|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 990 occurrences of 519 keywords
|
|
|
Results
Found 1703 publication records. Showing 1703 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
23 | Bruce Christianson, James A. Malcolm |
Delegation and Not-So Smart Cards (Position Paper). |
Security Protocols Workshop |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Oded Goldreich 0001, Birgit Pfitzmann, Ronald L. Rivest |
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Liisa Räihä |
Delegation: Dynamic Specialization. |
TRI-Ada |
1994 |
DBLP DOI BibTeX RDF |
Ada |
17 | Hua Wang 0002, Yanchun Zhang, Jinli Cao |
Effective Collaboration with Information Sharing in Virtual Universities. |
IEEE Trans. Knowl. Data Eng. |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Jian Weng 0001, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai |
Conditional proxy re-encryption secure against chosen-ciphertext attack. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
conditional proxy re-encryption, bilinear pairing, chosen-ciphertext security |
17 | Cheng-Kang Chu, Jian Weng 0001, Sherman S. M. Chow, Jianying Zhou 0001, Robert H. Deng |
Conditional Proxy Broadcast Re-Encryption. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
conditional proxy re-encryption, hierarchical identity-coupling broadcast encryption, broadcast encryption, proxy re-encryption |
17 | Caimu Tang, Dapeng Oliver Wu |
An Efficient Mobile Authentication Scheme for Wireless Networks. |
IEEE Trans. Wirel. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Ki-Woong Park, Sang Seok Lim, Kyu Ho Park |
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices. |
IEEE Trans. Computers |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Network-level security and protection |
17 | Youan Xiao |
New Self Certified Proxy Digital Signature Scheme based on Elliptic Curve Cryptosystem. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Yuh-Jong Hu, Hong-Yi Guo, Guang-De Lin |
Semantic Enforcement of Privacy Protection Policies via the Combination of Ontologies and Rules. |
SUTC |
2008 |
DBLP DOI BibTeX RDF |
ontology, semantic web, rule, privacy protection, web 3.0, semantic email |
17 | Vijay Erramilli, Mark Crovella |
Forwarding in opportunistic networks with resource constraints. |
Challenged Networks |
2008 |
DBLP DOI BibTeX RDF |
mobile opportunistic networks, delay tolerant networks, pocket switched networks, forwarding algorithms |
17 | Raymond Hu, Nobuko Yoshida, Kohei Honda 0001 |
Session-Based Distributed Programming in Java. |
ECOOP |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Youan Xiao, Zude Zhou |
A New Kind of Self-Certified Proxy Digital Signature Scheme. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Shangyuan Guan, Xiaoshe Dong, Yiduo Mei, Weiguo Wu, Zhenghua Xue |
Towards Automated Trust Negotiation for Grids. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Jan Tozicka, Stepán Urban, Magdalena Prokopová, Michal Pechoucek |
Filter Allocation Using Iterative ECNP. |
CIA |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Pei-Yih Ting, Fang-Dar Chu |
Enhancing the Security Promise of a Digital Time-Stamp. |
AINA |
2008 |
DBLP DOI BibTeX RDF |
hierarchical distributed time source, forward-secure digital signature, PKI, time-stamps |
17 | Gang Yin, Huaimin Wang, Jian-quan Ouyang, Ning Zhou, Dian-xi Shi |
Towards Role Based Trust Management without Distributed Searching of Credentials. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Felicia Ionescu, Vlad Nae, Alexandru Gherega |
Credentials Management for Authentication in a Grid-Based E-Learning Platform. |
ISPDC |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Mark Reith, Jianwei Niu 0001, William H. Winsborough |
Apply Model Checking to Security Analysis in Trust Management. |
ICDE Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Hua Wang 0002, Qing Li 0001 |
Secure and Efficient Information Sharing in Multi-university E-Learning Environments. |
ICWL |
2007 |
DBLP DOI BibTeX RDF |
security, E-Learning, Information sharing |
17 | He Wang 0020, Sylvia L. Osborn |
Discretionary access control with the administrative role graph model. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
role graph model, role-based access control, DAC |
17 | Donggang Liu |
Efficient and Distributed Access Control for Sensor Networks. |
DCOSS |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Wenyuan Liu, Feng Tong, Yongan Luo, Feng Zhang |
A proxy blind signature scheme based on elliptic curve with proxy revocation. |
SNPD (1) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Pedro Felix, Carlos Ribeiro |
A scalable and flexible web services authentication model. |
SWS |
2007 |
DBLP DOI BibTeX RDF |
authentication, trust management, web services security |
17 | Ki-Woong Park, Hyunchul Seok, Kyu Ho Park |
pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices. |
AINA Workshops (2) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Guido Boella, Leendert W. N. van der Torre |
Power in Norm Negotiation. |
KES-AMSTA |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Wamberto Weber Vasconcelos, Martin J. Kollingbaum, Timothy J. Norman |
Resolving conflict and inconsistency in norm-regulated virtual organizations. |
AAMAS |
2007 |
DBLP DOI BibTeX RDF |
norms, institutions, artificial social systems, conventions |
17 | Hongbin Zhou, Simon N. Foley |
A Framework for Establishing Decentralized Secure Coalitions. |
CSFW |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Jun-Cheol Jeon, Kee-Young Yoo |
Conflict Detection in Role-Based Access Control Using Multiple-Attractor Cellular Automata. |
ICIC (1) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Jaime A. Pavlich-Mariscal, Steven A. Demurjian, Laurent D. Michel |
A Framework for Composable Security Definition, Assurance, and Enforcement. |
MoDELS (Satellite Events) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Gísli Hjálmtýsson, Ólafur Ragnar Helgason, Björn Brynjúlfsson |
gTrace: Simple Mechanisms for Monitoring of Multicast Sessions. |
NETWORKING |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Jing Wu, Jennifer Seberry, Yi Mu 0001, Chun Ruan |
Delegatable Access Control for Fine-Grained XML. |
ICPADS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Dan Boneh, Xavier Boyen, Eu-Jin Goh |
Hierarchical Identity Based Encryption with Constant Size Ciphertext. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Xu Liao, Li Zhang 0065, Stephen Chi-fai Chan |
A Task-Oriented Access Control Model for WfMS. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Gang Yin, Huaimin Wang, Tao Liu, Dian-xi Shi, Ming-Feng Chen |
Distributed Access Control for Grid Environments Using Trust Management Approach. |
ISPA Workshops |
2005 |
DBLP DOI BibTeX RDF |
Access Control, Grid, Trust Management, VO |
17 | Shujing Wang 0001, Yan Zhang 0003 |
Answer Set Programming for Distributed Authorization: The Language, Computations, and Application. |
Australian Conference on Artificial Intelligence |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Vasileios Pappas, Zhiguo Xu, Songwu Lu, Daniel Massey, Andreas Terzis, Lixia Zhang 0001 |
Impact of configuration errors on DNS robustness. |
SIGCOMM |
2004 |
DBLP DOI BibTeX RDF |
resiliency, DNS, misconfigurations |
17 | Venugopalan Ramasubramanian, Emin Gün Sirer |
The design and implementation of a next generation name service for the internet. |
SIGCOMM |
2004 |
DBLP DOI BibTeX RDF |
proactive caching, peer to peer, DNS |
17 | Changqin Huang, Guanghua Song, Yao Zheng, Deren Chen |
An Authorization Architecture Oriented to Engineering and Scientific Computation in Grid Environments. |
Asia-Pacific Computer Systems Architecture Conference |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Vishwas Patil, R. K. Shyamasundar |
An Efficient, Secure and Delegable Micro-Payment System. |
EEE |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Weizhong Qiang, Hai Jin 0001, Xuanhua Shi, Deqing Zou |
A Novel VO-Based Access Control Model for Grid. |
GCC |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Moritz Y. Becker, Peter Sewell |
Cassandra: Distributed Access Control Policies with Tunable Expressiveness. |
POLICY |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Xin Li 0010, Mizuhito Ogawa |
A Lightweight Mutual Authentication Based on Proxy Certificate Trust List. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
Grid Computing, Mutual Authentication, Proxy Certificate |
17 | Mads Dam |
Regular SPKI. |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Yuh-Jong Hu, Chao-Wei Tang |
Agent-Oriented Public Key Infrastructure for Multi-agent E-service. |
KES |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Neil Taurisson, Pierre Tchounikine |
Introducing Software Agents to Support a Web-based Collective Activity. |
IAT |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Abdenour Bouzouane, Bruno Bouchard 0001 |
Human-Agent Viewpoint Similarity based on Terminological Logic for Mixed-Initiative Planning. |
IAT |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Jacob Zimmermann, Ludovic Mé, Christophe Bidan |
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
Policy-based intrusion detection, access control, information flow control |
17 | Michael K. Reiter, Asad Samar, Chenxi Wang |
The Design and Implementation of a JCA-Compliant Capture Protection Infrastructure. |
SRDS |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Patrick C. K. Hung |
Specifying conflict of interest in web services endpoint language (WSEL). |
SIGecom Exch. |
2002 |
DBLP DOI BibTeX RDF |
security risk factor, web services Endpoint language, Java, XML, separation of duties, conflict of interest |
17 | Chun Ruan, Vijay Varadharajan |
Resolving Conflicts in Authorization Delegations. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Ninghui Li, John C. Mitchell, William H. Winsborough |
Design of a Role-Based Trust-Management Framework. |
S&P |
2002 |
DBLP DOI BibTeX RDF |
access control, role-based access control, trust management, distributed system security, attribute-based access control, attribute certificates |
17 | Babak Sadighi Firozabadi |
Using Attribute Certificates for Creating Management Structures (Transcript of Discussion). |
Security Protocols Workshop |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Young-Ho Suh, Han Namgoong, Jeong-Joon Yoo, Dong-Ik Lee |
Design of a Mobile Agent-Based Workflow Management System. |
MATA |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Simon A. Dobson, Brian Matthews |
Ionic Types. |
ECOOP |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Åsa Hagström, Viiveke Fåk, Mark Vandenwauver |
EWS-A Case Study on Access Control in Workflow Systems. |
WETICE |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Mehmet Aksit, Bedir Tekinerdogan |
Aspect-Oriented Programming Using Composition-Filters. |
ECOOP Workshops |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Jan Bosch |
Delegating Compiler Objects: An Object-Oriented Approach to Crafting Compilers. |
CC |
1996 |
DBLP DOI BibTeX RDF |
|
17 | Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber |
Authentication in Distributed Systems: Theory and Practice. |
SOSP |
1991 |
DBLP DOI BibTeX RDF |
|
17 | Oscar Nierstrasz |
Two models of concurrent objects. |
OOPSLA/ECOOP Workshop on Object-based Concurrent Programming |
1988 |
DBLP DOI BibTeX RDF |
|
15 | Hiroyuki Sato, Takeshi Nishimura |
Federated Authentication in a Hierarchy of IdPs by Using Shibboleth. |
SAINT |
2011 |
DBLP DOI BibTeX RDF |
authentication, middleware, trust, delegation, federation |
15 | Jinyuan Sun, Yuguang Fang |
Cross-Domain Data Sharing in Distributed Electronic Health Record Systems. |
IEEE Trans. Parallel Distributed Syst. |
2010 |
DBLP DOI BibTeX RDF |
security, privacy, delegation, electronic health record, Cross domain |
15 | Mohsen Saffarian, Babak Sadighi |
Owner-Based Role-Based Access Control OB-RBAC. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
Administrative Policies, Access Control, RBAC, Delegation |
15 | Yang Zhang 0015, Junliang Chen |
Universal Identity Management Model Based on Anonymous Credentials. |
IEEE SCC |
2010 |
DBLP DOI BibTeX RDF |
Privacy Concerns of Service-Oriented Solutions, Identity Metasystem, Privilege Delegation, Identity Management |
15 | Weizhong Qiang, Aleksandr Konstantinov |
Towards cross-middleware authentication and single sign-on for ARC Grid middleware. |
Comput. Sci. Res. Dev. |
2009 |
DBLP DOI BibTeX RDF |
ARC middleware, Virtual organization, Delegation, Single sign-on |
15 | Xiaohui Liang, Zhenfu Cao, Huang Lin, Jun Shao |
Attribute based proxy re-encryption with delegating capabilities. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
key delegation, attribute based encryption, proxy re-encryption |
15 | Sébastien Noël, Pierre Manneback, Gheorghe Cosmin Silaghi |
Response Deadline Evaluation in Point-to-Point Negotiation on Grids. |
GECON |
2009 |
DBLP DOI BibTeX RDF |
Service access, Negotiation, Delegation |
15 | Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothblum |
Delegating computation: interactive proofs for muggles. |
STOC |
2008 |
DBLP DOI BibTeX RDF |
muggles, delegation, interactive proofs |
15 | Mikaël Ates, Jacques Fayolle, Christophe Gravier, Jérémy Lardon |
Complex federation architectures: stakes, tricks & issues. |
CSTST |
2008 |
DBLP DOI BibTeX RDF |
distributed identity management systems, privacy, architecture, delegation, identity federation |
15 | George Pavlou |
On the Evolution of Management Approaches, Frameworks and Protocols: A Historical Perspective. |
J. Netw. Syst. Manag. |
2007 |
DBLP DOI BibTeX RDF |
Manager-agent, Web-based management, Management by delegation, Distributed objects, Mobile code |
15 | Angelos D. Keromytis, Jonathan M. Smith |
Requirements for scalable access control and security management architectures. |
ACM Trans. Internet Techn. |
2007 |
DBLP DOI BibTeX RDF |
distributed systems, access control, authorization, security policy, trust management, delegation, credentials, Large-scale systems |
15 | Li-Sha He, Ning Zhang 0001, Li-Rong He, Ian Rogers |
Secure M-commerce Transactions: A Third Party Based Signature Protocol. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
m-commerce security, signature delegation, digital signatures, cryptographic protocols |
15 | Lorenzo Bettini, Sara Capecchi, Elena Giachino |
Featherweight wrap Java. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
delegation, wrappers, language extensions, featherweight Java |
15 | Paul Z. Kolano |
Mesh: secure, lightweight grid middleware using existing SSH infrastructure. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
security, distributed systems, authentication, access control, middleware, grids, authorization, delegation, single sign-on, SSH |
15 | Samir Saklikar, Subir Saha |
Next steps for security assertion markup language (saml). |
SWS |
2007 |
DBLP DOI BibTeX RDF |
liberty alliance, multifactor, identity, delegation, assertion, federation, SAML |
15 | Dmitrij Lagutin, Hannu H. Kari |
Controlling Incoming Connections Using Certificates and Distributed Hash Tables. |
NEW2AN |
2007 |
DBLP DOI BibTeX RDF |
rights delegation, DoS countermeasures, certificates, Session management, rights management |
15 | Ted Wobber, Aydan R. Yumerefendi, Martín Abadi, Andrew Birrell, Daniel R. Simon |
Authorizing applications in singularity. |
EuroSys |
2007 |
DBLP DOI BibTeX RDF |
application identity, access control, pattern matching, regular expressions, delegation, capabilities, channels |
15 | Fabio Massacci, John Mylopoulos, Nicola Zannone |
Hierarchical hippocratic databases with minimal disclosure for virtual organizations. |
VLDB J. |
2006 |
DBLP DOI BibTeX RDF |
Minimal disclosure, Private data management, Access control, Information security, Virtual organizations, Delegation, Privacy protection |
15 | Luis F. G. Sarmenta, Marten van Dijk, Charles W. O'Donnell, Jonathan Rhodes, Srinivas Devadas |
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. |
STC |
2006 |
DBLP DOI BibTeX RDF |
e-wallet memory integrity checking, key delegation, stored-value, trusted storage, certified execution |
15 | Pradeep Kumar |
Modal logic & ownership types: uniting three worlds. |
OOPSLA Companion |
2006 |
DBLP DOI BibTeX RDF |
split-objects, modal logic, roles, delegation, ownership types, dynamic binding, ownership transfer |
15 | David Fisher, Olin Shivers |
Static analysis for syntax objects. |
ICFP |
2006 |
DBLP DOI BibTeX RDF |
extensible programming languages, language towers, lazy delegation, static analysis, domain-specific languages, type inference, flow analysis, macros |
15 | Urs Hengartner, Peter Steenkiste |
Access control to people location information. |
ACM Trans. Inf. Syst. Secur. |
2005 |
DBLP DOI BibTeX RDF |
credential discovery, privacy, trust, RSA, location, Certificates, delegation, DSA, SPKI/SDSI |
15 | Urs Hengartner, Peter Steenkiste |
Implementing access control to people location information. |
SACMAT |
2004 |
DBLP DOI BibTeX RDF |
trust, rsa, location, certificates, delegation, dsa, spki/sdsi |
15 | Patrick C. K. Hung |
From Conflict of Interest to Separation of Duties in WS-Policy for Web Services Matchmaking Process. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
WS-PolicyAttachment, security assertion, Web services, delegation, matchmaking, separation of duties, conflict of interest, WS-Policy, service locator |
15 | Chin-Chen Chang 0001, Chu-Hsing Lin, Wei Lee, Pai-Cheng Hwang |
Secret Sharing with Access Structures in a Hierarchy. |
AINA (2) |
2004 |
DBLP DOI BibTeX RDF |
delegation and agreement, secret sharing, document management, access structure, hierarchical access control |
15 | Patrick C. K. Hung, Guang-Sha Qiu |
Specifying conflict of interest assertions in WS-policy with Chinese wall security policy. |
SIGecom Exch. |
2003 |
DBLP DOI BibTeX RDF |
WS-policy attachment, security assertion, XML, security policy, delegation, matchmaking, conflict of interest, WS-policy, service locators, Chinese wall security policy |
15 | François Siewe, Antonio Cau, Hussein Zedan |
A compositional framework for access control policies enforcement. |
FMSE |
2003 |
DBLP DOI BibTeX RDF |
access control, authorization, delegation, policy composition |
15 | Ilham Benyahia, Jean-Yves Potvin |
Framework Architecture for Information Management in Dynamic Vehicle Dispatching. |
HICSS |
2001 |
DBLP DOI BibTeX RDF |
Framework design, Vehicle dispatching, Processing delegation, Simulation, Agents, Object-oriented, Information management, Deadlines |
15 | Helmut Reiser, Gerald Vogt |
Security Requirements for Management Systems Using Mobile Agents. |
ISCC |
2000 |
DBLP DOI BibTeX RDF |
Management by Delegation, Security, Mobile Agent Systems, Distributed Management |
15 | David Fox 0001 |
Composing Magic Lenses. |
CHI |
1998 |
DBLP DOI BibTeX RDF |
work-through interface, object-oriented, filter, inheritance, scheme, transparent, delegation, portal, lens, CLOS, pad, Magic Lens |
14 | Hongmin Gao 0002, Pengfei Duan, Xiaofeng Pan, Xiaojing Zhang, Keke Ye, Ziyuan Zhong |
Blockchain-enabled supervised secure data sharing and delegation scheme in Web3.0. |
J. Cloud Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Ulrich Frank, Tony Clark 0001, Jens Gulden, Daniel Töpel |
An Extended Concept of Delegation and its Implementation within a Modelling and Programming Language Architecture. |
Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Yulan Gao, Chao Ren, Han Yu 0001 |
Fairness-Aware Multi-Server Federated Learning Task Delegation over Wireless Networks. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Andrew Fuchs, Andrea Passarella, Marco Conti |
Optimizing Delegation in Collaborative Human-AI Hybrid Teams. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Ruqing Xu |
Persuasion, Delegation, and Private Information in Algorithm-Assisted Decisions. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Philipp Spitzer, Joshua Holstein, Patrick Hemmer, Michael Vössing, Niklas Kühl 0001, Dominik Martin, Gerhard Satzger |
On the Effect of Contextual Information on Human Delegation Behavior in Human-AI collaboration. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Oliver Sourbut, Lewis Hammond, Harriet Wood |
Cooperation and Control in Delegation Games. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Frederic Fieau, Emile Stephan, Sanjay Mishra |
Content Delivery Network Interconnection (CDNI) Delegation Using the Automated Certificate Management Environment. |
RFC |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Cécile Delerablée, Lénaïck Gouriou, David Pointcheval |
Attribute-Based Signatures with Advanced Delegation, and Tracing. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
14 | Taehoon Kim, Daehee Seo, Su-Hyun Kim, Im-Yeong Lee |
A Comprehensive Approach to User Delegation and Anonymity within Decentralized Identifiers for IoT. |
Sensors |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #301 - #400 of 1703 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|