The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase non-repudiation (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-1998 (18) 1999-2000 (32) 2001-2002 (37) 2003 (29) 2004 (36) 2005 (48) 2006 (29) 2007 (48) 2008 (36) 2009 (31) 2010 (17) 2011-2013 (23) 2014-2016 (15) 2017-2018 (15) 2019-2023 (20) 2024 (1)
Publication types (Num. hits)
article(94) book(1) incollection(2) inproceedings(335) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 398 occurrences of 211 keywords

Results
Found 435 publication records. Showing 435 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
24Berthold Agreiter, Michael Hafner, Ruth Breu A Fair Non-repudiation Service in a Web Services Peer-to-Peer Environment. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
24Xueming Wang, Xiang Li Game-Based Analysis of Multi-Party Non-Repudiation Protocols. Search on Bibsonomy CIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Chou Chen Yang, Ya-Wen Yang, Wei-Ting Liu A Robust Authentication Protocol with Non-Repudiation Service for Integrating WLAN and 3G Network. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Hongyan Peng, Xiaojian Li, Chunhe Xia, Jianfeng Deng, Xiaofa Zhou A Non-Repudiation Protocol for E-Mail and Its Formal Analysis. Search on Bibsonomy J. Comput. Res. Dev. The full citation details ... 2006 DBLP  BibTeX  RDF
24Christian Hett, Nicolai Kuntze, Andreas U. Schmidt Security and Non-Repudiation for Voice-Over-IP Conversations Search on Bibsonomy CoRR The full citation details ... 2006 DBLP  BibTeX  RDF
24Guilin Wang Generic non-repudiation protocols supporting transparent off-line TTP. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Gregory Vert, Manaf Alfize An Enhanced Pretty Good Privacy (EPGP) System with Mutual Non-Repudiation. Search on Bibsonomy Security and Management The full citation details ... 2006 DBLP  BibTeX  RDF
24Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Antonio Ruiz-Martínez, C. Inmaculada Marín-López, Laura Baño-López, Antonio Fernandez Gómez-Skarmeta A new fair non-repudiation protocol for secure negotiation and contract signing. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF abuse freeness, contract negotiation, contract signing protocol, security, e-commerce, confidentiality, fair-exchange
24Da-Zhi Sun, Zhen-Fu Cao Improved public key authentication scheme for non-repudiation. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Seokwon Yang, Stanley Y. W. Su, Herman Lam A non-repudiation message transfer protocol for collaborative e-commerce. Search on Bibsonomy Int. J. Bus. Process. Integr. Manag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Richard W. C. Lui, Siu-Ming Yiu, Lucas Chi Kwong Hui Efficient Authorization in Delegation Chains with Strong Non-Repudiation. Search on Bibsonomy IWAP The full citation details ... 2005 DBLP  BibTeX  RDF
24Guilin Wang Generic Fair Non-Repudiation Protocols with Transparent Off-line TTP. Search on Bibsonomy IWAP The full citation details ... 2005 DBLP  BibTeX  RDF
24Yuan Ding, Guo Tao, Pingzhi Fan The design and analysis of an electronic evidence and non-repudiation protocol. Search on Bibsonomy ISADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Michael Roe Non-repudiation and the Metaphysics of Presence. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Michael Roe Non-repudiation and the Metaphysics of Presence. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Yi-Chi Lin, Jill Slay Non-Repudiation in Pure Mobile Ad Hoc Network. Search on Bibsonomy AISM The full citation details ... 2005 DBLP  BibTeX  RDF
24Hasan, Burkhard Stiller Non-repudiation of consumption of mobile Internet services with privacy support. Search on Bibsonomy WiMob (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24J. G. Cederquist, Ricardo Corin, Muhammad Torabi Dashti On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina Automatic Analysis of a Non-Repudiation Protocol. Search on Bibsonomy QAPL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Jose Antonio Onieva, Jianying Zhou 0001, Javier López 0001 Non-repudiation protocols for multiple entities. Search on Bibsonomy Comput. Commun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Jose Antonio Onieva, Jianying Zhou 0001, Javier López 0001, Mildrey Carbonell Agent-mediated non-repudiation protocols. Search on Bibsonomy Electron. Commer. Res. Appl. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Ana Isabel González-Tablas Ferreres, Karel Wouters, Benjamín Ramos Álvarez Teaching X.509/PKIX Based Digital Signatures While Enhancing Non-Repudiation of a Web Based Assessment System. Search on Bibsonomy ICWI The full citation details ... 2004 DBLP  BibTeX  RDF
24Botao Li, Junzhou Luo On timeliness of a fair non-repudiation protocol. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Sungwoo Tak, Yugyung Lee, Eun Kyo Park A software framework for non-repudiation service in electronic commerce based on the Internet. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Ronggong Song, Larry Korba Pay-TV system with strong privacy and non-repudiation protection. Search on Bibsonomy IEEE Trans. Consumer Electron. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Steve Kremer, Jean-François Raskin A Game-based Verification of Non-repudiation and Fair Exchange Protocols. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Padmanabhan Krishnan, Robert Bannerman User Assisted Verification of Non-Repudiation and Similar Properties. Search on Bibsonomy Security and Management The full citation details ... 2003 DBLP  BibTeX  RDF
24Jose Antonio Onieva, Jianying Zhou 0001, Mildrey Carbonell, Javier López 0001 A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages. Search on Bibsonomy SEC The full citation details ... 2003 DBLP  BibTeX  RDF
24Jing-Jang Hwang, Min-Hua Shao, Soushan Wu Establishing Chain of Evidence as a Base for Non-Repudiation Services. Search on Bibsonomy SEC The full citation details ... 2003 DBLP  BibTeX  RDF
24Aleksandra Nenadic, Ning Zhang 0001 Non-Repudiation and Fairness in Electronic Data Exchange. Search on Bibsonomy ICEIS (4) The full citation details ... 2003 DBLP  BibTeX  RDF
24Xianxian Li, Jinpeng Huai Efficient Non-Repudiation Multicast Source Authentication Schemes. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Steve Kremer, Olivier Markowitch, Jianying Zhou 0001 An intensive survey of fair non-repudiation protocols. Search on Bibsonomy Comput. Commun. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Tomás Rosa Key-collisions in (EC)DSA: Attacking Non-repudiation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2002 DBLP  BibTeX  RDF
24Wensheng Zhou, Troy Rockwood, Phoom Sagetong Non-repudiation oblivious watermarking schema for secure digital video distribution. Search on Bibsonomy IEEE Workshop on Multimedia Signal Processing The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Bo Meng, Shaomei Wang, Qianxing Xiong A Fair Non-Repudiation Protocol. Search on Bibsonomy CSCWD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Jianying Zhou 0001 Non-Repudiation in Electronic Commerce. Search on Bibsonomy DEXA Workshops The full citation details ... 2002 DBLP  BibTeX  RDF
24Sungwoo Tak, Yugyung Lee, Eun Kyo Park A software framework for non-repudiation service in electronic commerce based on the Internet. Search on Bibsonomy ICCCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Ronggong Song, Michael R. Lyu Analysis of privacy and non-repudiation on pay-TV systems. Search on Bibsonomy IEEE Trans. Consumer Electron. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24L. Harn, H. Y. Lin A non-repudiation metering scheme. Search on Bibsonomy IEEE Commun. Lett. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24Lawrence C. Paulson A Proof of Non-repudiation (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24Panagiotis Louridas Some guidelines for non-repudiation protocols. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Adrian McCullagh, William J. Caelli Non-Repudiation in the Digital Environment. Search on Bibsonomy First Monday The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Nam-Yih Lee, Chi-Chao Chang, Chun-Li Lin, Tzonelih Hwang Privacy and non-repudiation on pay-TV systems. Search on Bibsonomy IEEE Trans. Consumer Electron. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Birgit Pfitzmann, Ahmad-Reza Sadeghi Anonymous Fingerprinting with Direct Non-Repudiation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2000 DBLP  BibTeX  RDF
24Steve Kremer, Olivier Markowitch A Multi-Party Non-Repudiation Protocol. Search on Bibsonomy SEC The full citation details ... 2000 DBLP  BibTeX  RDF
24Jerrold F. Stach, Eun Kyo Park, Kia Makki Performance of an enhanced GSM protocol supporting non-repudiation of service. Search on Bibsonomy Comput. Commun. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
24Jianying Zhou 0001, Kwok-Yan Lam Securing digital signatures for non-repudiation. Search on Bibsonomy Comput. Commun. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
24Malleswar Kalla, Johnny S. K. Wong, Armin R. Mikler, Stephen Elbert Achieving non-repudiation of Web based transactions. Search on Bibsonomy J. Syst. Softw. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
24Cheng-Hwee You, Jianying Zhou 0001, Kwok-Yan Lam On the efficient implementation of fair non-repudiation. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
24Steve A. Schneider Formal Analysis of a Non-Repudiation Protocol. Search on Bibsonomy CSFW The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
24Jianying Zhou 0001 Non-repudiation. Search on Bibsonomy 1997   RDF
24Tom Coffey, Puneet Saidha Non-repudiation with mandatory proof of receipt. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
24Ning Zhang, Qi Shi 0001 Achieving Non-Repudiation of Receipt. Search on Bibsonomy Comput. J. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
24Yongfei Han Investigation of non-repudiation protocols. Search on Bibsonomy ACISP The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
24R. Taylor Non-repudiation without public-key. Search on Bibsonomy ACISP The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
23Moni Naor Deniable Ring Authentication. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
23Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Antoni Martínez-Ballesté, Francesc Sebé, Josep Domingo-Ferrer Large-Scale Pay-As-You-Watch for Unicast and Multicast Communications. Search on Bibsonomy TrustBus The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Pay-per-view systems, multicast, electronic payments
15Wei Gao 0007, Xueli Wang, Dongqing Xie Chameleon Hashes Without Key Exposure Based on Factoring. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF chameleon signature, key-exposure, chameleon hash
15Xiaofeng Chen 0001, Fangguo Zhang, Kwangjo Kim Chameleon Hashing Without Key Exposure. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Byoungcheon Lee, Heesun Kim, Kwangjo Kim Secure Mobile Agent Using Strong Non-designated Proxy Signature. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Secure mobile agent, strong non-designated proxy signature, multi-proxy signature
14Wei Zhao, Dingfeng Ye Modified Huang-Wang's Convertible Nominative Signature Scheme. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Yaling Zhang, Jing Zhang, Yikun Zhang Multi-signers Strong Designated Verifier Signature Scheme. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Multi-signers, Designated Verifier Signature
14Nick Cook, Paul Robinson, Santosh K. Shrivastava The Rigorous Implementation of a Fair Exchange Protocol for Non-repudiable Web Service Interactions - a case study. Search on Bibsonomy ICDE Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Carole Bassil, Ahmed Serhrouchni, Nicolas Rouhana Critical Analysis and New Perspective for Securing Voice Networks. Search on Bibsonomy ICN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF VoIP, GSM, Security mechanisms, SRTP
14Jianhong Zhang, Jiancheng Zou, Yumin Wang A Novel and Secure Non-designated Proxy Signature Scheme for Mobile Agents. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14John M. Boyer Bulletproof business process automation: securing XML forms with document subset signatures. Search on Bibsonomy XML Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF XFDL, XML signature transforms, secure XML forms, XForms
14Nick Cook, Santosh K. Shrivastava, Stuart M. Wheater Middleware Support for Non-repudiable Transactional Information Sharing between Enterprises. Search on Bibsonomy DAIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF inter-enterprise interaction, security, middleware, transactions
14Aggelos Kiayias, Moti Yung Breaking and Repairing Asymmetric Public-Key Traitor Tracing. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14K. Shum, Victor K. Wei A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection. Search on Bibsonomy WETICE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Kazumasa Omote, Atsuko Miyaji An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
14Emmanouil Magkos, Mike Burmester, Vassilios Chrissikopoulos An Equitably Fair On-line Auction Scheme. Search on Bibsonomy EC-Web The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
14Jan Van Auseloos Technical Security: The Starting Point. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
12Benoît Libert, Moti Yung Dynamic fully forward-secure group signatures. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF key protection, anonymity, security modeling, group signatures, forward security, key exposure
12Lein Harn, Jian Ren 0001, Changlu Lin Efficient identity-based GQ multisignatures. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ISO/IEC standard, Public-key cryptography, Identity-based signature, Multisignature
12Chung-Ming Ou, Chung-Ren Ou Security of Intelligent Agents in the Web-Based Applications. Search on Bibsonomy Intelligent Agents in the Evolution of Web and Applications The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Walter J. Scheirer, Terrance E. Boult Bipartite Biotokens: Definition, Implementation, and Analysis. Search on Bibsonomy ICB The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Feng Tian, Xiao-bing Han, Ying Wei Application and Research of Mobile E-commerce Security Based on WPKI. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Vijay Laxmi, Mudassar N. Khan, Sarath S. Kumar, Manoj Singh Gaur Buyer seller watermarking protocol for digital rights management. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF buyer-seller protocol, unbinding., watermark, digital rights management, certificate authority, piracy
12Cong Tang, Ruichuan Chen, Zhuhua Cai, Anmin Xie, Jian-bin Hu, Liyong Tang, Zhong Chen 0001 Securing key issuing in peer-to-peer networks. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar, Samar Sen-Sarma An internet-based IP protection scheme for circuit designs using linear feedback shift register (LFSR)-based locking. Search on Bibsonomy SBCCI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intellectual property protection (IPP), watermarking, encryption, decryption
12Arne Tauber Requirements for Electronic Delivery Systems in eGovernment - An Austrian Experience. Search on Bibsonomy I3E The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Registered Mail, Certified Mail, Electronic Delivery, eGovernment
12David J. Boyd TLS client handshake with a payment card. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Bo Zhang 0020, Qiuliang Xu Certificateless Proxy Blind Signature Scheme from Bilinear Pairings. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Mohsen Toorani, Ali Asghar Beheshti Shirazi A directly public verifiable signcryption scheme based on elliptic curves. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Yunpu Zhu, Jacqueline E. Rice A Lightweight Architecture for Secure Two-Party Mobile Payment. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Fergle D'Aubeterre, Lakshmi S. Iyer, Rahul Singh An empirical evaluation of information security awareness levels in designing secure business processes. Search on Bibsonomy DESRIST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secure business process, secure process design, situational awareness, design science, security awareness, information systems security
12S. Britto R. Kumar, S. Albert Rabara, J. Ronald Martin MPCS: a secure Mobile Payment Consortia System for higher educational institutions. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mobile payment consortia, secured transactions, software architecture, framework, mobile payment
12Asmidar Abu Bakar, Roslan Ismail, Abdul Rahim Ahmad, Jamalul-lail Ab Manan, Jamilin Jais Group based access control scheme (GBAC): Keeping information sharing secure in mobile Ad- hoc environment. Search on Bibsonomy ICDIM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Ki-Woong Park, Sang Seok Lim, Kyu Ho Park Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Network-level security and protection
12Arjan Durresi, Mimoza Durresi, Leonard Barolli Secure Ubiquitous Health Monitoring System. Search on Bibsonomy NBiS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Haowen Chan, Adrian Perrig Efficient security primitives derived from a secure aggregation algorithm. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF public key management, sensor networks, authentication, integrity, broadcast, signatures, data aggregation
12Manuel Barbosa, Pooya Farshim Certificateless signcryption. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF insider security, signcryption, certificateless
12Anish Arora Keynote: Primitives for Physical Trust. Search on Bibsonomy SSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Huaqun Wang, Hong Yu Cryptanalysis of Two Ring Signcryption Schemes. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ring signcryption, privacy and trust, cryptanalysis, certificateless cryptography
12Yang Xu 0021, Xiaoyao Xie Analysis of Electronic Commerce Protocols Based on Extended Rubin Logic. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Duc-Phong Le, Alexis Bonnecaze, Alban Gabillon A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper). Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Timestamping scheme, Chameleon hash function, Absolute timestamp, Merkle tree
12Mark Hartong, Rajni Goel, Duminda Wijesekera Protection and Recovery of Railroad Event Recorder Data. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Event data recorders, railroad accident investigations, secret shares
12Mohsen Toorani, Ali Asghar Beheshti Shirazi SSMS - A secure SMS messaging protocol for the m-payment systems. Search on Bibsonomy ISCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 435 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license