|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 211 occurrences of 123 keywords
|
|
|
Results
Found 318 publication records. Showing 318 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
13 | Herman Chung-Hwa Rao, Yih-Farn Chen, Ming-Feng Chen |
A Proxy-Based Personal Web Archiving Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 35(1), pp. 61-72, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
WEB |
13 | Yuh-Jong Hu |
Some thoughts on agent trust and delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Agents ![In: Proceedings of the Fifth International Conference on Autonomous Agents, AGENTS 2001, Montreal, Canada, May 28 - June 1, 2001, pp. 489-496, 2001, ACM, 1-58113-326-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
XML |
13 | Farid G. Hatefi, Forouzan Golshani, Gamze Seckin |
Prospects of Secure Real-Time Video Transmission over CDPD Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infrastructure for Mobile and Wireless Systems ![In: Developing an Infrastructure for Mobile and Wireless Systems, NSF Workshop IMWS 2001, Scottsdale, AZ, USA, October 15, 2001, Revised Papers, pp. 164-172, 2001, Springer, 3-540-00289-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Real-time video streaming, low-bit rate transmission, bilateral authentication, certificate based authentication, mobile end systems, mobile intermediate systems, wireless communication |
13 | Yoshiaki Isobe, Yoichi Seto, Masanori Kataoka |
Development of Personal Authentication System using Fingerprint with Digital Signature Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 34th Annual Hawaii International Conference on System Sciences (HICSS-34), January 3-6, 2001, Maui, Hawaii, USA, 2001, IEEE Computer Society, 0-7695-0981-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Biometrics, Smart card, Public Key Infrastructure, Fingerprints verification, Personal authentication |
13 | David L. Applegate, Robert E. Bixby, Vasek Chvátal, William J. Cook |
TSP Cuts Which Do Not Conform to the Template Paradigm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computational Combinatorial Optimization ![In: Computational Combinatorial Optimization, Optimal or Provably Near-Optimal Solutions [based on a Spring School, Schloß Dagstuhl, Germany, 15-19 May 2000], pp. 261-304, 2001, Springer, 3-540-42877-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
13 | Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta |
AMBAR Protocol: Access Management Based on Authorization Reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001, pp. 376-380, 2001, Springer, 3-540-42880-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
13 | Barbara Fox, Brian A. LaMacchia |
Panel: Public Key Infrastructure: PKIX, Signed XML or Something Else? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings, pp. 327-331, 2000, Springer, 3-540-42700-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
13 | Takamichi Saito, Kentaro Umesawa, Hiroshi G. Okuno |
Privacy-Enhanced Access Control by SPKI and Its Application to Web Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 4-16 June 2000, Gaithersburg, MD, USA, pp. 201-206, 2000, IEEE Computer Society, 0-7695-0798-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
13 | John Zao, Stephen T. Kent, Joshua Gahm, Gregory D. Troxel, Matthew Condell, Pam Helinek, Nina Yuan, Isidro Castiñeyra |
A public-key based secure Mobile IP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 5(5), pp. 373-390, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
13 | Andrew W. Appel, Edward W. Felten |
Proof-Carrying Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '99, Proceedings of the 6th ACM Conference on Computer and Communications Security, Singapore, November 1-4, 1999., pp. 52-62, 1999, ACM, 1-58113-148-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
13 | Masayuki Numao |
A Secure Key Registration System based on Proactive Secret-Sharing Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISADS ![In: The Fourth International Symposium on Autonomous Decentralized Systems, ISADS 1999, Tokyo, Japan, March 20-23, 1999, pp. 230-237, 1999, IEEE Computer Society, 0-7695-0137-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
13 | Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi |
Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 103-117, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
13 | Ilari Lehti, Pekka Nikander |
Certifying Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings, pp. 83-98, 1998, Springer, 3-540-64693-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
13 | Matt Blaze, Joan Feigenbaum, Jack Lacy |
Decentralized Trust Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1996 IEEE Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, USA, pp. 164-173, 1996, IEEE Computer Society, 0-8186-7417-2. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
13 | Richard Helm, Kim Marruitt, Martin Odersky |
Building visual language parsers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Conference on Human Factors in Computing Systems, CHI 1991, New Orleans, LA, USA, April 27 - May 2, 1991, Proceedings, pp. 105-112, 1991, ACM, 0-89791-383-3. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
13 | Patrick Horster, Hans-Joachim Knobloch |
Discrete Logarithm Based Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings, pp. 399-408, 1991, Springer, 3-540-54620-0. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
13 | Klaus Gaarder, Einar Snekkenes |
On The Formal Analysis of PKCS Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AUSCRYPT ![In: Advances in Cryptology - AUSCRYPT '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings, pp. 106-121, 1990, Springer, 3-540-53000-2. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
13 | John L. Gustafson |
Reevaluating Amdahl's Law. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 31(5), pp. 532-533, 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
Displaying result #301 - #318 of 318 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4] |
|