The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for certificate with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1975-1994 (15) 1995-1997 (16) 1998 (18) 1999 (40) 2000 (43) 2001 (44) 2002 (54) 2003 (93) 2004 (122) 2005 (141) 2006 (125) 2007 (128) 2008 (136) 2009 (98) 2010 (50) 2011 (55) 2012 (53) 2013 (56) 2014 (61) 2015 (48) 2016 (61) 2017 (71) 2018 (82) 2019 (63) 2020 (96) 2021 (97) 2022 (77) 2023 (108) 2024 (18)
Publication types (Num. hits)
article(719) incollection(24) inproceedings(1317) phdthesis(9)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1081 occurrences of 516 keywords

Results
Found 2069 publication records. Showing 2069 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
22Gilles Barthe, César Kunz Certificate Translation in Abstract Interpretation. Search on Bibsonomy ESOP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Candelaria Hernández-Goya, Pino Caballero-Gil, Oscar Delgado-Mohatar, Jezabel Molina-Gil, Cándido Caballero-Gil Using New Tools for Certificate Repositories Generation in MANETs. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Public-key management, MANETs
22Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou 0001 Certificate-Based Signature Schemes without Pairings or Random Oracles. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Gilles Barthe, César Kunz Certificate translation for specification-preserving advices. Search on Bibsonomy FOAL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AOP, program verification, proof-carrying code
22Sang M. Park, Soon Myoung Chung Enhanced CAS Certificate for Metadata-Based Access Control in Grids. Search on Bibsonomy ICTAI (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Chaoju Hu, Na Xu Application of XTR Public Key System in Certificate Authority System. Search on Bibsonomy CSSE (5) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Denise Leahy, Dudley Dolan Making an International Certificate Accessible. Search on Bibsonomy ICCHP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Digital literacy, accessibility
22Joseph K. Liu, Jianying Zhou 0001 Efficient Certificate-Based Encryption in the Standard Model. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Ahmad Samer Wazan, Romain Laborde, François Barrère, Abdelmalek Benzekri The X.509 certificate quality. Search on Bibsonomy ICDIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Ana Isabel González-Tablas Ferreres, Benjamín Ramos Álvarez, Arturo Ribagorda Garnacho Spatial-Temporal Certification Framework and Extension of X.509 Attribute Certificate Framework and SAML Standard to Support Spatial-Temporal Certificates. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Spatial-temporal certification, X.509 AC, SAML
22Hyung-Woo Lee, Taekyoung Kwon 0002 Biometric Digital Key Mechanisms for Telebiometric Authentication Based on Biometric Certificate. Search on Bibsonomy HCI (5) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Jaydip Sen, Harihara Subramanyam An Efficient Certificate Authority for Ad Hoc Networks. Search on Bibsonomy ICDCIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Katerina Stamou, Fredrik Hedman, Anthony Iliopoulos Extending UNICORE 5 Authentication Model by Supporting Proxy Certificate Profile Extensions. Search on Bibsonomy Euro-Par Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RFC 3280, authentication, grid, interoperability, authorization, X.509, UNICORE, proxy certificates
22Jaydip Sen, M. Girish Chandra, P. Balamuralidhar, Harihara S. G., Harish Reddy A Scheme of Certificate Authority for Ad Hoc Networks. Search on Bibsonomy DEXA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Huey-Ming Lee, Tsang-Yean Lee, Heng-Sheng Chen Certificate and Authority Application Based on Grid Environment. Search on Bibsonomy KES (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Jeom Goo Kim, Do Hyeon Lee An Access Control Using SPKI Certificate in Peer-to-Peer Environment. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Simple Public Key Infrastructure, Peer-to-Peer Environment
22Daniel Kouril, Ludek Matyska, Michal Procházka A Robust and Efficient Mechanism to Distribute Certificate Revocation Information Using the Grid Monitoring Architecture. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Jan Camenisch, Dieter Sommer, Roger Zimmermann A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Omar Batarfi, Lindsay F. Marshall Defining Criteria for Rating an Entity's Trustworthiness Based on Its Certificate Policy. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Dejvuth Suwimonteerabuth, Stefan Schwoon, Javier Esparza Efficient Algorithms for Alternating Pushdown Systems with an Application to the Computation of Certificate Chains. Search on Bibsonomy ATVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Mark Sherriff, Laurie A. Williams DevCOP: A Software Certificate Management System for Eclipse. Search on Bibsonomy ISSRE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Chih-Ming Yan, Wen-Chen Sun, Tzu-Yen Wang, Tzu-Han Kao, Shyan-Ming Yuan Design and Implementation of WAP Certificate Converter Toolkit. Search on Bibsonomy MDM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Dae-Young Lee, Sang-Hyun Bae Certificate Management System in MANET for Ubiquitous Computing. Search on Bibsonomy PRIMA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Stephen Tse, Steve Zdancewic A Design for a Security-Typed Language with Certificate-Based Declassification. Search on Bibsonomy ESOP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Ying Liu, Sheng-rong Wang, Jingbo Xia, Jun Wei A New United Certificate Revocation Scheme in Grid Environments. Search on Bibsonomy GCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Georgios Kambourakis, Angelos N. Rouskas, Dimitris Gritzalis Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks. Search on Bibsonomy EuroPKI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF AKA, WLAN, UMTS, PKI, TLS, EAP
22José A. Montenegro, Fernando Moya A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege Delegation. Search on Bibsonomy EuroPKI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Christophe Crespelle, Christophe Paul Fully-Dynamic Recognition Algorithm and Certificate for Directed Cographs. Search on Bibsonomy WG The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Omar Batarfi Certificate Validation in Untrusted Domains. Search on Bibsonomy OTM Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Namje Park, Kiyoung Moon, Sungwon Sohn, Cheehang Park Certificate Validation Scheme of Open Grid Service Usage XKMS. Search on Bibsonomy GCC (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Sameer Ajmani, Dwaine E. Clarke, Chuang-Hue Moh, Steven Richman ConChord: Cooperative SDSI Certificate Storage and Name Resolution. Search on Bibsonomy IPTPS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Ninghui Li, Joan Feigenbaum Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation. Search on Bibsonomy Financial Cryptography The full citation details ... 2001 DBLP  BibTeX  RDF Certificates, PKI, Revocation, CRL
22Jie Dai, Jim Alves-Foss Certificate Based Authorization Simulation System. Search on Bibsonomy COMPSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
22Karsten Bsufka, Stefan Holst, Torge Schmidt Realization of an Agent-Based Certificate Authority and Key Distribution. Search on Bibsonomy IATA The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
22Hiroshi Nagamochi, Toru Hasunuma An Efficient NC Algorithm for a Sparse k-Edge-Connectivity Certificate. Search on Bibsonomy ISAAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
22Ronald L. Rivest Can We Eliminate Certificate Revocations Lists? Search on Bibsonomy Financial Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16María Alpuente, Demis Ballis, Michele Baggi, Moreno Falaschi A fold/unfold transformation framework for rewrite theories extended to CCT. Search on Bibsonomy PEPM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF code carrying theory, fold/unfold transformation, rewriting logic
16David O'Callaghan, Louise Doran, Brian A. Coghlan Evaluating trust in grid certificates. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF trust, grid, PKI
16Elmar Schoch, Frank Kargl On the efficiency of secure beaconing in VANETs. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security, efficiency, vehicular ad hoc networks (vanets)
16Robert D. Carr, Goran Konjevod, Greg Little, Venkatesh Natarajan, Ojas Parekh Compacting cuts: A new linear formulation for minimum cut. Search on Bibsonomy ACM Trans. Algorithms The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Linear programming formulation complexity, minimum cut problem
16Chung-Ming Ou, Chung-Ren Ou Security of Intelligent Agents in the Web-Based Applications. Search on Bibsonomy Intelligent Agents in the Evolution of Web and Applications The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Christian Schridde, Matthew Smith 0001, Bernd Freisleben TrueIP: prevention of IP spoofing attacks using identity-based cryptography. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network security, denial-of-service, signatures, identity-based cryptography, IP spoofing
16Ken-ichi Kawarabayashi, Bojan Mohar List-color-critical graphs on a fixed surface. Search on Bibsonomy SODA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF critical graphs, surface, list-coloring
16Iman Narasamdya, Michaël Périn Certification of smart-card applications in common criteria. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF assertion functions, common criteria certification, smart-card applications, invariants, assertions, specification techniques
16Ge Zhang 0001, Simone Fischer-Hübner, Leonardo A. Martucci, Sven Ehlert Revealing the Calling History of SIP VoIP Systems by Timing Attacks. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Levente Buttyán, László Dóra An authentication scheme for QoS-aware multi-operator maintained wireless mesh networks. Search on Bibsonomy WOWMOM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Jan Camenisch, Markulf Kohlweiss, Claudio Soriente An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF revocation, anonymous credentials, dynamic accumulators
16Oscar García Morchon, Tobias Heer, Klaus Wehrle Brief announcement: lightweight key agreement and digital certificates for wireless sensor networks. Search on Bibsonomy PODC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wireless sensor networks, distributed algorithms, key establishment, digital certificates
16Antonio San Martino, Xavier Perramon Defending E-Banking Services: Antiphishing Approach. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16David J. Montana, Mark C. Reynolds Validation Algorithms for a Secure Internet Routing PKI. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Resource PKI, Internet Routing PKI, Route Origination Attestation, Border Gateway Protocol
16Xiaodong Lin 0001, Rongxing Lu, Haojin Zhu, Pin-Han Ho, Xuemin Shen Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Jens-Uwe Bußer, Steffen Fries, Martin Otto 0002, Peter Hartmann Navigating in Webs of Trust: Finding Short Trust Chains in Unstructured Networks without Global Knowledge. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF identification of persons, public key cryptography, personal communication networks, communication system security
16Chung-Ming Ou, Chung-Ren Ou, Yao-Tien Wang Security of Mobile Agent-Based Web Applications. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Andrew G. Lamperski, Aaron D. Ames On the existence of Zeno behavior in hybrid systems with non-isolated Zeno equilibria. Search on Bibsonomy CDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Zhenjie Huang, Xuanzhi Lin, Rufen Huang Certificateless Concurrent Signature Scheme. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Chun-I Fan, Ruei-Hau Hsu, Chun-Hao Tseng Pairing-based message authentication scheme with privacy protection in vehicular ad hoc networks. Search on Bibsonomy Mobility Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, bilinear pairing, PKI, privacy protection, pseudonym, vehicular ad hoc networks (VANETs)
16François Lesueur, Ludovic Mé, Valérie Viet Triem Tong A Distributed Certification System for Structured P2P Networks. (PDF / PS) Search on Bibsonomy AIMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Distributed Certification, Security, P2P
16Stanislaw Jarecki, Jihye Kim, Gene Tsudik Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF privacy, authenticated key exchange, secret handshakes
16Frédéric Blanqui, Jean-Pierre Jouannaud, Pierre-Yves Strub From Formal Proofs to Mathematical Proofs: A Safe, Incremental Way for Building in First-order Decision Procedures. Search on Bibsonomy IFIP TCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Shinsaku Kiyomoto, Toshiaki Tanaka Anonymous attribute authentication scheme using self-blindable certificates. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Majid Khabbazian, T. Aaron Gulliver, Vijay K. Bhargava Double Point Compression with Applications to Speeding Up Random Point Multiplication. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF point compression, fast computation, parallel processing, Cryptography, elliptic curves, point multiplication
16Fan Zhang, Jianfeng Ma 0001, Sang-Jae Moon Universally composable anonymous Hash certification model. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication, anonymous, Hash, universal composable security
16Nathanael Thompson, Petros Zerfos, Haiyun Luo, Jatinder Pal Singh, Zuoning Yin Authentication on the edge: distributed authentication for a global open wi-fi network. Search on Bibsonomy MobiCom The full citation details ... 2007 DBLP  DOI  BibTeX  RDF EAP-AGE, social network, authentication, Wi-Fi networks
16Changyou Zhang, Liu Renfen, Yuanda Cao, Zhitao Guan The Permission Delegation Mechanism for P2P Network. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Adam J. Lee, Kazuhiro Minami, Marianne Winslett Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distributed proving, pervasive computing, consistency
16Stavros D. Nikolopoulos, Leonidas Palios An O ( nm )-Time Certifying Algorithm for Recognizing HHD-Free Graphs. Search on Bibsonomy FAW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF HHD-free graphs, certifying algorithms, recognition, perfectly orderable graphs
16May Phyo Oo, Thinn Thu Naing Access Control System for Grid Security Infrastructure. Search on Bibsonomy Web Intelligence/IAT Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Ralf Groeper, Christian Grimm, Stefan Piger, Jan Wiebelitz An Architecture for Authorization in Grids using Shibboleth and VOMS. Search on Bibsonomy EUROMICRO-SEAA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Liang Li, Wei-Qiang Jiang, Jie Tian 0001, Yixian Yang, Cai-Ping Jiang, Zhe Wu, Xin Yang 0001 A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Daesung Lee 0001, Ki-Chang Kim, Year Back Yoo Enhancing Security by Embedding Biometric Data in IP Header. Search on Bibsonomy SOFSEM (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Yanchao Zhang, Wei Liu 0008, Wenjing Lou, Yuguang Fang Securing Mobile Ad Hoc Networks with Certificateless Public Keys. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, Mobile ad hoc networks, key management, secret sharing, ID-based cryptography
16Jiangtao Li 0001, Ninghui Li OACerts: Oblivious Attribute Certificates. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, access controls, Security and privacy protection, cryptographic controls
16Ke Zeng Pseudonymous PKI for Ubiquitous Computing. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Gina Kounga, Thomas Walter 0001 Identification in Infrastructureless Networks. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Yoshio Kakizaki, Hiroshi Yamamoto, Hidekazu Tsuji A Proposal of An Anonymous Authentication Method For Flat-rate Service. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Bo Man Kim, Kyu Young Choi, Dong Hoon Lee 0001 Disaster Coverable PKI Model Utilizing the Existing PKI Structure. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Shiquan Cong, Zhiyi Fang, Chao Zhang, Xiaonan Liu, Yingrui Zhang A CA-Based Security e-Government System. Search on Bibsonomy CSCWD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Jeff Polakow, Christian Skalka Specifying distributed trust management in LolliMon. Search on Bibsonomy PLAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF trust management logic, distributed authorization
16Jan Camenisch, Abhi Shelat, Dieter Sommer, Roger Zimmermann Securing user inputs for the web. Search on Bibsonomy Digital Identity Management The full citation details ... 2006 DBLP  DOI  BibTeX  RDF user interface designs
16Jung-Muk Lim, Hyung-Jin Lim, Tai-Myoung Chung Performance Evaluation of Public Key Based Mechanisms for Mobile IPv4 Authentication in AAA Environments. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Jesus Luna, Oscar Manso, Manel Medina OCSP for Grids: Comparing Prevalidation versus Caching. Search on Bibsonomy GRID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Byunggi Kim, Sang-Sun Hong Secure Mutual Authentication for Ad hoc Wireless Networks. Search on Bibsonomy J. Supercomput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, ad hoc wireless network
16YoungGyo Lee, In-Jung Kim, Seungjoo Kim, Dongho Won A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS. Search on Bibsonomy EuroPKI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF D-OCSP, D-OCSP-KIS, OCSP Responder, hash function
16Jiangtao Li 0001, Ninghui Li OACerts: Oblivious Attribute Certificates. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Bing Wu, Jie Wu 0001, Eduardo B. Fernández, Spyros S. Magliveras Secure and Efficient Key Management in Mobile Ad Hoc Networks. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Lecia Jane Barker, Kathy Garvin-Doxas, Eric S. Roberts What can computer science learn from a fine arts approach to teaching? Search on Bibsonomy SIGCSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF pedagogy, gender issues, CS education research, classroom management
16Shaobin Wang, Fan Hong, Guohua Cui A fair e-cash payment scheme based on credit. Search on Bibsonomy ICEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF impartiality, off-line payment, overdraft credit, e-cash, justice
16Wenbao Jiang, Chen Li 0005, Shuang Hao, Yiqi Dai Using Trust for Restricted Delegation in Grid Environments. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Hoang Nam Nguyen, Hiroaki Morino A Key Management Scheme for Mobile Ad Hoc Networks Based on Threshold Cryptography for Providing Fast Authentication and Low Signaling Load. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Jae Hyung Koo, Bum Han Kim, Dong Hoon Lee 0001 Authenticated Public Key Distribution Scheme Without Trusted Third Party. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Key Management and Authentication, Public-key Cryptography, Public Key Infrastructure (PKI)
16Qin Wang, Zhenfu Cao Two Proxy Signcryption Schemes from Bilinear Pairings. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF proxy signcryption, bilinear pairings, signcryption, proxy signature
16Soomi Yang An Efficient Access Control Model for Highly Distributed Computing Environment. Search on Bibsonomy IWDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16David Aspinall 0001, Kenneth MacKenzie Mobile Resource Guarantees and Policies. Search on Bibsonomy CASSIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Jing-Shyang Hwu, Rong-Jaye Chen, Yi-Bing Lin Authenticated public-key distribution over WLAN/cellular dual networks. Search on Bibsonomy ITRE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Elvira Albert, Germán Puebla, Manuel V. Hermenegildo Abstraction-Carrying Code. Search on Bibsonomy LPAR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Panneer Pandi Gnana Durai, Ranjani Parthasarathy Self-organized Security Architecture for MANET. Search on Bibsonomy CIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Wireless and mobile computing, communication networks and sensor networks
16Sadybakasov Ulanbek, Ashutosh Saxena, Atul Negi On Reduction of Bootstrapping Information Using Digital Multisignature. Search on Bibsonomy CIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Shengyu Zhang On the Power of Ambainis's Lower Bounds. Search on Bibsonomy ICALP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Stephen Prajna, Ali Jadbabaie Safety Verification of Hybrid Systems Using Barrier Certificates. Search on Bibsonomy HSCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 2069 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license