Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
24 | Berthold Agreiter, Michael Hafner, Ruth Breu |
A Fair Non-repudiation Service in a Web Services Peer-to-Peer Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 63-72, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
24 | Xueming Wang, Xiang Li |
Game-Based Analysis of Multi-Party Non-Repudiation Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2007, Harbin, Heilongjiang, China, December 15-19, 2007, pp. 642-646, 2007, IEEE Computer Society, 0-7695-3072-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Chou Chen Yang, Ya-Wen Yang, Wei-Ting Liu |
A Robust Authentication Protocol with Non-Repudiation Service for Integrating WLAN and 3G Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 39(2), pp. 229-251, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Hongyan Peng, Xiaojian Li, Chunhe Xia, Jianfeng Deng, Xiaofa Zhou |
A Non-Repudiation Protocol for E-Mail and Its Formal Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Res. Dev. ![In: J. Comput. Res. Dev. 43(11), pp. 1914-1919, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
24 | Christian Hett, Nicolai Kuntze, Andreas U. Schmidt |
Security and Non-Repudiation for Voice-Over-IP Conversations ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/cs/0606068, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
24 | Guilin Wang |
Generic non-repudiation protocols supporting transparent off-line TTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 14(5), pp. 441-467, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Gregory Vert, Manaf Alfize |
An Enhanced Pretty Good Privacy (EPGP) System with Mutual Non-Repudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the 2006 International Conference on Security & Management, SAM 2006, Las Vegas, Nevada, USA, June 26-29, 2006, pp. 364-370, 2006, CSREA Press, 1-60132-001-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
24 | Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner |
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers, pp. 165-178, 2006, Springer, 978-3-540-69172-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Antonio Ruiz-Martínez, C. Inmaculada Marín-López, Laura Baño-López, Antonio Fernandez Gómez-Skarmeta |
A new fair non-repudiation protocol for secure negotiation and contract signing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 16, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
abuse freeness, contract negotiation, contract signing protocol, security, e-commerce, confidentiality, fair-exchange |
24 | Da-Zhi Sun, Zhen-Fu Cao |
Improved public key authentication scheme for non-repudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 168(2), pp. 927-932, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Seokwon Yang, Stanley Y. W. Su, Herman Lam |
A non-repudiation message transfer protocol for collaborative e-commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Bus. Process. Integr. Manag. ![In: Int. J. Bus. Process. Integr. Manag. 1(1), pp. 34-42, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Richard W. C. Lui, Siu-Ming Yiu, Lucas Chi Kwong Hui |
Efficient Authorization in Delegation Chains with Strong Non-Repudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWAP ![In: Applied Public Key Infrastructure - 4th International Workshop: IWAP 2005, Singapore, September 21-23, 2005, pp. 66-77, 2005, IOS Press, 978-1-58603-550-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
24 | Guilin Wang |
Generic Fair Non-Repudiation Protocols with Transparent Off-line TTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWAP ![In: Applied Public Key Infrastructure - 4th International Workshop: IWAP 2005, Singapore, September 21-23, 2005, pp. 51-65, 2005, IOS Press, 978-1-58603-550-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
24 | Yuan Ding, Guo Tao, Pingzhi Fan |
The design and analysis of an electronic evidence and non-repudiation protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISADS ![In: 2005 International Symposium on Autonomous Decentralized Systems, ISADS 2005, Chengdu, China, April 4-8, 2005, Proceedings, pp. 570-573, 2005, IEEE Computer Society, 0-7803-8963-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Michael Roe |
Non-repudiation and the Metaphysics of Presence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 207-214, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Michael Roe |
Non-repudiation and the Metaphysics of Presence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 204-206, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Yi-Chi Lin, Jill Slay |
Non-Repudiation in Pure Mobile Ad Hoc Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005, pp. 59-66, 2005, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0611-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
24 | Hasan, Burkhard Stiller |
Non-repudiation of consumption of mobile Internet services with privacy support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WiMob (2) ![In: 2005 IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, WiMob 2005, Montreal, Canada, August 22-14, 2005, Volume 2, pp. 1-8, 2005, IEEE. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | J. G. Cederquist, Ricardo Corin, Muhammad Torabi Dashti |
On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 27-39, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina |
Automatic Analysis of a Non-Repudiation Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QAPL ![In: Proceedings of the Second Workshop on Quantitative Aspects of Programming Languages, QAPL 2004, Barcelona, Spain, March 27-28, 2004, pp. 113-129, 2004, Elsevier. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Jose Antonio Onieva, Jianying Zhou 0001, Javier López 0001 |
Non-repudiation protocols for multiple entities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 27(16), pp. 1608-1616, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Jose Antonio Onieva, Jianying Zhou 0001, Javier López 0001, Mildrey Carbonell |
Agent-mediated non-repudiation protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Commer. Res. Appl. ![In: Electron. Commer. Res. Appl. 3(2), pp. 152-162, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Ana Isabel González-Tablas Ferreres, Karel Wouters, Benjamín Ramos Álvarez |
Teaching X.509/PKIX Based Digital Signatures While Enhancing Non-Repudiation of a Web Based Assessment System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWI ![In: Proceedings of the IADIS International Conference WWW/Internet 2004, Madrid, Spain, 2 Volumes, pp. 43-51, 2004, IADIS, 972-99353-0-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
24 | Botao Li, Junzhou Luo |
On timeliness of a fair non-repudiation protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecu ![In: Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004, pp. 99-106, 2004, ACM. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Sungwoo Tak, Yugyung Lee, Eun Kyo Park |
A software framework for non-repudiation service in electronic commerce based on the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microprocess. Microsystems ![In: Microprocess. Microsystems 27(5-6), pp. 265-276, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Ronggong Song, Larry Korba |
Pay-TV system with strong privacy and non-repudiation protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Consumer Electron. ![In: IEEE Trans. Consumer Electron. 49(2), pp. 408-413, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Steve Kremer, Jean-François Raskin |
A Game-based Verification of Non-repudiation and Fair Exchange Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 11(3), pp. 399-430, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Padmanabhan Krishnan, Robert Bannerman |
User Assisted Verification of Non-Repudiation and Similar Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the International Conference on Security and Management, SAM '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 1, pp. 161-170, 2003, CSREA Press, 1-932415-16-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
24 | Jose Antonio Onieva, Jianying Zhou 0001, Mildrey Carbonell, Javier López 0001 |
A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece, pp. 37-48, 2003, Kluwer, 1-4020-7449-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
24 | Jing-Jang Hwang, Min-Hua Shao, Soushan Wu |
Establishing Chain of Evidence as a Base for Non-Repudiation Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece, pp. 49-60, 2003, Kluwer, 1-4020-7449-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
24 | Aleksandra Nenadic, Ning Zhang 0001 |
Non-Repudiation and Fairness in Electronic Data Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEIS (4) ![In: ICEIS 2003, Proceedings of the 5th International Conference on Enterprise Information Systems, Angers, France, April 22-26, 2003, pp. 55-62, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
24 | Xianxian Li, Jinpeng Huai |
Efficient Non-Repudiation Multicast Source Authentication Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 17(6), pp. 820-829, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Steve Kremer, Olivier Markowitch, Jianying Zhou 0001 |
An intensive survey of fair non-repudiation protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 25(17), pp. 1606-1621, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Tomás Rosa |
Key-collisions in (EC)DSA: Attacking Non-repudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2002, pp. 129, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
24 | Wensheng Zhou, Troy Rockwood, Phoom Sagetong |
Non-repudiation oblivious watermarking schema for secure digital video distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Workshop on Multimedia Signal Processing ![In: IEEE 5th Workshop on Multimedia Signal Processing, MMSP 2002, St. Thomas, Virgin Islands, USA, December 9-11, 2002, pp. 343-346, 2002, IEEE, 0-7803-7713-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Bo Meng, Shaomei Wang, Qianxing Xiong |
A Fair Non-Repudiation Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the Seventh International Conference on CSCW in Design, CSCWD 2002, September 25-27, 2002, Rio de Janeiro, Brazil, pp. 68-73, 2002, IEEE, 85-285-0050-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Jianying Zhou 0001 |
Non-Repudiation in Electronic Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2-6 September 2002, Aix-en-Provence, France, 2002, IEEE Computer Society, 0-7695-1668-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
24 | Sungwoo Tak, Yugyung Lee, Eun Kyo Park |
A software framework for non-repudiation service in electronic commerce based on the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 11th International Conference on Computer Communications and Networks, ICCCN 2002, 14-16 October, 2002, Hyatt Regency Miami, Miami, Florida, USA, pp. 182-189, 2002, IEEE, 0-7803-7553-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Ronggong Song, Michael R. Lyu |
Analysis of privacy and non-repudiation on pay-TV systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Consumer Electron. ![In: IEEE Trans. Consumer Electron. 47(4), pp. 729-733, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | L. Harn, H. Y. Lin |
A non-repudiation metering scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Lett. ![In: IEEE Commun. Lett. 5(12), pp. 486-487, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Lawrence C. Paulson |
A Proof of Non-repudiation (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers, pp. 126-133, 2001, Springer, 3-540-44263-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Panagiotis Louridas |
Some guidelines for non-repudiation protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 30(5), pp. 29-38, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Adrian McCullagh, William J. Caelli |
Non-Repudiation in the Digital Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
First Monday ![In: First Monday 5(8), 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Nam-Yih Lee, Chi-Chao Chang, Chun-Li Lin, Tzonelih Hwang |
Privacy and non-repudiation on pay-TV systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Consumer Electron. ![In: IEEE Trans. Consumer Electron. 46(1), pp. 20-27, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Birgit Pfitzmann, Ahmad-Reza Sadeghi |
Anonymous Fingerprinting with Direct Non-Repudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2000, pp. 32, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
24 | Steve Kremer, Olivier Markowitch |
A Multi-Party Non-Repudiation Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security for Global Information Infrastructures, IFIP TC11 Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China, pp. 271-280, 2000, Kluwer, 0-7923-7914-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
24 | Jerrold F. Stach, Eun Kyo Park, Kia Makki |
Performance of an enhanced GSM protocol supporting non-repudiation of service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 22(7), pp. 675-680, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Jianying Zhou 0001, Kwok-Yan Lam |
Securing digital signatures for non-repudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 22(8), pp. 710-716, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Malleswar Kalla, Johnny S. K. Wong, Armin R. Mikler, Stephen Elbert |
Achieving non-repudiation of Web based transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 48(3), pp. 165-175, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Cheng-Hwee You, Jianying Zhou 0001, Kwok-Yan Lam |
On the efficient implementation of fair non-repudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 28(5), pp. 50-60, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
24 | Steve A. Schneider |
Formal Analysis of a Non-Repudiation Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Proceedings of the 11th IEEE Computer Security Foundations Workshop, Rockport, Massachusetts, USA, June 9-11, 1998, pp. 54-65, 1998, IEEE Computer Society, 0-8186-8488-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
24 | Jianying Zhou 0001 |
Non-repudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
1997 |
RDF |
|
24 | Tom Coffey, Puneet Saidha |
Non-repudiation with mandatory proof of receipt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 26(1), pp. 6-17, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
24 | Ning Zhang, Qi Shi 0001 |
Achieving Non-Repudiation of Receipt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 39(10), pp. 844-853, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
24 | Yongfei Han |
Investigation of non-repudiation protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, First Australasian Conference, ACISP'96, Wollongong, NSW, Australia, June 24-26, 1996, Proceedings, pp. 38-47, 1996, Springer, 3-540-61991-7. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
24 | R. Taylor |
Non-repudiation without public-key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, First Australasian Conference, ACISP'96, Wollongong, NSW, Australia, June 24-26, 1996, Proceedings, pp. 27-37, 1996, Springer, 3-540-61991-7. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Moni Naor |
Deniable Ring Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 481-498, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng |
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings, pp. 173-179, 2001, Springer, 3-540-41658-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Antoni Martínez-Ballesté, Francesc Sebé, Josep Domingo-Ferrer |
Large-Scale Pay-As-You-Watch for Unicast and Multicast Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings, pp. 261-268, 2004, Springer, 3-540-22919-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Pay-per-view systems, multicast, electronic payments |
15 | Wei Gao 0007, Xueli Wang, Dongqing Xie |
Chameleon Hashes Without Key Exposure Based on Factoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 22(1), pp. 109-113, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
chameleon signature, key-exposure, chameleon hash |
15 | Xiaofeng Chen 0001, Fangguo Zhang, Kwangjo Kim |
Chameleon Hashing Without Key Exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings, pp. 87-98, 2004, Springer, 3-540-23208-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Byoungcheon Lee, Heesun Kim, Kwangjo Kim |
Secure Mobile Agent Using Strong Non-designated Proxy Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings, pp. 474, 2001, Springer, 3-540-42300-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Secure mobile agent, strong non-designated proxy signature, multi-proxy signature |
14 | Wei Zhao, Dingfeng Ye |
Modified Huang-Wang's Convertible Nominative Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2090-2095, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Yaling Zhang, Jing Zhang, Yikun Zhang |
Multi-signers Strong Designated Verifier Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 324-328, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Multi-signers, Designated Verifier Signature |
14 | Nick Cook, Paul Robinson, Santosh K. Shrivastava |
The Rigorous Implementation of a Fair Exchange Protocol for Non-repudiable Web Service Interactions - a case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 23rd International Conference on Data Engineering Workshops, ICDE 2007, 15-20 April 2007, Istanbul, Turkey, pp. 307-314, 2007, IEEE Computer Society, 978-1-4244-0831-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Carole Bassil, Ahmed Serhrouchni, Nicolas Rouhana |
Critical Analysis and New Perspective for Securing Voice Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN (2) ![In: Networking - ICN 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part II, pp. 810-818, 2005, Springer, 3-540-25338-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
VoIP, GSM, Security mechanisms, SRTP |
14 | Jianhong Zhang, Jiancheng Zou, Yumin Wang |
A Novel and Secure Non-designated Proxy Signature Scheme for Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCNMC ![In: Networking and Mobile Computing, Third International Conference, ICCNMC 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings, pp. 836-844, 2005, Springer, 3-540-28102-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | John M. Boyer |
Bulletproof business process automation: securing XML forms with document subset signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
XML Security ![In: Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, pp. 104-111, 2003, ACM, 1-58113-777-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
XFDL, XML signature transforms, secure XML forms, XForms |
14 | Nick Cook, Santosh K. Shrivastava, Stuart M. Wheater |
Middleware Support for Non-repudiable Transactional Information Sharing between Enterprises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAIS ![In: Distributed Applications and Interoperable Systems, 4th IFIP WG6.1 International Conference, DAIS 2003, Paris, France, November 17-21, 2003, Proceedings, pp. 125-132, 2003, Springer, 3-540-20529-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
inter-enterprise interaction, security, middleware, transactions |
14 | Aggelos Kiayias, Moti Yung |
Breaking and Repairing Asymmetric Public-Key Traitor Tracing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers, pp. 32-50, 2002, Springer, 3-540-40410-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | K. Shum, Victor K. Wei |
A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 10-12 June 2002, Pittsburgh, PA, USA, pp. 55-56, 2002, IEEE Computer Society, 0-7695-1748-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Kazumasa Omote, Atsuko Miyaji |
An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 108-120, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
14 | Emmanouil Magkos, Mike Burmester, Vassilios Chrissikopoulos |
An Equitably Fair On-line Auction Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: Electronic Commerce and Web Technologies, First International Conference, EC-Web 2000, London, UK, September 4-6, 2000, Proceedings, pp. 72-83, 2000, Springer, 3-540-67981-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
14 | Jan Van Auseloos |
Technical Security: The Starting Point. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings, pp. 243-248, 1989, Springer, 3-540-53433-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
12 | Benoît Libert, Moti Yung |
Dynamic fully forward-secure group signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 70-81, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
key protection, anonymity, security modeling, group signatures, forward security, key exposure |
12 | Lein Harn, Jian Ren 0001, Changlu Lin |
Efficient identity-based GQ multisignatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(3), pp. 205-210, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ISO/IEC standard, Public-key cryptography, Identity-based signature, Multisignature |
12 | Chung-Ming Ou, Chung-Ren Ou |
Security of Intelligent Agents in the Web-Based Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Agents in the Evolution of Web and Applications ![In: Intelligent Agents in the Evolution of Web and Applications, pp. 303-329, 2009, Springer, 978-3-540-88070-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Walter J. Scheirer, Terrance E. Boult |
Bipartite Biotokens: Definition, Implementation, and Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICB ![In: Advances in Biometrics, Third International Conference, ICB 2009, Alghero, Italy, June 2-5, 2009. Proceedings, pp. 775-785, 2009, Springer, 978-3-642-01792-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Feng Tian, Xiao-bing Han, Ying Wei |
Application and Research of Mobile E-commerce Security Based on WPKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 711-714, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Vijay Laxmi, Mudassar N. Khan, Sarath S. Kumar, Manoj Singh Gaur |
Buyer seller watermarking protocol for digital rights management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 298-301, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
buyer-seller protocol, unbinding., watermark, digital rights management, certificate authority, piracy |
12 | Cong Tang, Ruichuan Chen, Zhuhua Cai, Anmin Xie, Jian-bin Hu, Liyong Tang, Zhong Chen 0001 |
Securing key issuing in peer-to-peer networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 84-85, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar, Samar Sen-Sarma |
An internet-based IP protection scheme for circuit designs using linear feedback shift register (LFSR)-based locking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBCCI ![In: Proceedings of the 22st Annual Symposium on Integrated Circuits and Systems Design: Chip on the Dunes, SBCCI 2009, Natal, Brazil, August 31 - September 3, 2009, 2009, ACM, 978-1-60558-705-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
intellectual property protection (IPP), watermarking, encryption, decryption |
12 | Arne Tauber |
Requirements for Electronic Delivery Systems in eGovernment - An Austrian Experience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E ![In: Software Services for e-Business and e-Society, 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009, Nancy, France, September 23-25, 2009. Proceedings, pp. 123-133, 2009, Springer, 978-3-642-04279-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Registered Mail, Certified Mail, Electronic Delivery, eGovernment |
12 | David J. Boyd |
TLS client handshake with a payment card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 23rd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2009, Rome, Italy, May 23-29, 2009, pp. 1-8, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Bo Zhang 0020, Qiuliang Xu |
Certificateless Proxy Blind Signature Scheme from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, WKDD 2009, Moscow, Russia, 23-25 January 2009, pp. 573-576, 2009, IEEE Computer Society, 978-0-7695-3543-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Mohsen Toorani, Ali Asghar Beheshti Shirazi |
A directly public verifiable signcryption scheme based on elliptic curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), July 5-8, Sousse, Tunisia, pp. 713-716, 2009, IEEE Computer Society, 978-1-4244-4672-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Yunpu Zhu, Jacqueline E. Rice |
A Lightweight Architecture for Secure Two-Party Mobile Payment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (2) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 326-333, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Fergle D'Aubeterre, Lakshmi S. Iyer, Rahul Singh |
An empirical evaluation of information security awareness levels in designing secure business processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DESRIST ![In: Proceedings of the 4th International Conference on Design Science Research in Information Systems and Technology, DESRIST 2009, Philadelphia, Pennsylvania, USA, May 7-8, 2009, 2009, ACM, 978-1-60558-408-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
secure business process, secure process design, situational awareness, design science, security awareness, information systems security |
12 | S. Britto R. Kumar, S. Albert Rabara, J. Ronald Martin |
MPCS: a secure Mobile Payment Consortia System for higher educational institutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 571-579, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
mobile payment consortia, secured transactions, software architecture, framework, mobile payment |
12 | Asmidar Abu Bakar, Roslan Ismail, Abdul Rahim Ahmad, Jamalul-lail Ab Manan, Jamilin Jais |
Group based access control scheme (GBAC): Keeping information sharing secure in mobile Ad- hoc environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: Fourth IEEE International Conference on Digital Information Management, ICDIM 2009, November 1-4, 2009, University of Michigan, Ann Arbor, Michigan, USA, pp. 86-91, 2009, IEEE, 978-1-4244-4253-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Ki-Woong Park, Sang Seok Lim, Kyu Ho Park |
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 57(6), pp. 821-834, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Network-level security and protection |
12 | Arjan Durresi, Mimoza Durresi, Leonard Barolli |
Secure Ubiquitous Health Monitoring System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: Network-Based Information Systems, 2nd International Conference, NBiS 2008, Turin, Italy, September 1-5, 2008. Proceedings, pp. 273-282, 2008, Springer, 978-3-540-85692-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Haowen Chan, Adrian Perrig |
Efficient security primitives derived from a secure aggregation algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 521-534, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
public key management, sensor networks, authentication, integrity, broadcast, signatures, data aggregation |
12 | Manuel Barbosa, Pooya Farshim |
Certificateless signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 369-372, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
insider security, signcryption, certificateless |
12 | Anish Arora |
Keynote: Primitives for Physical Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSS ![In: Stabilization, Safety, and Security of Distributed Systems, 10th International Symposium, SSS 2008, Detroit, MI, USA, November 21-23, 2008. Proceedings, pp. 1, 2008, Springer, 978-3-540-89334-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Huaqun Wang, Hong Yu |
Cryptanalysis of Two Ring Signcryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 41-46, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Ring signcryption, privacy and trust, cryptanalysis, certificateless cryptography |
12 | Yang Xu 0021, Xiaoyao Xie |
Analysis of Electronic Commerce Protocols Based on Extended Rubin Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2079-2084, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Duc-Phong Le, Alexis Bonnecaze, Alban Gabillon |
A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings, pp. 116-123, 2008, Springer, 978-3-540-89861-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Timestamping scheme, Chameleon hash function, Absolute timestamp, Merkle tree |
12 | Mark Hartong, Rajni Goel, Duminda Wijesekera |
Protection and Recovery of Railroad Event Recorder Data. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008, pp. 247-260, 2008, Springer, 978-0-387-84926-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Event data recorders, railroad accident investigations, secret shares |
12 | Mohsen Toorani, Ali Asghar Beheshti Shirazi |
SSMS - A secure SMS messaging protocol for the m-payment systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco, pp. 700-705, 2008, IEEE Computer Society, 978-1-4244-2702-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|