Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Pawel Szalachowski, Laurent Chuat, Adrian Perrig |
PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1601.03874, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
17 | Ethan M. Rudd, Terrance E. Boult |
CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1605.03116, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
17 | Shivkumar Selvakumaraswamy, Umamaheswari Govindaswamy |
Efficient transmission of PKI certificates using elliptic curve cryptography and its variants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. Arab J. Inf. Technol. ![In: Int. Arab J. Inf. Technol. 13(1), pp. 38-43, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
17 | Emre Yüce, Ali Aydin Selçuk |
Server Notaries: A Complementary Approach to the Web PKI Trust Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 126, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
17 | Stephanos Matsumoto, Raphael M. Reischuk |
IKP: Turning a PKI Around with Blockchains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 1018, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
17 | Jiangshan Yu, Vincent Cheval, Mark Ryan 0001 |
DTKI: A New Formalized PKI with Verifiable Trusted Parties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 59(11), pp. 1695-1713, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Baohua Huang, Fengwei Jia, Jiguo Yu, Wei Cheng 0001 |
A transparent framework based on accessing bridge and mobile app for protecting database privacy with PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAMCO@MobiHoc ![In: Proceedings of the 2nd ACM Workshop on Privacy-Aware Mobile Computing, Paderborn, Germany, July, 2016, pp. 43-50, 2016, ACM, 978-1-4503-4346-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Isil Karabey, Gamze Akman |
A cryptographic approach for secure client - server chat application using public key infrastructure (PKI). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 11th International Conference for Internet Technology and Secured Transactions, ICITST 2016, Barcelona, Spain, December 5-7, 2016, pp. 442-446, 2016, IEEE, 978-1-908320-73-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Satoshi Uda, Mikifumi Shikida |
Challenges of Deploying PKI based Client Digital Certification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 2016 ACM SIGUCCS Annual Conference on User Services, Denver, CO, USA, November 6-9, 2016, pp. 55-60, 2016, ACM, 978-1-4503-4095-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Nikolay A. Moldovyan, Andrey N. Berezin, Anatoly Kornienko, Alexander A. Moldovyan |
Bi-deniable public-encryption protocols based on standard PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FRUCT ![In: 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology, FRUCT 2016, St-Petersburg, Russia, April 18-22, 2016, pp. 212-219, 2016, IEEE, 978-9-5268-3973-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Pawel Szalachowski, Laurent Chuat, Adrian Perrig |
PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P ![In: IEEE European Symposium on Security and Privacy, EuroS&P 2016, Saarbrücken, Germany, March 21-24, 2016, pp. 407-422, 2016, IEEE, 978-1-5090-1751-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Ran Canetti, Daniel Shahaf, Margarita Vald |
Universally Composable Authentication and Key-Exchange with Global PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II, pp. 265-296, 2016, Springer, 978-3-662-49386-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Ethan M. Rudd, Terrance E. Boult |
CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR Workshops ![In: 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops, CVPR Workshops 2016, Las Vegas, NV, USA, June 26 - July 1, 2016, pp. 195-203, 2016, IEEE Computer Society, 978-1-5090-1437-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Leonid Reyzin, Sophia Yakoubov |
Efficient Asynchronous Accumulators for Distributed PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 292-309, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Pierpaolo Cincilla, Omar Hicham, Benoît Charles |
Vehicular PKI scalability-consistency trade-offs in large scale distributed scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VNC ![In: 2016 IEEE Vehicular Networking Conference, VNC 2016, Columbus, OH, USA, December 8-10, 2016, pp. 1-8, 2016, IEEE, 978-1-5090-5197-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Emre Yüce |
Server notaries: A complementary approach to the web PKI trust model (Sunucu noterleri: Web AAA güven modeli için tamamlayıcı bir yaklaşım) ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2016 |
RDF |
|
17 | Zhiwei Gao 0001, Yingxin Hu, Kai Lu |
CPTIAS: a new fast PKI authentication scheme based on certificate path trust index. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 6(6), pp. 721-731, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Sudip Misra, Sumit Goswami, Chaynika Taneja, Anandarup Mukherjee, Mohammad S. Obaidat |
A PKI Adapted Model for Secure Information Dissemination in Industrial Control and Automation 6LoWPANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 3, pp. 875-889, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Dongoh Park |
Social Life of PKI: Sociotechnical Development of Korean Public-Key Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Ann. Hist. Comput. ![In: IEEE Ann. Hist. Comput. 37(2), pp. 59-71, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Stephen T. Kent, Derrick Kong, Karen Seo |
Template for a Certification Practice Statement (CPS) for the Resource PKI (RPKI). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 7382, pp. 1-38, April 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Leonid Reyzin, Sophia Yakoubov |
Efficient Asynchronous Accumulators for Distributed PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 718, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
17 | Stephanos Matsumoto, Pawel Szalachowski, Adrian Perrig |
Deployment challenges in log-based PKI enhancements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the Eighth European Workshop on System Security, EuroSec 2015, Bordeaux, France, April 21, 2015, pp. 1:1-1:7, 2015, ACM, 978-1-4503-3479-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Jozef Filipek, Ladislav Hudec |
Distributed firewall using PKI in mobile Ad Hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CompSysTech ![In: Proceedings of the 16th International Conference on Computer Systems and Technologies, CompSysTech, Dublin, Ireland, June 25 - 26, 2015, pp. 292-298, 2015, ACM, 978-1-4503-3357-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Shigeaki Tanimoto, Toshihiko Moriya, Hiroyuki Sato, Atsushi Kanai |
Improvement of multiple CP/CPS based on level of assurance for campus PKI deployment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: 16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2015, Takamatsu, Japan, June 1-3, 2015, pp. 571-575, 2015, IEEE Computer Society, 978-1-4799-8676-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Joong Sun Lee, Takashi Obi, Hiroyuki Suzuki, Kazushige Fujita, Masuyoshi Yachida, Nagaaki Ohyama |
A new method for constructing dynamic VPN cooperating with OpenFlow control technology and healthcare PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: 17th Asia-Pacific Network Operations and Management Symposium, APNOMS 2015, Busan, South Korea, August 19-21, 2015, pp. 432-435, 2015, IEEE, 978-4-8855-2296-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Sergi Blanch-Torne, Fernando Cores, Ramiro Moreno Chiral |
Agent-based PKI for Distributed Control System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCICSS ![In: 2015 World Congress on Industrial Control Systems Security, WCICSS 2015, London, United Kingdom, December 14-16, 2015, pp. 28-35, 2015, IEEE, 978-1-9083-2058-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Yabing Liu, Will Tome, Liang Zhang 0022, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Aaron Schulman, Christo Wilson |
An End-to-End Measurement of Certificate Revocation in the Web's PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 2015 ACM Internet Measurement Conference, IMC 2015, Tokyo, Japan, October 28-30, 2015, pp. 183-196, 2015, ACM, 978-1-4503-3848-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Jürgen Brauckmann |
Zukunft der Web-PKI? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 38(7), pp. 452-456, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Jiangshan Yu, Vincent Cheval, Mark Ryan 0001 |
DTKI: a new formalized PKI with no trusted parties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1408.1023, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
17 | |
DTKI: a new formalized PKI with no trusted parties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 600, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
17 | Ran Canetti, Daniel Shahaf, Margarita Vald |
Composable Authentication with Global PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 432, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
17 | Johannes Braun 0001, Florian Volk, Jiska Classen, Johannes Buchmann 0001, Max Mühlhäuser |
CA trust management for the Web PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 22(6), pp. 913-959, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Nicolas Buchmann, Harald Baier |
Towards a more secure and scalable verifying PKI of eMRTD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 22(6), pp. 1025-1049, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Peter Vilhan, Ladislav Hudec |
Cluster Glue - Improving Service Reachability in PKI Enabled MANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UKSim ![In: UKSim-AMSS 16th International Conference on Computer Modelling and Simulation, UKSim 2014, Cambridge, United Kingdom, March 26-28, 2014, pp. 494-499, 2014, IEEE, 978-1-4799-4922-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Han-Ul Jang, Dai-Kyung Hyun, Dae-Jin Jung, Heung-Kyu Lee |
Fingerprint-PKI authentication using Zernike moments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: 2014 IEEE International Conference on Image Processing, ICIP 2014, Paris, France, October 27-30, 2014, pp. 5022-5026, 2014, IEEE, 978-1-4799-5751-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Sumit Goswami, Sudip Misra, Chaynika Taneja, Anandarup Mukherjee |
Securing intra-communication in 6LoWPAN: A PKI integrated scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE ANTS ![In: 2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems, ANTS 2014, New Delhi, India, December 14-17, 2014, pp. 1-5, 2014, IEEE, 978-1-4799-5868-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Antoine Delignat-Lavaud, Martín Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, Yinglian Xie |
Web PKI: Closing the Gap between Guidelines and Practices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, February 23-26, 2014, 2014, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
17 | Joaquim Bastos, Georgios Mantas, José Carlos Ribeiro, Jonathan Rodriguez 0001 |
Towards an Advanced PKI-Based Security Solution for Next Generation e-Passport and Associated Applications: The NewP@ss Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WICON ![In: Wireless Internet - 8th International Conference, WICON 2014, Lisbon, Portugal, November 13-14, 2014, Revised Selected Papers, pp. 105-112, 2014, Springer, 978-3-319-18801-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | XiaoChun Yin, Zengguang Liu, Young Sil Lee, Hoon-Jae Lee 0001 |
PKI-based cryptography for secure cloud data storage using ECC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTC ![In: International Conference on Information and Communication Technology Convergence, ICTC 2014, Busan, South Korea, October 22-24, 2014, pp. 194-199, 2014, IEEE. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Danielle Wilde, Jenny Underwood, Rebecca Pohlner |
PKI: crafting critical design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Conference on Designing Interactive Systems ![In: Designing Interactive Systems Conference 2014, DIS '14, Vancouver, BC, Canada, June 21-25, 2014, pp. 365-374, 2014, ACM, 978-1-4503-2902-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Shinjo Park, Suwan Park, Insu Yun, Dongkwan Kim 0001, Yongdae Kim |
Analyzing Security of Korean USIM-Based PKI Certificate Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications - 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers, pp. 95-106, 2014, Springer, 978-3-319-15086-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Koutarou Suzuki, Kazuki Yoneyama |
Converting PKI-Based Authenticated Key Exchange to Identity-Based. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 159-174, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Stefan Kaufmann 0003 |
Implementation and adaptation of the Pseudonymous PKI for Ubiquitous Computing for Car-2-Car Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Automotive - Safety & Security ![In: Automotive - Safety & Security 2014 (2015), Sicherheit und Zuverlässigkeit für automobile Informationstechnik, Tagung, 21.-22.04.2015, Stuttgart, Germany, pp. 95-108, 2014, GI, 978-3-88579-634-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
17 | Benamar Kadri, Djilalli Moussaoui, Mohammed Feham |
A PKI over Ant Colony based Routing Algorithms for MANETs -AntPKI-. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 15(1), pp. 42-49, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
17 | |
Common PKI 2.0: Nachweis der Konformität vereinfacht. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 37(8), pp. 549-550, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Yossi Gilad, Amir Herzberg |
Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 410, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
17 | Johannes Braun 0001, Florian Volk, Johannes Buchmann 0001, Max Mühlhäuser |
Trust Views for the Web PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 841, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
17 | Chris I. Djamaludin, Ernest Foo, Peter I. Corke |
Establishing initial trust in autonomous Delay Tolerant Networks without centralised PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 39, pp. 299-314, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Milan Markovic, Goran Dordevic |
Secure JAVA application in SOA-based cross-border PKI mobile government systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Log. J. IGPL ![In: Log. J. IGPL 21(4), pp. 680-691, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Walter J. Scheirer, William Bishop, Terrance E. Boult |
Beyond PKI: The Biocryptographic Key Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Privacy in Biometrics ![In: Security and Privacy in Biometrics, pp. 45-68, 2013, Springer, 978-1-4471-5229-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Nicolas Buchmann, Harald Baier |
Towards a More Secure and Scalable Verifying PKI of eMRTD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructures, Services and Applications - 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers, pp. 102-118, 2013, Springer, 978-3-642-53996-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Johannes Braun 0001, Florian Volk, Johannes Buchmann 0001, Max Mühlhäuser |
Trust Views for the Web PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructures, Services and Applications - 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers, pp. 134-151, 2013, Springer, 978-3-642-53996-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | V. Spoorthi, Balaji Rajendran, K. Chandrasekaran 0001 |
Key Update Mechanism in PKI: Study and a New Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADCONS ![In: 2013 2nd International Conference on Advanced Computing, Networking and Security, Mangalore, India, December 15-17, 2013, pp. 253-258, 2013, IEEE. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Ahmad Samer Wazan, Romain Laborde, François Barrère, Abdelmalek Benzekri, David W. Chadwick |
PKI Interoperability: Still an Issue? A Solution in the X.509 Realm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
World Conference on Information Security Education ![In: Information Assurance and Security Education and Training - 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers, pp. 68-82, 2013, Springer, 978-3-642-39376-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Omar Alfandi, Arne Bochem, Ansgar Kellner, Dieter Hogrefe |
Improving energy efficiency of data communication in a hybrid PKI-based approach for WSNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 10th IEEE Consumer Communications and Networking Conference, CCNC 2013, Las Vegas, NV, USA, January 11-14, 2013, pp. 697-700, 2013, IEEE, 978-1-4673-3131-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Johannes Braun 0001, Gregor Rynkowski |
The Potential of an Individualized Set of Trusted CAs: Defending against CA Failures in the Web PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SocialCom ![In: International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013, Washington, DC, USA, 8-14 September, 2013, pp. 600-605, 2013, IEEE Computer Society, 978-0-7695-5137-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Yossi Gilad, Amir Herzberg |
Plug-and-Play IP Security - Anonymity Infrastructure instead of PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 255-272, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Duane Hunt, Wasim A. Al-Hamdani |
Theoretical Analysis of using Identity Based PKI as the Authentication method in SQL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013, pp. 33-41, 2013, ACM, 978-1-4503-2547-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Shigeaki Tanimoto, Masahiko Yokoi, Hiroyuki Sato, Atsushi Kanai |
Quantifying Cost Structure of Campus PKI Based on Estimation and Actual Measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Process. ![In: J. Inf. Process. 20(3), pp. 640-648, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Agapios Avramidis, Panayiotis Kotzanikolaou, Christos Douligeris, Mike Burmester |
Chord-PKI: A distributed trust infrastructure based on P2P networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 56(1), pp. 378-398, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | S. Sree Vivek, S. Sharmila Deva Selvi, Salini Selvaraj Kowsalya, C. Pandu Rangan |
PKI Based Signcryption without Pairing: an Efficient Scheme with Tight Security Reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. ![In: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(4), pp. 72-84, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Georgios Mantas, Dimitrios K. Lymberopoulos, Nikos Komninos |
PKI Security in Large-Scale Healthcare Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Medical Syst. ![In: J. Medical Syst. 36(3), pp. 1107-1116, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Chi-Sung Laih, Shang-Ming Jen, Chia-Yu Lu |
Long-term confidentiality of PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 55(1), pp. 91-95, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Geoff Huston, George Michaelson |
Validation of Route Origination Using the Resource Certificate Public Key Infrastructure (PKI) and Route Origin Authorizations (ROAs). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6483, pp. 1-8, February 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | John Lyle, Andrew J. Paverd, Justin King-Lacroix, Andrea S. Atzeni, Habib Virji, Ivan Flechais, Shamal Faily |
Personal PKI for the Smart Device Era. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructures, Services and Applications - 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers, pp. 69-84, 2012, Springer, 978-3-642-40011-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Charalampos Doukas, Ilias Maglogiannis, Vassiliki Koufi, Flora Malamateniou, George Vassilacopoulos |
Enabling data protection through PKI encryption in IoT m-Health devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIBE ![In: 12th IEEE International Conference on Bioinformatics & Bioengineering, BIBE 2012, Larnaca, Cyprus, November 11-13, 2012, pp. 25-29, 2012, IEEE Computer Society, 978-1-4673-4357-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Riccardo Pecori |
A PKI-free key agreement protocol for P2P VoIP applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2012, Ottawa, ON, Canada, June 10-15, 2012, pp. 6748-6752, 2012, IEEE, 978-1-4577-2052-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Lukasz Krzywiecki, Przemyslaw Kubiak 0001, Miroslaw Kutylowski, Michal Tabor, Daniel Wachnik |
Lightweight Certificates - Towards a Practical Model for PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIS ![In: Business Information Systems - 15th International Conference, BIS 2012, Vilnius, Lithuania, May 21-23, 2012. Proceedings, pp. 296-307, 2012, Springer, 978-3-642-30358-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Shigeaki Tanimoto, Shinichi Mizuhara, Masahiko Yokoi, Hiroyuki Sato, Atsushi Kanai |
Analysis of Security of PKI Operation with Multiple CP/CPS Based on Level of Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC Workshops ![In: 36th Annual IEEE Computer Software and Applications Conference Workshops, COMPSAC 2012, Izmir, Turkey, July 16-20, 2012, pp. 100-105, 2012, IEEE Computer Society, 978-1-4673-2714-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Carlos Gañán, Jose L. Muñoz, Oscar Esparza, Jorge Mata-Díaz, Juanjo Alins |
Impact of the Revocation Service in PKI Prices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings, pp. 22-32, 2012, Springer, 978-3-642-34128-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Marijke De Soete |
PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 935-936, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | |
PKI Trust Relationships. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 939, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Mike Just |
PKI Trust Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 936-939, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Harry B. DeMaio |
Public Key Infrastructure (PKI). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Alex Golod |
Public Key Infrastructure (PKI): Registration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Alex Golod |
Access Controls: PKI-Based. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Douglas C. Merrill, Eran Feigenbaum |
Public Key Infrastructure (PKI): E-Business. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Hong Wen 0001, Pin-Han Ho |
Physical Layer Technique to Assist Authentication Based on PKI for Vehicular Communication Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 5(2), pp. 440-456, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Jean-Guillaume Dumas, Hicham Hossayni |
Matrix Powers algorithm for trust evaluation in PKI architectures ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1107.1880, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
17 | Ali M. Al-Khouri |
PKI in Government Identity Management Systems ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1105.6357, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
17 | Rishab Nithyanand, Gene Tsudik, Ersin Uzun |
User-aided reader revocation in PKI-based RFID systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 19(6), pp. 1147-1172, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Peter Gutmann |
PKI as Part of an Integrated Risk Management Strategy for Web Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers, pp. 128-146, 2011, Springer, 978-3-642-29803-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Gauthier Van Damme, Nicolas Luyckx, Karel Wouters |
A PKI-Based Mobile Banking Demonstrator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers, pp. 147-158, 2011, Springer, 978-3-642-29803-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Dimitrios Lekkas, Dimitrios Zissis |
Leveraging the e-passport PKI to Achieve Interoperable Security for e-government Cross Border Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICGS3/e-Democracy ![In: Global Security, Safety and Sustainability & e-Democracy - 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers, pp. 96-103, 2011, Springer, 978-3-642-33447-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Hao Wang, William Emmanuel Yu |
Comparison between PKI (RSA-AES) and AEAD (AES-EAX PSK) Cryptography Systems for Use in SMS-Based Secure Transmissions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDT ![In: Networked Digital Technologies - Third International Conference, NDT 2011, Macau, China, July 11-13, 2011. Proceedings, pp. 1-12, 2011, Springer, 978-3-642-22184-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Randy Baden |
LoKI: location-based PKI for social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2011 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Toronto, ON, Canada, August 15-19, 2011, pp. 394-395, 2011, ACM, 978-1-4503-0797-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Ahmed Hesham, Ayman A. Abdel-Hamid, Mohamad Abou El-Nasr |
A dynamic key distribution protocol for PKI-based VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wireless Days ![In: Proceedings of the IFIP Wireless Days Conference 2011, Niagara Falls, ON, Canada, October 10-12, 2011, pp. 1-3, 2011, IEEE, 978-1-4577-2027-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Sangram Ray, G. P. Biswas |
Design of Mobile-PKI for using mobile phones in various applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ReTIS ![In: International Conference on Recent Trends in Information Systems, ReTIS 2011, December 21-23, 2011, Jadavpur University, Kolkata, India, Proceedings, pp. 297-302, 2011, IEEE, 978-1-4577-0792-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Candelaria Hernández-Goya, Pino Caballero-Gil, Jezabel Molina-Gil, Cándido Caballero-Gil |
Extending OLSR Functionalities to PKI Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCAST (1) ![In: Computer Aided Systems Theory - EUROCAST 2011 - 13th International Conference, Las Palmas de Gran Canaria, Spain, February 6-11, 2011, Revised Selected Papers, Part I, pp. 32-39, 2011, Springer, 978-3-642-27548-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Todd Baumeister |
Adapting PKI for the smart grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SmartGridComm ![In: IEEE Second International Conference on Smart Grid Communications, SmartGridComm 2011, Brussels, Belgium, October 17-20, 2011, pp. 249-254, 2011, IEEE, 978-1-4577-1704-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Aatam Godhwani, Matt Murfield, Terry Delaney, Kok-Song Fong, Patrick Browne, Steve Hryckiewicz |
The use of PKI in next generation UHF SATCOM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MILCOM ![In: MILCOM 2011 - 2011 IEEE Military Communications Conference, Baltimore, MD, USA, November 7-10, 2011, pp. 1733-1738, 2011, IEEE, 978-1-4673-0079-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Sean R. O'Melia, Roger I. Khazan, Daniil M. Utin |
Efficient transmission of DoD PKI certificates in tactical networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MILCOM ![In: MILCOM 2011 - 2011 IEEE Military Communications Conference, Baltimore, MD, USA, November 7-10, 2011, pp. 1739-1747, 2011, IEEE, 978-1-4673-0079-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Milan Markovic, Goran Dordevic |
On Secure JAVA Application in SOA-Based PKI Mobile Government Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIS ![In: Computational Intelligence in Security for Information Systems - 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011. Proceedings, pp. 222-229, 2011, Springer, 978-3-642-21322-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Ralph Holz, Lothar Braun, Nils Kammenhuber, Georg Carle |
The SSL landscape: a thorough analysis of the x.509 PKI using active and passive measurements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, IMC '11, Berlin, Germany, November 2-, 2011, pp. 427-444, 2011, ACM, 978-1-4503-1013-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Yao Yao, Xingwei Wang 0001, Xiaoguang Sun |
A Cross Heterogeneous Domain Authentication Model Based on PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAAP ![In: Fourth International Symposium on Parallel Architectures, Algorithms and Programming, PAAP 2011, Tianjin, China, December 9-11, 2011, pp. 325-329, 2011, IEEE Computer Society, 978-1-4577-1808-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Christopher Woodward, Wasim A. Al-Hamdani |
PKI and access control in office environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD 2011, Kennesaw, GA, USA, September 30 - October 1, 2011, pp. 20-24, 2011, ACM, 978-1-4503-0812-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Paul Rabinovich |
A search engine for the global PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Internet Serv. Appl. ![In: J. Internet Serv. Appl. 1(2), pp. 83-93, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Yue-Hsun Lin, Ahren Studer, Yao-Hsin Chen, Hsu-Chun Hsiao, Eric Li-Hsiang Kuo, Jonathan M. McCune, King-Hang Wang, Maxwell N. Krohn, Adrian Perrig, Bo-Yin Yang, Hung-Min Sun, Phen-Lan Lin, Jason Lee |
SPATE: Small-Group PKI-Less Authenticated Trust Establishment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 9(12), pp. 1666-1681, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Benamar Kadri, Mohammed Feham, Abdallah M'hamed |
Lightweight PKI for WSN uPKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 10(3), pp. 194-200, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
17 | Jaak Tepandi, Ilja Tsahhirov, Stanislav Vassiljev |
Wireless PKI Security and Mobile Voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 43(6), pp. 54-60, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Mobile voting, Public-key cryptography, Security and privacy, Networking and communications, Mobile/Wireless |