The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase non-repudiation (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-1998 (18) 1999-2000 (32) 2001-2002 (37) 2003 (29) 2004 (36) 2005 (48) 2006 (29) 2007 (48) 2008 (36) 2009 (31) 2010 (17) 2011-2013 (23) 2014-2016 (15) 2017-2018 (15) 2019-2023 (20) 2024 (1)
Publication types (Num. hits)
article(94) book(1) incollection(2) inproceedings(335) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 398 occurrences of 211 keywords

Results
Found 435 publication records. Showing 435 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
12Wensheng Zhang 0001, Nalin Subramanian, Guiling Wang 0001 Lightweight and Compromise-Resilient Message Authentication in Sensor Networks. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Lifeng Sang, Anish Arora Spatial Signatures for Lightweight Security in Wireless Sensor Networks. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Jinyuan Sun, Chi Zhang 0001, Yuguang Fang A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Dongmei Liu, Sihan Qing, Pengfei Li, ChunYang Yuan A Practical Certified E-Mail System with Temporal Authentication Based on Transparent TSS. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF certified electronic mail, fairness exchange protocol
12Xiaofeng Wang, Liang Cao, Shangping Wang, Yaling Zhang ID-Based Convertible Limited (Multi-)Verifier Signature Scheme. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Hou Huifang, Ji Xinshen, Liu Guangqiang A Novel Access Authentication Scheme Based on ECC for 3G-WLAN Interworking Network. Search on Bibsonomy CSSE (5) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Nicolai Kuntze, Julian Schütte Securing Decentralized Workflows in Ambient Environments. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12S. Sharmila Deva Selvi, S. Sree Vivek, Deepanshu Shukla, C. Pandu Rangan Efficient and Provably Secure Certificateless Multi-receiver Signcryption. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Multi-receiver, Bilinear Pairing, Signcryption, Certificateless
12Duc-Phong Le, Alexis Bonnecaze, Alban Gabillon Signtiming scheme based on aggregate signature. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Lijun Liao, Jörg Schwenk A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Phil Bonderud, Sam Chung, Barbara Endicott-Popovsky Toward Trustworthy Service Consumers and Producers. Search on Bibsonomy ICIW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure Quality of Services, Web Services, UDDI
12Joan Arnedo-Moreno, Jordi Herrera-Joancomartí Persistent Interoperable Security for JXTA Advertisements. Search on Bibsonomy CISIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Zhiguo Wan, Kui Ren 0001, Bart Preneel A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF roaming protocols, privacy, mobile networks
12Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee A scalable public key management scheme in wireless ad hoc networks. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Mike P. Papazoglou, Benedikt Kratz Web services technology in support of business transactions. Search on Bibsonomy Serv. Oriented Comput. Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Web services transactions, Business functions, Business process orchestration, QoS principles, Business process integration, Business protocols, Business transactions
12ZhenYu Hu, Dongdai Lin, Wenling Wu, Dengguo Feng Constructing parallel long-message signcryption scheme from trapdoor permutation. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF parallel, signcryption, authenticated encryption, trapdoor permutations
12Rolf Oppliger Providing Certified Mail Services on the Internet. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Debasri Saha, Parthasarathi Dasgupta, Susmita Sur-Kolay, Samar Sen-Sarma A Novel Scheme for Encoding and Watermark Embedding in VLSI Physical Design for IP Protection. Search on Bibsonomy ICCTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Shiqun Li, Guilin Wang, Jianying Zhou 0001, Kefei Chen Undeniable Mobile Billing Schemes. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Agapios Avramidis, Panayiotis Kotzanikolaou, Christos Douligeris Chord-PKI: Embedding a Public Key Infrastructure into the Chord Overlay Network. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Li-Sha He, Ning Zhang 0001, Li-Rong He, Ian Rogers Secure M-commerce Transactions: A Third Party Based Signature Protocol. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF m-commerce security, signature delegation, digital signatures, cryptographic protocols
12Raylin Tso, Takeshi Okamoto, Eiji Okamoto ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ECDL problem, GDH problem, signcryption, ECDSA
12Mo-Che Chan, Shun-Yun Hu, Jehn-Ruey Jiang An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games. Search on Bibsonomy Networking The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Detlef Kähler, Ralf Küsters, Tomasz Truderung Infinite State AMC-Model Checking for Cryptographic Protocols. Search on Bibsonomy LICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Shuo Zheng, Luke McAven, Yi Mu 0001 First price sealed bid auction without auctioneers. Search on Bibsonomy IWCMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF first price, sealed-bid, auction, bit-commitment
12Chin-Ling Chen, Chih-Cheng Chen, Ling-Chun Liu, Gwoboa Horng A server-aided signature scheme for mobile commerce. Search on Bibsonomy IWCMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF server-aided signature, mobile commerce, hashing chain
12Brian Curtis, Josef Pieprzyk, Jan Seruga An Efficient eAuction Protocol. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Cleopas O. Angaye, Paul S. Fisher Application of FI sequences for authentication in a network. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF finite induction, private keys, security, public keys
12Lijun Liao, Jörg Schwenk End-to-End Header Protection in Signed S/MIME. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Raylin Tso, Takeshi Okamoto, Eiji Okamoto An Improved Signcryption Scheme and Its Variation. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks. Search on Bibsonomy PerCom The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Yu-Li Lin, Tzong-Chen Wu, Chien-Lung Hsu, Yen-Chun Chou Standard Operating Procedure and Privilege Management in Taiwan Digital Forensics. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF evidence preservation, access control, fingerprinting, digital forensics, Computer forensics, digital evidence
12Lijun Liao, Jörg Schwenk Secure Emails in XML Format Using Web Services. Search on Bibsonomy ECOWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Junqi Zhang, Yan Wang 0002, Vijay Varadharajan Mobile Agent and Web Service Integration Security Architecture. Search on Bibsonomy SOCA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao An Efficient Certified Email Protocol. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Certified Email Protocol, D Optimistic Fair Exchange Protocol, Fair Exchange Protocol
12Xavier Boyen Mesh Signatures. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Lei Zhang 0009, Futai Zhang, Fangguo Zhang New Efficient Certificateless Signature Scheme. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF certificateless signature scheme, cryptography, bilinear map, random oracle model
12N. R. Sunitha, B. B. Amberker, Prashant Koulgi, P. Siddharth Secure e-Cheque Clearance between Financial Institutions. Search on Bibsonomy CEC/EEE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Luiz M. R. Gadelha Jr., Bruno Schulze On the management of grid credentials. Search on Bibsonomy MGC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF credential management, grid computing, public key infrastructure, grid security
12Song Y. Yan, Carsten Maple, Glyn James A New Scheme for Deniable/Repudiable Authentication. Search on Bibsonomy CASC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Deniable/repudiable authentication, quadratic residuosity problem, intractability
12Yueh-Min Huang, Hua-Yi Lin, Tzone-I Wang Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF CBSRP, inter-cluster, cluster-based, CA (Certificate Authority), ad hoc network, PKI, ID-based
12Himanshu Khurana, Hyung-Seok Hahm Certified mailing lists. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF certified delivery, mailing lists
12Les Green, Linas Maknavicius Secure Billing for Ubiquitous Service Delivery. Search on Bibsonomy ICQT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Authentication, Billing, Ubiquity
12Riaz Ahmed Shaikh 0001, Sungyoung Lee, Young Jae Song, Yonil Zhung Securing Distributed Wireless Sensor Networks: Issues and Guidelines. Search on Bibsonomy SUTC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Pandurang Kamat, Arati Baliga, Wade Trappe An identity-based security framework For VANETs. Search on Bibsonomy Vehicular Ad Hoc Networks The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, privacy, vehicular networks
12Ana Ferreira 0001, Ricardo João Cruz Correia, Luis Antunes 0002, Pedro Farinha, E. Oliveira-Palhares, David W. Chadwick, Altamiro da Costa Pereira How to Break Access Control in a Controlled Manner. Search on Bibsonomy CBMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Alisher Kholmatov, Berrin A. Yanikoglu Biometric Cryptosystem Using Online Signatures. Search on Bibsonomy ISCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Marko Hassinen, Konstantin Hyppönen, Keijo Haataja An Open, PKI-Based Mobile Payment System. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Erkut Sinan Ayla, Attila Ozgit An architecture for end-to-end and inter-domain trusted mail delivery service. Search on Bibsonomy ISCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang Anonymous Signature Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang Restricted Universal Designated Verifier Signature. Search on Bibsonomy UIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Yiliang Han, Xiaoyuan Yang 0002, Ping Wei 0005, Yuming Wang, Yupu Hu ECGSC: Elliptic Curve Based Generalized Signcryption. Search on Bibsonomy UIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi A Survey of Secure B2C Commerce for Multicast Services. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Milan Markovic On Secure e-Health Systems. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2006 DBLP  DOI  BibTeX  RDF E-healthcare systems, Multilayered security systems, PKI systems, smart cards
12Ru Zhang, Xiao-gang Yu, Linna Zhou, Hong-peng Li A New Watermarking Protocol of Copyright Protection. Search on Bibsonomy IIH-MSP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Yi-Hwa Chen, Jinn-ke Jan Enhancement of digital signature with message recovery using self-certified public keys and its variants. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF self-certified public key, authenticated encryption, forward secrecy
12Jihye Kim, Gene Tsudik SRDP: Securing Route Discovery in DSR. Search on Bibsonomy MobiQuitous The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Chang N. Zhang, Chunren Lai, Honglan Zhong An Efficient Authentication Scheme with Fault Tolerance for Database Systems. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF fault tolerance, authentication, digital signature, error detection, error correction
12Yonggen Gu, Yuxi Fu, Yang Li, Xiaoju Dong A Generic Model for Symbolic Analyzing Security Protocols. Search on Bibsonomy CIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Meng Wang, Zhijing Liu Identity Based Threshold Proxy Signcryption Scheme. Search on Bibsonomy CIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Aleksandra Nenadic, Ning Zhang 0001, Qi Shi 0001, Carole A. Goble Certified E-Mail Delivery with DSA Receipts. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Anand Patwardhan, Jim Parker 0002, Anupam Joshi, Michaela Iorga, Tom Karygiannis Secure Routing and Intrusion Detection in Ad Hoc Networks. Search on Bibsonomy PerCom The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Ana Isabel González-Tablas Ferreres, L. M. Salas, Benjamín Ramos, Arturo Ribagorda Providing Personalization and Automation to Spatial-Temporal Stamping Services. Search on Bibsonomy DEXA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Jun Liu, Jianxin Liao, Xiaomin Zhu 0002 A System Model and Protocol for Mobile Payment. Search on Bibsonomy ICEBE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Wolfgang Kubbilun, Sebastian Gajek, Michael Psarros, Jörg Schwenk Trustworthy Verification and Visualisation of Multiple XML-Signatures. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Eckehard Hermann, Dieter Kessler XML Signatures in an Enterprise Service Bus Environment. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Cristian Marinescu, Nicolae Tapus Some Critical Aspects of the PKIX TSP. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF TSA, PKIX TSP, security, PKI, time-stamp
12Angela S. L. Wong, Matthew Sorell, Robert Clarke Secure Mutual Distrust Transaction Tracking Using Cryptographic Elements. Search on Bibsonomy IWDW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Eun-Jun Yoon, Kee-Young Yoo Robust Authenticated Encryption Scheme with Message Linkages. Search on Bibsonomy KES (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Message linkage, Cryptography, Signature, Authenticated encryption
12Macià Mut Puigserver, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger Certified e-Mail Protocol with Verifiable Third Party. Search on Bibsonomy EEE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Zuowen Tan, Zhuojun Liu, Mingsheng Wang On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Min-Hua Shao, Jianying Zhou 0001, Guilin Wang On the Security of a Certified E-Mail Scheme with Temporal Authentication. Search on Bibsonomy ICCSA (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Zoran Duric IPS - Secure Internet Payment System. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Xinhua Zhang, Chunyan Jiang, Wanjun Huang, Christoph Meinel A XML format secure protocol - OpenSST. Search on Bibsonomy AICCSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Xixiang Lv, Bo Yang Broadcast Encryption Using Identity-Based Public-Key Cryptosystem. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Changgen Peng, Xiang Li An Identity-Based Threshold Signcryption Scheme with Semantic Security. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Ernö Jeges, Zoltán Hornák, Csaba Körmöczi Encoding Private Key in Fingerprint. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Yonggen Gu, Yuxi Fu, Farong Zhong, Han Zhu A Generic Model for Analyzing Security Protocols. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Rodrigo Almeida dos Santos, Mario Fiallos Aguilar, Paulo Benicio Melo de Sousa, Joao C. Sousa, Rossana M. C. Andrade Anti-Doping: An Approach for Grid Integrity Verification. Search on Bibsonomy AICT/SAPIR/ELETE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12H. Abie, Demissie B. Aredo, T. Kristoffersen, Shahrzade Mazaher, T. Raguin Integrating a Security Requirement Language with UML. Search on Bibsonomy UML The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Mujtaba Khambatti, Partha Dasgupta, Kyung Dong Ryu A Role-Based Trust Model for Peer-to-Peer Communities and Dynamic Coalitions. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Dynamic Coalitions, Communities, Peer-to-Peer, Trust
12Ying-Hong Wang, Ching-Lin Wang, Cheng-Horng Liao Mobile Agent Protection and Verification in the Internet Environment. Search on Bibsonomy CIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF AUthentication Mechanism, Verification Mechanism, Agent, Mobile Agent, Electronic Commerce
12Inkyoung Jeun, Jongwook Park, TaeKyu Choi, Sang Wan Park, BaeHyo Park, ByungKwon Lee, YongSup Shin A Best Practice for Root CA Key Update in PKI. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Grit Denker, Son Nguyen, Andrew Ton OWL-S Semantics of Security Web Services: a Case Study. Search on Bibsonomy ESWS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Qinghua Xiao, Lingdi Ping A general secure electronic auction protocol. Search on Bibsonomy SMC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication. Search on Bibsonomy HSNMC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Seung-Hyun Seo, Sang-Ho Lee A Secure and Flexible Multi-signcryption Scheme. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Signcryption, multi-signature
12Wei Wu, Ling Shen, Haitao Huo, Xiaojian Li Research on Secure Multicast Technology in Grid-Based Large-Scale Distributed Simulation Applications. Search on Bibsonomy GCC Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Jianhong Zhang, Qianhong Wu, Jilin Wang, Yumin Wang An Improved Nominative Proxy Signature Scheme for Mobile Communication. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Zewen Chen, Jiwu Huang, Daren Huang, Jianhong Zhang, Yumin Wang Provably Secure and ID-Based Group Signature Scheme. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Xin Lü, Dengguo Feng An Arbitrated Quantum Message Signature Scheme. Search on Bibsonomy CIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Yan Wang 0002, Tieyan Li LITESET/A++: A New Agent-Assisted Secure Payment Protocol. Search on Bibsonomy CEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Kihun Hong, Souhwan Jung An Efficient Authentication Scheme Using Recovery Information in Signature. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Luke Hebbes, Andrew P. Lenaghan A Semi-fragile Steganographic Digital Signature for Images. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina Decidability Results for Parametric Probabilistic Transition Systems with an Application to Security. Search on Bibsonomy SEFM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Thomas Newe, Tom Coffey Security protocols for 2G and 3G wireless communications. Search on Bibsonomy ISICT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF 2G, radio-link, security, mobile, 3G, end-to-end
12Wenbo Mao Deniable Authenticated Key Establishment for Internet Protocols (Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Seung-Hyun Seo, Sang-Ho Lee A Secure Mobile Agent System Using Multi-signature Scheme in Electronic Commerce. Search on Bibsonomy Human.Society@Internet 2003 The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Multi-signature scheme, Mobile agent system
12Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Ueli M. Maurer Intrinsic Limitations of Digital Signatures and How to Cope with Them. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 435 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license