Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
12 | Mina Deng, Bart Preneel |
On Secure and Anonymous Buyer-Seller Watermarking Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIW ![In: Third International Conference on Internet and Web Applications and Services, ICIW 2008, 8-13 June 2008, Athens, Greece, pp. 524-529, 2008, IEEE Computer Society, 978-0-7695-3163-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
watermarking protocol, multimedia, e-commerce, security and privacy |
12 | J. R. Welch |
Vagueness and Inductive Molding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Synth. ![In: Synth. 154(1), pp. 147-172, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Richard H. Stern |
West Coast Federal Appeals Court Upholds Chip Protection Act Violation Finding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Micro ![In: IEEE Micro 27(1), pp. 124-126, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
antitrust violation, Semiconductor Chip Protection Act, chip piracy, monopoly, Altera, Clear Logic, reverse engineering, ASICs, law, bitstream |
12 | Richard H. Stern |
Supreme Court to Hear Semiconductor Chip Patent "Exhaustion" Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Micro ![In: IEEE Micro 27(6), pp. 11-13, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
dicta, patent exhaustion, patent, licensing |
12 | Mike P. Papazoglou, Benedikt Kratz |
Web services technology in support of business transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Serv. Oriented Comput. Appl. ![In: Serv. Oriented Comput. Appl. 1(1), pp. 51-63, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Web services transactions, Business functions, Business process orchestration, QoS principles, Business process integration, Business protocols, Business transactions |
12 | Husrev T. Sencar, Nasir D. Memon |
Combatting Ambiguity Attacks via Selective Detection of Embedded Watermarks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 2(4), pp. 664-682, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Aggelos Kiayias, Hong-Sheng Zhou |
Hidden Identity-Based Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 134-147, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Satish Devane, Madhumita Chatterjee, Deepak B. Phatak |
Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 9-14, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Ibrahim Mostafa Ibrahim, Sherif Hazem Nour El-Din, Abdel Fatah A. Hegazy |
An Effective and Secure Buyer-Seller Watermarking Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 21-28, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Hao Wang 0003, Yuyi Ou, Jie Ling 0002, Lu Liang, Xiang Xu |
Certified Email Delivery with Offline TTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 15-20, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Javier Montero, Daniel Gómez 0001, Humberto Bustince Sola |
Atanassov's Intuitionistic Fuzzy Sets as a Classification Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFSA (1) ![In: Foundations of Fuzzy Logic and Soft Computing, 12th International Fuzzy Systems Association World Congress, IFSA 2007, Cancun, Mexico, June 18-21, 2007, Proceedings, pp. 69-75, 2007, Springer, 978-3-540-72917-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Atanassov’s Intuitionistic Fuzzy Sets, L-Fuzzy sets, Type-2 Fuzzy Sets, Interval Valued Fuzzy Sets |
12 | Kareem Shaker, David Corne, Richard M. Everson |
Investigating hybrids of evolutionary search and linear discriminant analysis for authorship attribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Congress on Evolutionary Computation ![In: Proceedings of the IEEE Congress on Evolutionary Computation, CEC 2007, 25-28 September 2007, Singapore, pp. 2071-2077, 2007, IEEE, 978-1-4244-1339-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Carsten Keßler, Martin Raubal, Krzysztof Janowicz |
The Effect of Context on Semantic Similarity Measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (2) ![In: On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, OTM Academy Doctoral Consortium, MONET, OnToContent, ORM, PerSys, PPN, RDDS, SSWS, and SWWS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II, pp. 1274-1284, 2007, Springer, 978-3-540-76889-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Ahmad-Reza Sadeghi |
The Marriage of Cryptography and Watermarking - Beneficial and Challenging for Secure Watermarking and Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 6th International Workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007, Proceedings, pp. 2-18, 2007, Springer, 978-3-540-92237-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Husrev T. Sencar, Qiming Li, Nasir D. Memon |
A new approach to countering ambiguity attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007, pp. 205-214, 2007, ACM, 978-1-59593-857-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ambiguity attack, security, watermarking |
12 | Haiyan Xu 0001, Keith W. Hipel, D. Marc Kilgour |
Matrix representation of conflicts with two decision-makers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Montréal, Canada, 7-10 October 2007, pp. 1764-1769, 2007, IEEE, 978-1-4244-0990-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | ByungRae Cha, Kyungjun Kim, Dongseob Lee |
Study of Digital License Search for Intellectual Property Rights of S/W Source Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings. Part III, pp. 201-212, 2007, Springer, 978-3-540-74482-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Borislava I. Simidchieva, Lori A. Clarke, Leon J. Osterweil |
Representing Process Variation with a Process Family. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSP ![In: Software Process Dynamics and Agility, International Conference on Software Process, ICSP 2007, Minneapolis, MN, USA, May 19-20, 2007, Proceedings, pp. 109-120, 2007, Springer, 978-3-540-72425-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
process families, process variants, process instance generation, software product lines, process variation |
12 | ByungRae Cha |
Business Model and Comparasion of S/W Source Code vs. Digital License for IPRs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES-AMSTA ![In: Agent and Multi-Agent Systems: Technologies and Applications, First KES International Symposium, KES-AMSTA 2007, Wroclaw, Poland, May 31- June 1, 2007, Proceedings, pp. 825-832, 2007, Springer, 978-3-540-72829-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Bin Zhao, Lanjun Dang, Weidong Kou, Jun Zhang 0010, Xuefei Cao |
Design of Secure Watermarking Scheme for Watermarking Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM ![In: Advances in Multimedia Information Processing - PCM 2007, 8th Pacific Rim Conference on Multimedia, Hong Kong, China, December 11-14, 2007, Proceedings, pp. 357-366, 2007, Springer, 978-3-540-77254-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Sallyann Freudenberg, Pablo Romero, Benedict du Boulay |
"Talking the talk": Is intermediate-level conversation the key to the pair programming success story? ![Search on Bibsonomy](Pics/bibsonomy.png) |
AGILE ![In: AGILE 2007 Conference (AGILE 2007), 13-17 August 2007, Washington, DC, USA, pp. 84-91, 2007, IEEE Computer Society, 0-7695-2872-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi |
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Data Hiding Multim. Secur. ![In: Transactions on Data Hiding and Multimedia Security I, pp. 73-103, 2006, Springer, 3-540-49071-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Pieter Vansteenwegen, Dirk Van Oudheusden |
Selection of tourist attractions and routing using personalised electronic guides. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ENTER ![In: Information and Communication Technologies in Tourism, ENTER 2006, Proceedings of the International Conference in Lausanne, Switzerland, 2006, pp. 55, 2006, Springer, 978-3-211-30987-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Masayuki Terada, Kensaku Mori, Sadayuki Hongo |
An Optimistic NBAC-Based Fair Exchange Method for Arbitrary Items. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings, pp. 105-118, 2006, Springer, 3-540-33311-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Kwok-Wing Chau |
A Split-Step PSO Algorithm in Predicting Construction Litigation Outcome. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRICAI ![In: PRICAI 2006: Trends in Artificial Intelligence, 9th Pacific Rim International Conference on Artificial Intelligence, Guilin, China, August 7-11, 2006, Proceedings, pp. 1211-1215, 2006, Springer, 3-540-36667-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Elena Lieven |
How Do Children Develop Syntactic Representations from What They Hear? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EELC ![In: Symbol Grounding and Beyond, Third International Workshop on the Emergence and Evolution of Linguistic Communication, EELC 2006, Rome, Italy, September 30 - October 1, 2006, Proceedings, pp. 72-75, 2006, Springer, 3-540-45769-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Diane Jamieson, Kevin Vinsen, Guy Callender |
Agile Procurement and Dynamic Value for Money to Facilitate Agile Software Projects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO-SEAA ![In: 32nd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA 2006), August 29 - September 1, 2006, Cavtat/Dubrovnik, Croatia, pp. 248-255, 2006, IEEE Computer Society, 0-7695-2594-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Younhee Choi, Seok-Bum Ko, Ying Sun |
Effect of Postural Changes on Baroreflex Sensitivity: A study on the Eurobavar data set. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada, pp. 110-114, 2006, IEEE, 1-4244-0038-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Shi Cui, Choong Wah Chan, Xiangguo Cheng |
Practical Group Signatures from RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 111-115, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security mediator, digital signature, RSA, group signature |
12 | Kwok-Wing Chau |
Prediction of Construction Litigation Outcome - A Case-Based Reasoning Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEA/AIE ![In: Advances in Applied Artificial Intelligence, 19th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2006, Annecy, France, June 27-30, 2006, Proceedings, pp. 548-553, 2006, Springer, 3-540-35453-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | André Adelsbach, Stefan Katzenbeisser 0001, Ahmad-Reza Sadeghi |
A Computational Model for Watermark Robustness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers, pp. 145-160, 2006, Springer, 978-3-540-74123-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Daniel Lohmann, Fabian Scheler, Reinhard Tartler, Olaf Spinczyk, Wolfgang Schröder-Preikschat |
A quantitative analysis of aspects in the eCos kernel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18-21, 2006, pp. 191-204, 2006, ACM, 1-59593-322-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Aspect-Oriented Programming (AOP), Footprint, eCos, AspectC++ |
12 | Rong Du, Colin Boyd, Ernest Foo |
A Secure E-Tender Submission Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust and Privacy in Digital Business, Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings, pp. 213-222, 2006, Springer, 3-540-37750-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Kwok-Wing Chau |
Prediction of Construction Litigation Outcome Using a Split-Step PSO Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICONIP (2) ![In: Neural Information Processing, 13th International Conference, ICONIP 2006, Hong Kong, China, October 3-6, 2006, Proceedings, Part II, pp. 1101-1107, 2006, Springer, 3-540-46481-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | John Malone-Lee |
Signcryption with Non-interactive Non-repudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 37(1), pp. 81-109, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
provable security, non-repudiation, Signcryption |
12 | Chih-Hung Wang, Yan-Sheng Kuo |
An efficient contract signing protocol using the aggregate signature scheme to protect signers' privacy and promote reliability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 39(4), pp. 66-79, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
cryptography, elliptic curves, bilinear pairings, fair exchange, contract signing |
12 | Alison Chorley, Trevor J. M. Bench-Capon |
AGATHA: Using heuristic search to automate the construction of case law theories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Law ![In: Artif. Intell. Law 13(1), pp. 9-51, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
theory construction, case based reasoning, heuristic search, legal knowledge based systems |
12 | Jan M. Rabaey |
Traveling the Wild Frontier of Ultra Low-Power Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PATMOS ![In: Integrated Circuit and System Design, Power and Timing Modeling, Optimization and Simulation, 15th International Workshop, PATMOS 2005, Leuven, Belgium, September 21-23, 2005, Proceedings, pp. 747, 2005, Springer, 3-540-29013-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Aleksandra Nenadic, Ning Zhang 0001, Qi Shi 0001, Carole A. Goble |
Certified E-Mail Delivery with DSA Receipts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), CD-ROM / Abstracts Proceedings, 4-8 April 2005, Denver, CO, USA, 2005, IEEE Computer Society, 0-7695-2312-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Shaobin Wang, Fan Hong, Guohua Cui |
A fair e-cash payment scheme based on credit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, Xi'an, China, August 15-17, 2005, pp. 622-626, 2005, ACM, 1-59593-112-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
impartiality, off-line payment, overdraft credit, e-cash, justice |
12 | Victor K. Wei |
Tracing-by-Linking Group Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 149-163, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Alyx Macfadyen, Andrew Stranieri, John Yearwood |
Structured Reasoning to Support Deliberative Dialogue. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (1) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part I, pp. 283-289, 2005, Springer, 3-540-28894-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Grace C.-W. Ting |
Ambiguity Attacks on the Ganic-Eskicioglu Robust DWT-SVD Image Watermarking Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers, pp. 378-388, 2005, Springer, 3-540-33354-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
rightful ownership, watermarking, SVD, DWT, Information hiding, ambiguity |
12 | Emilia Bellucci, John Zeleznikow |
Trade-Off Manipulations in the Development of Negotiation Decision Support Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Dharani Priyahansika Perera |
Voice recognition technology for visual artists with disabilities in their upper limbs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OZCHI ![In: Proceedings of the 2005 Australasian Computer-Human Interaction Conference, OZCHI 2005, Canberra, Australia, November 21-25, 2005, 2005, ACM, 1-59593-222-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Don Radlauer |
Incident and Casualty Databases as a Tool for Understanding Low-Intensity Conflicts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings, pp. 153-170, 2005, Springer, 3-540-25999-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Kwok-Wing Chau |
Predicting Construction Litigation Outcome Using Particle Swarm Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEA/AIE ![In: Innovations in Applied Artificial Intelligence, 18th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2005, Bari, Italy, June 22-24, 2005, Proceedings, pp. 571-578, 2005, Springer, 3-540-26551-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Jianhong Zhang, Jiancheng Zou, Yumin Wang |
An Improved Group Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 185-194, 2005, Springer, 3-540-28224-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Sergei Gorlatch |
Send-receive considered harmful: Myths and realities of message passing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Program. Lang. Syst. ![In: ACM Trans. Program. Lang. Syst. 26(1), pp. 47-56, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Message Passing Interface (MPI), Programming methodology |
12 | Paul E. Dunne, Trevor J. M. Bench-Capon |
Identifying Audience Preferences in Legal and Social Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 15th International Conference, DEXA 2004 Zaragoza, Spain, August 30-September 3, 2004, Proceedings, pp. 518-527, 2004, Springer, 3-540-22936-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Xiaohong Hao, Shunhong Hou |
OPC DX and industrial Ethernet glues fieldbus together. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARCV ![In: 8th International Conference on Control, Automation, Robotics and Vision, ICARCV 2004, Kunming, China, 6-9 December 2004, Proceedings, pp. 562-567, 2004, IEEE, 0-7803-8653-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Atsuko Miyaji, Kozue Umeda |
A Fully-Functional Group Signature Scheme over Only Known-Order Group. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 164-179, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Paul Borchert, Christian Anger, Torsten Schaub, Miroslaw Truszczynski |
Towards Systematic Benchmarking in Answer Set Programming: The Dagstuhl Initiative. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LPNMR ![In: Logic Programming and Nonmonotonic Reasoning, 7th International Conference, LPNMR 2004, Fort Lauderdale, FL, USA, January 6-8, 2004, Proceedings, pp. 3-7, 2004, Springer, 3-540-20721-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Wei Yuan, Srikanth V. Krishnamurthy, Satish K. Tripathi |
Improving the reliability of event reports in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28 - July 1, 2004, Alexandria, Egypt, pp. 220-225, 2004, IEEE Computer Society, 0-7803-8623-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Sangjin Kim, Heekuck Oh |
Fair Offline Payment Using Verifiable Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, pp. 286-301, 2004, Springer, 3-540-24015-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Seungjoo Kim, Dongho Won |
Threshold Entrusted Undeniable Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 195-203, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Entrusted undeniable signature, Undeniable signature, Threshold signature |
12 | Chunbo Ma, Dake He |
A New Chameleon Multi-signature Based on Bilinear Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC Workshops ![In: Grid and Cooperative Computing - GCC 2004 Workshops: GCC 2004 International Workshops, IGKG, SGT, GISS, AAC-GEVO, and VVS, Wuhan, China, October 21-24, 2004. Proceedings, pp. 329-334, 2004, Springer, 3-540-23578-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Dines Bjørner, Chris George, Anne E. Haxthausen, Christian Krog Madsen, Steffen Holmslykke, Martin Pnika |
"UML-ising' Formal Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoftSpez Final Report ![In: Integration of Software Specification Techniques for Applications in Engineering, Priority Program SoftSpez of the German Research Foundation (DFG), Final Report, pp. 423-450, 2004, Springer, 3-540-23135-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Changjie Wang, Ho-fung Leung, Shing-Chi Cheung, Yumin Wang |
Use of Cryptographic Technologies for Privacy Protection of Watermarks in Internet Retails of Digital Contents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 414-419, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Antoinette Leung, Zhuang Yan, Simon Fong 0001 |
On Designing a Flexible E-Payment System with Fraud Detection Capability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 6-9 July 2004, San Diego, CA, USA, pp. 236-243, 2004, IEEE Computer Society, 0-7695-2098-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Henk-Jan Lebbink, Cilia Witteman, John-Jules Ch. Meyer |
A Dialogue Game to Offer an Agreement to Disagree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), 19-23 August 2004, New York, NY, USA, pp. 1238-1239, 2004, IEEE Computer Society, 1-58113-864-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | André Adelsbach, Stefan Katzenbeisser 0001, Ahmad-Reza Sadeghi |
Watermark detection with zero-knowledge disclosure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 9(3), pp. 266-278, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Knut Elgsaas, Håvard Hegna |
The Norwegian Computing Center and the Univac 1107 (1963-1970). ![Search on Bibsonomy](Pics/bibsonomy.png) |
History of Nordic Computing ![In: History of Nordic Computing, IFIP WG9.7 First Working Conference on the History of Nordic Computing (HiNC1), June 16-18, 2003, Trondheim, Norway, pp. 449-462, 2003, Springer, 0-387-24167-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Central computers, research policy, Simula 67, Univac 1107 |
12 | Marina Krol, D. Nelkin-Warantz, A. Auville |
Database-Controlled Document Management System for the Mt. Sinai Independent Practice Association. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CBMS ![In: 16th IEEE Symposium on Computer-Based Medical Systems (CBMS 2003), 26-27 June 2003, New York, NY, USA, pp. 225-, 2003, IEEE Computer Society, 0-7695-1901-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng |
Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings, pp. 96-110, 2003, Springer, 3-540-20176-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | André Adelsbach, Stefan Katzenbeisser 0001, Helmut Veith |
Watermarking schemes provably secure against copy and ambiguity attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003, pp. 111-119, 2003, ACM, 1-58113-786-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
protocol attacks, watermarking, multimedia security |
12 | Jianying Zhou 0001 |
Efficient Signature Validation Based on a New PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies, 4th International Conference, EC-Web, Prague, Czech Republic, September 2-5, 2003, Proceedings, pp. 94-103, 2003, Springer, 3-540-40808-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Guilin Wang |
On the Security of a Group Signature Scheme with Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 27-39, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signature, group signature, forward security |
12 | Hui-Feng Huang, Chin-Chen Chang 0001 |
An Efficient Convertible Authenticated Encryption Scheme and Its Variant. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings, pp. 382-392, 2003, Springer, 3-540-20150-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Guilin Wang, Feng Bao 0001, Jianying Zhou 0001, Robert H. Deng |
Security Remarks on a Group Signature Scheme with Member Deletion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings, pp. 72-83, 2003, Springer, 3-540-20150-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
member deletion, Digital signature, group signature |
12 | Jianhong Zhang, Qianhong Wu, Yumin Wang |
A Novel Efficient Group Signature Scheme with Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings, pp. 292-300, 2003, Springer, 3-540-20150-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
anonymity, revocation, forward security, unlinkability, Group signature scheme |
12 | James A. Whittaker, Steven Atkin |
Software Engineering is Not Enough. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 19(4), pp. 108-115, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Software engineering, software development, software process |
12 | Harry Hochheiser |
The platform for privacy preference as a social protocol: An examination within the U.S. policy context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 2(4), pp. 276-306, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
social protocols, Privacy, P3P |
12 | Joshua D. Knowles, Richard A. Watson |
On the Utility of Redundant Encodings in Mutation-Based Evolutionary Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPSN ![In: Parallel Problem Solving from Nature - PPSN VII, 7th International Conference, Granada, Spain, September 7-11, 2002, Proceedings, pp. 88-98, 2002, Springer, 3-540-44139-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Henry Prakken, Giovanni Sartor |
The Role of Logic in Computational Models of Legal Argument: A Critical Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computational Logic: Logic Programming and Beyond ![In: Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski, Part II, pp. 342-381, 2002, Springer, 3-540-43960-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Hak Soo Ju, Hyun-Jeong Kim, Dong Hoon Lee 0001, Jong In Lim 0001 |
An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 421-432, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Guilin Wang |
On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 75-89, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
threshold group signatures, threshold-multisignatures, digital signatures, group signatures |
12 | Giles Hogben, Tom Jackson, Marc Wilikens |
A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings, pp. 104-125, 2002, Springer, 3-540-44345-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
XML Digital Signatures, P3P, transaction management, privacy enhancing technologies, security verification, secure electronic commerce |
12 | Gerriet Backer, Bärbel Mertsching, Maik Bollmann |
Data- and Model-Driven Gaze Control for an Active-Vision System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 23(12), pp. 1415-1429, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
active vision, Visual attention, visual exploration, gaze control |
12 | Nasir D. Memon, Ping Wah Wong |
A buyer-seller watermarking protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 10(4), pp. 643-649, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Dawn Xiaodong Song |
Practical forward secure group signature schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001., pp. 225-234, 2001, ACM, 1-58113-385-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Giampaolo Bella, Lawrence C. Paulson |
Mechanical Proofs about a Non-repudiation Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TPHOLs ![In: Theorem Proving in Higher Order Logics, 14th International Conference, TPHOLs 2001, Edinburgh, Scotland, UK, September 3-6, 2001, Proceedings, pp. 91-104, 2001, Springer, 3-540-42525-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Vladan M. Jovanovic, Daniel Shoemaker 0001, Lerine Steenkamp |
Independent Accreditation for Software Engineering Programs? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSEE&T ![In: 14th Conference on Software Engineering Education and Training, 19-21 February 2001, Charlotte, North Carolina, USA, pp. 75-76, 2001, IEEE Computer Society, 0-7695-1059-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Emmanuel Bresson, Jacques Stern |
Efficient Revocation in Group Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings, pp. 190-206, 2001, Springer, 3-540-41658-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Olivier Markowitch, Steve Kremer |
An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings, pp. 363-378, 2001, Springer, 3-540-42662-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Chuan-Kun Wu, Vijay Varadharajan |
Fair Exchange of Digital Signatures with Offline Trusted Third Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001, pp. 466-470, 2001, Springer, 3-540-42880-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Electronic commerce, Digital signature, Fair exchange |
12 | Daniel E. Cooke, Scott Hamilton |
New Directions at NASA Ames Research Center. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 33(1), pp. 63-71, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Ross J. Anderson |
The Correctness of Crypto Transaction Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 125-127, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Hyun-Jeong Kim, Jong In Lim 0001, Dong Hoon Lee 0001 |
Efficient and Secure Member Deletion in Group Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2000, Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings, pp. 150-161, 2000, Springer, 3-540-41782-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Ik Rae Jeong, Dong Hoon Lee 0001 |
Anonymity Control in Multi-bank E-Cash System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings, pp. 104-116, 2000, Springer, 3-540-41452-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Volker Tschammer, Vaggelis Ouzounis |
Trading of Intangible Goods - Introduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 4-7 January, 2000, Maui, Hawaii, USA, 2000, IEEE Computer Society, 0-7695-0493-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik |
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, pp. 255-270, 2000, Springer, 3-540-67907-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
revocable anonymity, coalition-resistance, provable security, strong RSA assumption, identity escrow, Group signature schemes |
12 | Reihaneh Safavi-Naini, Yejing Wang |
A Combinatorial Approach to Asymmetric Traitor Tracing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COCOON ![In: Computing and Combinatorics, 6th Annual International Conference, COCOON 2000, Sydney, Australia, July 26-28, 2000, Proceedings, pp. 416-425, 2000, Springer, 3-540-67787-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Graham Phillips, Scott Shenker, Hongsuda Tangmunarunkit |
Scaling of Multicast Trees: Comments on the Chuang-Sirbu Scaling Law. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 1999 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30 - September 3, 1999, Cambridge, Massachusetts, USA, pp. 41-51, 1999, ACM, 1-58113-135-6. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
12 | Jianying Zhou 0001, Robert H. Deng, Feng Bao 0001 |
Evolution of Fair Non-repudiation with TTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings, pp. 258-269, 1999, Springer, 3-540-65756-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
fair non-repudiation, trusted third party, secure electronic commerce |
12 | Kwangjo Kim, Sangjoon Park, Joonsang Baek |
Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: Proceedings of the 1999 International Conference on Parallel Processing Workshops, ICPPW 1999, Wakamatsu, Japan, September 21-24, 1999, pp. 140-145, 1999, IEEE Computer Society, 0-7695-0353-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Fairness, Cryptographic Protocol, Non-repudiation, Trusted Third Party |
12 | Michael Wichert, David B. Ingham, Steve J. Caughey |
Non-repudiation Evidence Generation for CORBA using XML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 320-327, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Security, XML, e-commerce, CORBA, non-repudiation |
12 | Dennis Abts, Mike Roberts |
Verifying Large-Scale Multiprocessors Using an Abstract Verification Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 36th Conference on Design Automation, New Orleans, LA, USA, June 21-25, 1999., pp. 163-168, 1999, ACM Press. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
12 | J. P. E. Hodgson |
Book review: Prolog: The Standard Reference Manual By E Deransart, A. Ed-Dbali, and L. Cervoni (Springer-Verlag, 1996). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGART Bull. ![In: SIGART Bull. 9(1), pp. 44-45, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
12 | Arnd Weber |
See What You Sign: Secure Implementations of Digital Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IS&N ![In: Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services, 5th International Conference on Intelligence and Services in Networks, IS&N'98, Antwerp, Belgium, May 25-28, 1998, Proceedings, pp. 509-520, 1998, Springer, 3-540-64598-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|