-60558-835-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
13 | Timothy Wood 0001, Gabriel Tarasuk-Levin, Prashant J. Shenoy, Peter Desnoyers, Emmanuel Cecchet, Mark D. Corner |
Memory buddies: exploiting page sharing for smart colocation in virtualized data centers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 43(3), pp. 27-36, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Christian Schridde, Matthew Smith 0001, Bernd Freisleben |
TrueIP: prevention of IP spoofing attacks using identity-based cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 128-137, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network security, denial-of-service, signatures, identity-based cryptography, IP spoofing |
13 | Frederik Orellana, Christian Ulrik Søttrup, Anders Wäänänen, Daniel Kalici, Michael Grønager |
The Case for a Simpler Security Model in Grid Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 595-599, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Frank Siebenlist, Rachana Ananthakrishnan, David E. Bernholdt, Luca Cinquini, Ian T. Foster, Don Middleton, Neill Miller, Dean N. Williams |
Enhancing the earth system grid security infrastructure through single sign-on and autoprovisioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SC-GCE ![In: Proceedings of the 5th Grid Computing Environments Workshop, GCE 2009, November 20, 2009, Portland, Oregon, USA, 2009, ACM, 978-1-60558-887-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ESG, SLCS, authentication, authorization, PKI, SAML, OpenID |
13 | Quentin Jones, Sukeshini A. Grandhi, Samer Karam, Steve Whittaker 0001, Changqing Zhou, Loren G. Terveen |
Geographic 'Place' and 'Community Information' Preferences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Support. Cooperative Work. ![In: Comput. Support. Cooperative Work. 17(2-3), pp. 137-167, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
locomotive media, P3-Systems, pervasive computing, social computing, place |
13 | Dong Kyun Jeong, Kyoung Ho Lee, Bo Hyoung Kim, Kil Joong Kim, Young Hoon Kim, Vasundhara Bajpai, Yeong-Gil Shin |
On-the-fly Generation of Multiplanar Reformation Images Independent of CT Scanner Type. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Imaging ![In: J. Digit. Imaging 21(3), pp. 306-311, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Multidetector-row computed tomography, multiplanar reformation, automation |
13 | Isaac Agudo, Javier López 0001, José A. Montenegro |
Enabling Attribute Delegation in Ubiquitous Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 13(3-4), pp. 398-410, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
attribute based authorization, delegation, federation |
13 | Shu-Lin Chen, Stanley Chow, Christophe Gustave, Dmitri Vinokurov |
Prototyping a New Identity Authentication Framework for IP Telephony. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France, pp. 47-52, 2008, IEEE Computer Society, 978-0-7695-3329-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk |
Provably secure browser-based user-aware mutual authentication over TLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 300-311, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
browser-based protocols, phishing, user authentication, TLS |
13 | Zhun Cai |
A Password-Based Grid Security Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: Second International Conference on the Digital Society (ICDS 2008), February 10-15, 2008, Sainte Luce, Martinique, France, pp. 157-164, 2008, IEEE Computer Society, 978-0-7695-3087-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AKE, EKE, Authentication, Delegation, Grid Security |
13 | Yuan-Chin Wen, Chia-Hung Chen, Sheng-De Wang |
Crossing Heterogeneous Grid Systems with a Single Sign-On Scheme Based on a P2P Layer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 45-51, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Paul Rabinovich |
ECL: A TLS Extension for Authentication in Complex PKIs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2210-2215, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Sebastian Gajek, Mark Manulis, Jörg Schwenk |
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 6-20, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Jingjing Wu, Jiwu Jing, Jingqiang Lin |
A Decentralized Certification Authority Based on Real World Trust Relationships. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 1123-1126, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the First International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2007, October 14-20, 2007, Valencia, Spain, pp. 216-221, 2007, IEEE Computer Society, 0-7695-2989-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Chris Karlof, Umesh Shankar, J. Doug Tygar, David A. Wagner 0001 |
Dynamic pharming attacks and locked same-origin policies for web browsers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 58-71, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
same-origin policy, pharming, web authentication |
13 | Massimiliano Pala, Sean W. Smith |
AutoPKI: A PKI Resources Discovery System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 154-169, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Service Discovery, PKI, Digital Certificates, Certification Authority |
13 | Valentina Casola, Nicola Mazzocca, Jesus Luna, Oscar Manso, Manel Medina |
Static evaluation of Certificate Policies for GRID PKIs interoperability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 391-399, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Joaquín García-Alfaro, Guillermo Navarro-Arribas |
Prevention of Cross-Site Scripting Attacks on Current Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II, pp. 1770-1784, 2007, Springer, 978-3-540-76835-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security Policies, Software Protection, Code Injection Attacks |
13 | Michelle S. Wangham, Emerson Ribeiro de Mello, Joni da Silva Fraga, Davi da Silva Böger |
A Model to support SPKI Federations management through XKMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2007 IEEE International Conference on Web Services (ICWS 2007), July 9-13, 2007, Salt Lake City, Utah, USA, pp. 338-345, 2007, IEEE Computer Society, 0-7695-2924-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Arash Faroughi, Roozbeh Faroughi, Philipp Wieder, Wolfgang Ziegler |
Attributes and VOs: Extending the UNICORE Authorisation Capabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Euro-Par Workshops ![In: Euro-Par 2007 Workshops: Parallel Processing, HPPC 2007, UNICORE Summit 2007, and VHPC 2007, Rennes, France, August 28-31, 2007, Revised Selected Papers, pp. 121-130, 2007, Springer, 978-3-540-78472-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Shushan Zhao, Akshai K. Aggarwal, Robert D. Kent |
PKI-Based Authentication Mechanisms in Grid Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE NAS ![In: International Conference on Networking, Architecture, and Storage, NAS 2007, 29-31 July 2007, Guilin, China, pp. 83-90, 2007, IEEE Computer Society, 0-7695-2927-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han |
Home Device Authentication Method Based on PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (2) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 7-11, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Ralf Groeper, Christian Grimm, Stefan Piger, Jan Wiebelitz |
An Architecture for Authorization in Grids using Shibboleth and VOMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO-SEAA ![In: 33rd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA 2007), August 28-31, 2007, Lübeck, Germany, pp. 367-374, 2007, IEEE Computer Society, 0-7695-2977-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Yanjiang Yang, Robert H. Deng, Feng Bao 0001 |
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings, pp. 177-192, 2007, Springer, 978-3-540-72159-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Francesca Di Patti, Franco Bagnoli |
Biologically Inspired Classifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIOWIRE ![In: Bio-Inspired Computing and Communication, First Workshop on Bio-Inspired Design of Networks, BIOWIRE 2007, Cambridge, UK, April 2-5, 2007, Revised Selected Papers, pp. 332-339, 2007, Springer, 978-3-540-92190-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
microarray, knowledge network |
13 | Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han, Kyo-Il Chung |
Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb/WAIM Workshops ![In: Advances in Web and Network Technologies, and Information Management, APWeb/WAIM 2007 International Workshops: DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Huang Shan, China, June 16-18, 2007, Proceedings, pp. 573-582, 2007, Springer, 978-3-540-72908-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
home network security, home device authentication, home device certificate |
13 | Justin Burruss, Thomas W. Fredian, Mary R. Thompson |
ROAM: An Authorization Manager for Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Grid Comput. ![In: J. Grid Comput. 4(4), pp. 413-423, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
FusionGrid, Grid computing, authorization, Globus, Grid security |
13 | Axel Treßel, Jörg Keller 0001 |
A System for Secure IP Telephone Conferences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Fifth IEEE International Symposium on Network Computing and Applications, NCA 2006, 24-26 July 2006, Cambridge, Massachusetts, USA, pp. 231-234, 2006, IEEE Computer Society, 0-7695-2640-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Antonio Lain, Miranda Mowbray |
Distributed Authorization Using Delegation with Acyclic Paths. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 19th IEEE Computer Security Foundations Workshop, (CSFW-19 2006), 5-7 July 2006, Venice, Italy, pp. 257-269, 2006, IEEE Computer Society, 0-7695-2615-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Mingchu Li, Hongyan Yao, Jianbo Ma |
Recovery Mechanism of Online Certification Chain in Grid Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 558-562, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Certifucate Chain, Double signature, Grid security, Proxy certificate |
13 | Willy Weisz |
Towards More Flexible and Increased Security and Privacy in Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Euro-Par Workshops ![In: Euro-Par 2006 Workshops: Parallel Processing, CoreGRID 2006, UNICORE Summit 2006, Petascale Computational Biology and Bioinformatics, Dresden, Germany, August 29-September 1, 2006, Revised Selected Papers, pp. 205-214, 2006, Springer, 978-3-540-72226-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Cheol-seung Lee, Hyeong-Gyun Kim, Joon Lee |
Design of User Authentication System based on WPKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the 10th International Conference on CSCW in Design, CSCWD 2006, May 3-5, 2006, Southeast University, Nanjing, China, pp. 979-983, 2006, IEEE, 1-4244-0165-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Anantharaman Lakshminarayanan, Tong-Lee Lim |
Augmented Certificate Revocation Lists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 87-98, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Taekyoung Kwon 0002, Jung Hee Cheon, Yongdae Kim, Jaeil Lee |
Privacy Protection in PKIs: A Separation-of-Authority Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers, pp. 297-311, 2006, Springer, 978-3-540-71092-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Milan Markovic |
On Secure e-Health Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedings, pp. 360-374, 2006, Springer, 3-540-49330-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
E-healthcare systems, Multilayered security systems, PKI systems, smart cards |
13 | Jesus Luna, Oscar Manso, Manel Medina |
OCSP for Grids: Comparing Prevalidation versus Caching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 7th IEEE/ACM International Conference on Grid Computing (GRID 2006), September 28-29, 2006, Barcelona, Spain, Proceedings, pp. 184-191, 2006, IEEE Computer Society, 1-4244-0344-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Richard O. Sinnott, Jipu Jiang, John P. Watt, Oluwafemi O. Ajayi |
Shibboleth-based Access to and Usage of Grid Resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 7th IEEE/ACM International Conference on Grid Computing (GRID 2006), September 28-29, 2006, Barcelona, Spain, Proceedings, pp. 136-143, 2006, IEEE Computer Society, 1-4244-0344-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Gabriel López Millán, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Sassa Otenko, David W. Chadwick |
A Heterogeneous Network Access Service Based on PERMIS and SAML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 55-72, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Karan Bhatia, Sandeep Chandra, Kurt Mueller |
GAMA: Grid Account Management Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Science ![In: First International Conference on e-Science and Grid Technologies (e-Science 2005), 5-8 December 2005, Melbourne, Australia, pp. 413-420, 2005, IEEE Computer Society, 0-7695-2448-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Tuomas Aura, Michael Roe, Anish Mohammed |
Experiences with Host-to-Host IPsec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 3-22, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | William Joseph Adams, George C. Hadjichristofi, Nathaniel J. Davis IV |
Calculating a node's reputation in a mobile ad hoc network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 24th IEEE International Performance Computing and Communications Conference, IPCCC 2005, April 7-9, 2005, Phoenix, Arizona, USA, pp. 303-307, 2005, IEEE, 0-7803-8991-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | David Del Vecchio, Marty Humphrey, Jim Basney, Nataraj Nagaratnam |
CredEx: User-Centric Credential Management for Grid and Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2005 IEEE International Conference on Web Services (ICWS 2005), 11-15 July 2005, Orlando, FL, USA, pp. 149-156, 2005, IEEE Computer Society, 0-7695-2409-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Jochen Eisinger, Peter Winterer, Bernd Becker 0001 |
Securing Wireless Networks in a University Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: 3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 8-12 March 2005, Kauai Island, HI, USA, pp. 312-316, 2005, IEEE Computer Society, 0-7695-2300-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Wei Zhou 0006, Christoph Meinel, Vinesh H. Raja |
A Framework for Supporting Distributed Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 27-30 June 2005, Murcia, Cartagena, Spain, pp. 442-447, 2005, IEEE Computer Society, 0-7695-2373-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Sukeshini A. Grandhi, Quentin Jones, Samer Karam |
Sharing the big apple: a survey study of people, place and locatability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, CHI 2005, Portland, Oregon, USA, April 2-7, 2005, pp. 1407-1410, 2005, ACM, 1-59593-002-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
P3-systems, pervasive computing, location based services, context aware computing, virtual communities |
13 | Max Ziegler, Wolfgang Müller 0003, Robbie Schaefer, Chris Loeser |
Secure Profile Management in Smart Home Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 22-26 August 2005, Copenhagen, Denmark, pp. 209-213, 2005, IEEE Computer Society, 0-7695-2424-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Security, OSGi, Profile Management |
13 | Cristian Marinescu, Nicolae Tapus |
Some Critical Aspects of the PKIX TSP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings, pp. 286-288, 2005, Springer, 3-540-28791-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
TSA, PKIX TSP, security, PKI, time-stamp |
13 | Arjen K. Lenstra, Benne de Weger |
On the Possibility of Constructing Meaningful Hash Collisions for Public Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings, pp. 267-279, 2005, Springer, 3-540-26547-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | So-Young Park, Sang-Ho Lee |
ID-Based Access Control and Authority Delegations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 884-893, 2005, Springer, 3-540-30803-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Justin Burruss |
The resource oriented authorization manager (ROAM). ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPDC ![In: Proceedings of the 14th IEEE International Symposium on High Performance Distributed Computing, HPDC-14, Research Triangle Park, North Carolina, USA, 24-27 July 2005, pp. 308-309, 2005, IEEE Computer Society, 0-7803-9037-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Gabriel López Millán, Félix J. García Clemente, Manuel Gil Pérez, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta |
Deploying Secure Cryptographic Services in Multi-Domain IPv6 Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan, pp. 785-789, 2005, IEEE Computer Society, 0-7695-2249-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | John M. Brooke, Michael S. Parkin |
A PDA Client for the Computational Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 13-15 June 2005, Linköping, Sweden, pp. 325-330, 2005, IEEE Computer Society, 0-7695-2362-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | John-Paul Robinson, Jill B. Gemmill, Pravin Joshi, Purushotham V. Bangalore, Yiyi Chen, Silbia Peechakara, Song Zhou, Prahalad Achutharao |
Web-enabled grid authentication in a non-Kerberos environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 6th IEEE/ACM International Conference on Grid Computing (GRID 2005), November 13-14, 2005, Seattle, Washington, USA, Proceedings, pp. 318-322, 2005, IEEE Computer Society, 0-7803-9493-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Chengye Lu, Shlomo Geva |
Secure email-based peer to peer information retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CW ![In: 4th International Conference on Cyberworlds (CW 2005), 23-25 November 2005, Singapore, pp. 531-538, 2005, IEEE Computer Society, 0-7695-2378-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Gansen Zhao, David W. Chadwick |
Evolving Messaging Systems for Secure Role Based Messaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 16-20 June 2005, Shanghai, China, pp. 216-223, 2005, IEEE Computer Society, 0-7695-2284-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Albert Levi, M. Ufuk Çaglayan, Çetin Kaya Koç |
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(1), pp. 21-59, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
nested certificates, key management, public key infrastructure, Digital certificates |
13 | Huai-Kuang Tsai, Jinn-Moon Yang, Yuan-Fang Tsai, Cheng-Yan Kao |
An evolutionary algorithm for large traveling salesman problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part B ![In: IEEE Trans. Syst. Man Cybern. Part B 34(4), pp. 1718-1729, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
13 | Yasir Ali, Sean W. Smith |
Flexible and Scalable Public Key Security for SSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 43-56, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
13 | Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis |
Delivering Attribute Certificates over GPRS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004, pp. 1166-1170, 2004, ACM, 1-58113-812-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
performance evaluation, UMTS, PKI, GPRS, attribute certificates |
13 | Lin Chen 0020, Xiaoqin Huang, Jinyuan You |
Certificate-Based Authentication and Authorization Architecture in Digital Library. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICADL ![In: Digital Libraries: International Collaboration and Cross-Fertilization, 7th International Conference on Asian Digital Libraries, ICADL 2004, Shanghai, China, December 13-17, 2004, Proceedings, pp. 643, 2004, Springer, 3-540-24030-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
13 | Vicente Benjumea, Javier López 0001, José A. Montenegro, José M. Troya |
A First Approach to Provide Anonymity in Attribute Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 402-415, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
13 | Tadashi Komori, Takamichi Saito |
A Secure Wireless LAN System Retaining Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 370-375, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
13 | Gail-Joon Ahn, Dongwan Shin, Longhua Zhang |
Role-Based Privilege Management Using Attribute Certificates and Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings, pp. 100-109, 2004, Springer, 3-540-22919-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
13 | Hui Liu, Minglu Li 0001 |
SVO Logic Based Formalisms of GSI Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Parallel and Distributed Computing: Applications and Technologies, 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004, Proceedings, pp. 744-747, 2004, Springer, 3-540-24013-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
13 | Anders Ericsson, Amelié Huart, Andreas Ekefjärd, Kalle Åström, Holger Holst, Eva Evander, Per Wollmer, Lars Edenbrandt |
Automated Interpretation of Ventilation-Perfusion Lung Scintigrams for the Diagnosis of Pulmonary Embolism Using Support Vector Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCIA ![In: Image Analysis, 13th Scandinavian Conference, SCIA 2003, Halmstad, Sweden, June 29 - July 2, 2003, Proceedings, pp. 415-421, 2003, Springer, 3-540-40601-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
13 | Jaeil Lee, Minsoo Lee, Jabeom Gu, Seoklae Lee, Sehyun Park, JooSeok Song |
New Adaptive Trust Models against DDoS: Back-Up CA and Mesh PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Human.Society@Internet 2003 ![In: Web Communication Technologies and Internet-Related Social Issues - HSI 2003, Second International Conference on Human Society@Internet, Seoul, Korea, June 18-20, 2003, Proceedings, pp. 731-737, 2003, Springer, 3-540-40456-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
13 | Altair Olivo Santin, Joni da Silva Fraga, Carlos Maziero |
Extending the SDSI / SPKI Model through Federation Webs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security - Advanced Techniques for Network and Data Protection, 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings, pp. 132-145, 2003, Springer, 3-540-20185-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
13 | Cheolhyun Kim, Yeijin Lee, Ilyong Chung |
The Design of an Efficient Kerberos Authentication Mechanism Associated with Directory Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (1) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part I, pp. 972-979, 2003, Springer, 3-540-21988-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
13 | Edward Bubnis, Shelby Evans, Peter Fischer, Elizabeth Meighan, Aswin Almeida |
Open-Source PKI on SELinux A Technology Description. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISCEX (2) ![In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 22-24 April 2003, Washington, DC, USA, pp. 4-6, 2003, IEEE Computer Society, 0-7695-1897-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
13 | Edward Bubnis, Shelby Evans, Peter Fischer, Elizabeth Meighan, Aswin Almeida |
Open-Source PKI on SELinux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISCEX (2) ![In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 22-24 April 2003, Washington, DC, USA, pp. 170-175, 2003, IEEE Computer Society, 0-7695-1897-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
13 | Trevor Perrin |
Public key distribution through "cryptoIDs". ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the New Security Paradigms Workshop 2003, August 18-21, 2002, Ascona, Switzerland, pp. 87-102, 2003, ACM, 1-58113-880-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
cryptoIDs, key management, fingerprints, key distribution, public key infrastructure |
13 | Weidong Qiu, Mingxing He, Firoz Kaderali |
Group Oriented Digital Certificate Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 24-27 June 2003, Newport Beach, CA, USA, pp. 233-237, 2003, IEEE Computer Society, 0-7695-1969-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
13 | Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng |
An Efficient Public-Key Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings, pp. 88-99, 2003, Springer, 3-540-20150-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
13 | Tomoyuki Yamakami |
Quantum Optimization Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UMC ![In: Unconventional Models of Computation, Third International Conference, UMC 2002, Kobe, Japan, October 15-19, 2002, Proceedings, pp. 300-314, 2002, Springer, 3-540-44311-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
13 | Yoichi Seto |
Development of personal authentication systems using fingerprint with smart cards and digital signature technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARCV ![In: Seventh International Conference on Control, Automation, Robotics and Vision, ICARCV 2002, Singapore, 2-5 December 2002, Proceedings, pp. 996-1001, 2002, IEEE, 981-04-8364-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
13 | John DeTreville |
Binder, a Logic-Based Security Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2002 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002, pp. 105-113, 2002, IEEE Computer Society, 0-7695-1543-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
13 | Sye Loong Keoh, Emil Lupu |
Towards flexible credential verification in mobile ad-hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POMC ![In: Proceedings of the 2002 Workshop on Principles of Mobile Computing, POMC 2002, October 30-31, 2002, Toulouse, France, pp. 58-65, 2002, ACM, 1-58113-511-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
credential verification, security, authentication, trust |
13 | Joon S. Park, Ravi S. Sandhu, Gail-Joon Ahn |
Role-based access control on the web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 4(1), pp. 37-71, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
WWW security, World Wide Web (WWW), role-based access control, cookies, digital certificates |
Displaying result #201 - #300 of 318 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ >>] |
|