|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 398 occurrences of 211 keywords
|
|
|
Results
Found 435 publication records. Showing 435 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
12 | Wensheng Zhang 0001, Nalin Subramanian, Guiling Wang 0001 |
Lightweight and Compromise-Resilient Message Authentication in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 1418-1426, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Lifeng Sang, Anish Arora |
Spatial Signatures for Lightweight Security in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 2137-2145, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Jinyuan Sun, Chi Zhang 0001, Yuguang Fang |
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 1687-1695, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Dongmei Liu, Sihan Qing, Pengfei Li, ChunYang Yuan |
A Practical Certified E-Mail System with Temporal Authentication Based on Transparent TSS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 285-290, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
certified electronic mail, fairness exchange protocol |
12 | Xiaofeng Wang, Liang Cao, Shangping Wang, Yaling Zhang |
ID-Based Convertible Limited (Multi-)Verifier Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 774-777, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Hou Huifang, Ji Xinshen, Liu Guangqiang |
A Novel Access Authentication Scheme Based on ECC for 3G-WLAN Interworking Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (5) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 5: E-learning and Knowledge Management / Socially Informed and Instructinal Design / Learning Systems Platforms and Architectures / Modeling and Representation / Other Applications , December 12-14, 2008, Wuhan, China, pp. 1237-1241, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Nicolai Kuntze, Julian Schütte |
Securing Decentralized Workflows in Ambient Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC (2) ![In: 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II: Workshops, pp. 361-366, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | S. Sharmila Deva Selvi, S. Sree Vivek, Deepanshu Shukla, C. Pandu Rangan |
Efficient and Provably Secure Certificateless Multi-receiver Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, pp. 52-67, 2008, Springer, 978-3-540-88732-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Multi-receiver, Bilinear Pairing, Signcryption, Certificateless |
12 | Duc-Phong Le, Alexis Bonnecaze, Alban Gabillon |
Signtiming scheme based on aggregate signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings, pp. 145-149, 2008, IEEE, 978-1-4244-2414-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Lijun Liao, Jörg Schwenk |
A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings, pp. 19-32, 2008, Springer, 978-3-540-88624-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Phil Bonderud, Sam Chung, Barbara Endicott-Popovsky |
Toward Trustworthy Service Consumers and Producers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIW ![In: Third International Conference on Internet and Web Applications and Services, ICIW 2008, 8-13 June 2008, Athens, Greece, pp. 451-456, 2008, IEEE Computer Society, 978-0-7695-3163-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Secure Quality of Services, Web Services, UDDI |
12 | Joan Arnedo-Moreno, Jordi Herrera-Joancomartí |
Persistent Interoperable Security for JXTA Advertisements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIS ![In: Second International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2008), March 4th-7th, 2008, Technical University of Catalonia, Barcelona, Spain, pp. 354-359, 2008, IEEE Computer Society, 978-0-7695-3109-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Zhiguo Wan, Kui Ren 0001, Bart Preneel |
A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008, pp. 62-67, 2008, ACM, 978-1-59593-814-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
roaming protocols, privacy, mobile networks |
12 | Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee |
A scalable public key management scheme in wireless ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGMOBILE Mob. Comput. Commun. Rev. ![In: ACM SIGMOBILE Mob. Comput. Commun. Rev. 11(2), pp. 69-70, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Mike P. Papazoglou, Benedikt Kratz |
Web services technology in support of business transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Serv. Oriented Comput. Appl. ![In: Serv. Oriented Comput. Appl. 1(1), pp. 51-63, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Web services transactions, Business functions, Business process orchestration, QoS principles, Business process integration, Business protocols, Business transactions |
12 | ZhenYu Hu, Dongdai Lin, Wenling Wu, Dengguo Feng |
Constructing parallel long-message signcryption scheme from trapdoor permutation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 50(1), pp. 82-98, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
parallel, signcryption, authenticated encryption, trapdoor permutations |
12 | Rolf Oppliger |
Providing Certified Mail Services on the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(1), pp. 16-22, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Debasri Saha, Parthasarathi Dasgupta, Susmita Sur-Kolay, Samar Sen-Sarma |
A Novel Scheme for Encoding and Watermark Embedding in VLSI Physical Design for IP Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCTA ![In: 2007 International Conference on Computing: Theory and Applications (ICCTA 2007), 5-7 March 2007, Kolkata, India, pp. 111-116, 2007, IEEE Computer Society, 978-0-7695-2770-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Shiqun Li, Guilin Wang, Jianying Zhou 0001, Kefei Chen |
Undeniable Mobile Billing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 338-345, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Agapios Avramidis, Panayiotis Kotzanikolaou, Christos Douligeris |
Chord-PKI: Embedding a Public Key Infrastructure into the Chord Overlay Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 354-361, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Li-Sha He, Ning Zhang 0001, Li-Rong He, Ian Rogers |
Secure M-commerce Transactions: A Third Party Based Signature Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 3-8, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
m-commerce security, signature delegation, digital signatures, cryptographic protocols |
12 | Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 11-24, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ECDL problem, GDH problem, signcryption, ECDSA |
12 | Mo-Che Chan, Shun-Yun Hu, Jehn-Ruey Jiang |
An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 6th International IFIP-TC6 Networking Conference, Atlanta, GA, USA, May 14-18, 2007, Proceedings, pp. 1037-1046, 2007, Springer, 978-3-540-72605-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Detlef Kähler, Ralf Küsters, Tomasz Truderung |
Infinite State AMC-Model Checking for Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LICS ![In: 22nd IEEE Symposium on Logic in Computer Science (LICS 2007), 10-12 July 2007, Wroclaw, Poland, Proceedings, pp. 181-192, 2007, IEEE Computer Society, 0-7695-2908-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Shuo Zheng, Luke McAven, Yi Mu 0001 |
First price sealed bid auction without auctioneers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2007, Honolulu, Hawaii, USA, August 12-16, 2007, pp. 127-131, 2007, ACM, 978-1-59593-695-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
first price, sealed-bid, auction, bit-commitment |
12 | Chin-Ling Chen, Chih-Cheng Chen, Ling-Chun Liu, Gwoboa Horng |
A server-aided signature scheme for mobile commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2007, Honolulu, Hawaii, USA, August 12-16, 2007, pp. 565-570, 2007, ACM, 978-1-59593-695-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
server-aided signature, mobile commerce, hashing chain |
12 | Brian Curtis, Josef Pieprzyk, Jan Seruga |
An Efficient eAuction Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 417-421, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Cleopas O. Angaye, Paul S. Fisher |
Application of FI sequences for authentication in a network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 45th Annual Southeast Regional Conference, 2007, Winston-Salem, North Carolina, USA, March 23-24, 2007, pp. 362-366, 2007, ACM, 978-1-59593-629-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
finite induction, private keys, security, public keys |
12 | Lijun Liao, Jörg Schwenk |
End-to-End Header Protection in Signed S/MIME. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II, pp. 1646-1658, 2007, Springer, 978-3-540-76835-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
An Improved Signcryption Scheme and Its Variation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA, pp. 772-778, 2007, IEEE Computer Society, 978-0-7695-2776-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee |
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2007), 19-23 March 2007, White Plains, New York, USA, pp. 201-210, 2007, IEEE Computer Society, 978-0-7695-2787-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Yu-Li Lin, Tzong-Chen Wu, Chien-Lung Hsu, Yen-Chun Chou |
Standard Operating Procedure and Privilege Management in Taiwan Digital Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (2) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 154-158, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
evidence preservation, access control, fingerprinting, digital forensics, Computer forensics, digital evidence |
12 | Lijun Liao, Jörg Schwenk |
Secure Emails in XML Format Using Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOWS ![In: Fifth IEEE European Conference on Web Services (ECOWS 2007), 26-28 November 2007, Halle (Saale), Germany, pp. 129-136, 2007, IEEE Computer Society, 0-7695-3044-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Junqi Zhang, Yan Wang 0002, Vijay Varadharajan |
Mobile Agent and Web Service Integration Security Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOCA ![In: IEEE International Conference on Service-Oriented Computing and Applications, SOCA 2007, 19-20 June 2007, Newport Beach, California, USA, pp. 172-179, 2007, IEEE Computer Society, 978-0-7695-2861-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao |
An Efficient Certified Email Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 145-157, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Certified Email Protocol, D Optimistic Fair Exchange Protocol, Fair Exchange Protocol |
12 | Xavier Boyen |
Mesh Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings, pp. 210-227, 2007, Springer, 978-3-540-72539-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Lei Zhang 0009, Futai Zhang, Fangguo Zhang |
New Efficient Certificateless Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 692-703, 2007, Springer, 978-3-540-77089-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
certificateless signature scheme, cryptography, bilinear map, random oracle model |
12 | N. R. Sunitha, B. B. Amberker, Prashant Koulgi, P. Siddharth |
Secure e-Cheque Clearance between Financial Institutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC/EEE ![In: 9th IEEE International Conference on E-Commerce Technology (CEC 2007) / 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (EEE 2007), 23-26 July 2007, National Center of Sciences, Tokyo, Japan, pp. 99-106, 2007, IEEE Computer Society, 0-7695-2913-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Luiz M. R. Gadelha Jr., Bruno Schulze |
On the management of grid credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MGC ![In: Proceedings of the 5th International Workshop on Middleware for Grid Computing (MGC 2007), held at the ACM/IFIP/USENIX 8th International Middleware Conference, November 26-30, 2007, Newport Beach, Orange County, California, USA, pp. 10, 2007, ACM, 978-1-59593-944-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
credential management, grid computing, public key infrastructure, grid security |
12 | Song Y. Yan, Carsten Maple, Glyn James |
A New Scheme for Deniable/Repudiable Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASC ![In: Computer Algebra in Scientific Computing, 10th International Workshop, CASC 2007, Bonn, Germany, September 16-20, 2007, Proceedings, pp. 424-432, 2007, Springer, 978-3-540-75186-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Deniable/repudiable authentication, quadratic residuosity problem, intractability |
12 | Yueh-Min Huang, Hua-Yi Lin, Tzone-I Wang |
Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 21(6), pp. 997-1011, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
CBSRP, inter-cluster, cluster-based, CA (Certificate Authority), ad hoc network, PKI, ID-based |
12 | Himanshu Khurana, Hyung-Seok Hahm |
Certified mailing lists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 46-58, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
certified delivery, mailing lists |
12 | Les Green, Linas Maknavicius |
Secure Billing for Ubiquitous Service Delivery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICQT ![In: Performability Has its Price, 5th International Workshop on Internet Charging and QoS Technologies, ICQT 2006, St. Malo, France, June 27, 2006, Proceedings, pp. 90-101, 2006, Springer, 3-540-35456-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Security, Authentication, Billing, Ubiquity |
12 | Riaz Ahmed Shaikh 0001, Sungyoung Lee, Young Jae Song, Yonil Zhung |
Securing Distributed Wireless Sensor Networks: Issues and Guidelines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SUTC (2) ![In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), 5-7 June 2006, Taichung, Taiwan, pp. 226-231, 2006, IEEE Computer Society, 0-7695-2553-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Pandurang Kamat, Arati Baliga, Wade Trappe |
An identity-based security framework For VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Vehicular Ad Hoc Networks ![In: Proceedings of the Third International Workshop on Vehicular Ad Hoc Networks, VANET 2006, Los Angeles, CA, USA, September 29, 2007, pp. 94-95, 2006, ACM, 1-59593-540-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, privacy, vehicular networks |
12 | Ana Ferreira 0001, Ricardo João Cruz Correia, Luis Antunes 0002, Pedro Farinha, E. Oliveira-Palhares, David W. Chadwick, Altamiro da Costa Pereira |
How to Break Access Control in a Controlled Manner. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CBMS ![In: 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2006), 22-23 June 2006, Salt Lake City, Utah, USA, pp. 847-854, 2006, IEEE Computer Society, 978-0-7695-2517-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Alisher Kholmatov, Berrin A. Yanikoglu |
Biometric Cryptosystem Using Online Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2006, 21th International Symposium, Istanbul, Turkey, November 1-3, 2006, Proceedings, pp. 981-990, 2006, Springer, 3-540-47242-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Marko Hassinen, Konstantin Hyppönen, Keijo Haataja |
An Open, PKI-Based Mobile Payment System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETRICS ![In: Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings, pp. 86-100, 2006, Springer, 3-540-34640-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Erkut Sinan Ayla, Attila Ozgit |
An architecture for end-to-end and inter-domain trusted mail delivery service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCN ![In: Proceedings of the International Symposium on Computer Networks, ISCN 2006, June 16-18, 2006, Istanbul, Turkey, pp. 220-225, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang |
Anonymous Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 347-363, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang |
Restricted Universal Designated Verifier Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, Third International Conference, UIC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 874-882, 2006, Springer, 3-540-38091-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Yiliang Han, Xiaoyuan Yang 0002, Ping Wei 0005, Yuming Wang, Yupu Hu |
ECGSC: Elliptic Curve Based Generalized Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, Third International Conference, UIC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 956-965, 2006, Springer, 3-540-38091-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi |
A Survey of Secure B2C Commerce for Multicast Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada, pp. 288-293, 2006, IEEE, 1-4244-0038-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Milan Markovic |
On Secure e-Health Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedings, pp. 360-374, 2006, Springer, 3-540-49330-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
E-healthcare systems, Multilayered security systems, PKI systems, smart cards |
12 | Ru Zhang, Xiao-gang Yu, Linna Zhou, Hong-peng Li |
A New Watermarking Protocol of Copyright Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings, pp. 83-88, 2006, IEEE Computer Society, 0-7695-2745-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Yi-Hwa Chen, Jinn-ke Jan |
Enhancement of digital signature with message recovery using self-certified public keys and its variants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 39(3), pp. 90-96, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
self-certified public key, authenticated encryption, forward secrecy |
12 | Jihye Kim, Gene Tsudik |
SRDP: Securing Route Discovery in DSR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiQuitous ![In: 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 17-21 July 2005, San Diego, CA, USA, pp. 247-260, 2005, IEEE Computer Society, 0-7695-2375-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Chang N. Zhang, Chunren Lai, Honglan Zhong |
An Efficient Authentication Scheme with Fault Tolerance for Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITA (2) ![In: Third International Conference on Information Technology and Applications (ICITA 2005), 4-7 July 2005, Sydney, Australia, pp. 448-453, 2005, IEEE Computer Society, 0-7695-2316-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
fault tolerance, authentication, digital signature, error detection, error correction |
12 | Yonggen Gu, Yuxi Fu, Yang Li, Xiaoju Dong |
A Generic Model for Symbolic Analyzing Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Fifth International Conference on Computer and Information Technology (CIT 2005), 21-23 September 2005, Shanghai, China, pp. 680-684, 2005, IEEE Computer Society, 0-7695-2432-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Meng Wang, Zhijing Liu |
Identity Based Threshold Proxy Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Fifth International Conference on Computer and Information Technology (CIT 2005), 21-23 September 2005, Shanghai, China, pp. 695-701, 2005, IEEE Computer Society, 0-7695-2432-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Aleksandra Nenadic, Ning Zhang 0001, Qi Shi 0001, Carole A. Goble |
Certified E-Mail Delivery with DSA Receipts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), CD-ROM / Abstracts Proceedings, 4-8 April 2005, Denver, CO, USA, 2005, IEEE Computer Society, 0-7695-2312-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Anand Patwardhan, Jim Parker 0002, Anupam Joshi, Michaela Iorga, Tom Karygiannis |
Secure Routing and Intrusion Detection in Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 8-12 March 2005, Kauai Island, HI, USA, pp. 191-199, 2005, IEEE Computer Society, 0-7695-2299-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Ana Isabel González-Tablas Ferreres, L. M. Salas, Benjamín Ramos, Arturo Ribagorda |
Providing Personalization and Automation to Spatial-Temporal Stamping Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 22-26 August 2005, Copenhagen, Denmark, pp. 219-225, 2005, IEEE Computer Society, 0-7695-2424-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Jun Liu, Jianxin Liao, Xiaomin Zhu 0002 |
A System Model and Protocol for Mobile Payment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEBE ![In: 2005 IEEE International Conference on e-Business Engineering (ICEBE 2005), 18-21 October 2005, Beijing, China, pp. 638-641, 2005, IEEE Computer Society, 0-7695-2430-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Wolfgang Kubbilun, Sebastian Gajek, Michael Psarros, Jörg Schwenk |
Trustworthy Verification and Visualisation of Multiple XML-Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings, pp. 311-320, 2005, Springer, 3-540-28791-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Eckehard Hermann, Dieter Kessler |
XML Signatures in an Enterprise Service Bus Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings, pp. 339-347, 2005, Springer, 3-540-28791-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Cristian Marinescu, Nicolae Tapus |
Some Critical Aspects of the PKIX TSP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings, pp. 286-288, 2005, Springer, 3-540-28791-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
TSA, PKIX TSP, security, PKI, time-stamp |
12 | Angela S. L. Wong, Matthew Sorell, Robert Clarke |
Secure Mutual Distrust Transaction Tracking Using Cryptographic Elements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings, pp. 459-469, 2005, Springer, 3-540-28768-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Eun-Jun Yoon, Kee-Young Yoo |
Robust Authenticated Encryption Scheme with Message Linkages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (4) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part IV, pp. 281-288, 2005, Springer, 3-540-28897-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Message linkage, Cryptography, Signature, Authenticated encryption |
12 | Macià Mut Puigserver, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger |
Certified e-Mail Protocol with Verifiable Third Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EEE ![In: 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March - 1 April 2005, Hong Kong, China, pp. 548-551, 2005, IEEE Computer Society, 0-7695-2274-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Zuowen Tan, Zhuojun Liu, Mingsheng Wang |
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 374-385, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Min-Hua Shao, Jianying Zhou 0001, Guilin Wang |
On the Security of a Certified E-Mail Scheme with Temporal Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part III, pp. 701-710, 2005, Springer, 3-540-25862-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Zoran Duric |
IPS - Secure Internet Payment System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 425-430, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Xinhua Zhang, Chunyan Jiang, Wanjun Huang, Christoph Meinel |
A XML format secure protocol - OpenSST. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), January 3-6, 2005, Cairo, Egypt, pp. 89, 2005, IEEE Computer Society, 0-7803-8735-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Xixiang Lv, Bo Yang |
Broadcast Encryption Using Identity-Based Public-Key Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 1092-1097, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Changgen Peng, Xiang Li |
An Identity-Based Threshold Signcryption Scheme with Semantic Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 173-179, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Ernö Jeges, Zoltán Hornák, Csaba Körmöczi |
Encoding Private Key in Fingerprint. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 430-435, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Yonggen Gu, Yuxi Fu, Farong Zhong, Han Zhu |
A Generic Model for Analyzing Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 119-128, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Rodrigo Almeida dos Santos, Mario Fiallos Aguilar, Paulo Benicio Melo de Sousa, Joao C. Sousa, Rossana M. C. Andrade |
Anti-Doping: An Approach for Grid Integrity Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICT/SAPIR/ELETE ![In: Telecommunications 2005: Advanced Industrial Conference on Telecommunications / Service Assurance with Partial and Intermittent Resources Conference / E-Learning on Telecommunications Workshop (AICT / SAPIR / ELETE 2005), 17-22 July 2005, Lisbon, Portugal, pp. 2-7, 2005, IEEE Computer Society, 0-7695-2388-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | H. Abie, Demissie B. Aredo, T. Kristoffersen, Shahrzade Mazaher, T. Raguin |
Integrating a Security Requirement Language with UML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UML ![In: «UML» 2004 - The Unified Modelling Language: Modelling Languages and Applications. 7th International Conference, Lisbon, Portugal, October 11-15, 2004. Proceedings, pp. 350-364, 2004, Springer, 3-540-23307-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Mujtaba Khambatti, Partha Dasgupta, Kyung Dong Ryu |
A Role-Based Trust Model for Peer-to-Peer Communities and Dynamic Coalitions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA, pp. 141-154, 2004, IEEE Computer Society, 0-7695-2117-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Dynamic Coalitions, Communities, Peer-to-Peer, Trust |
12 | Ying-Hong Wang, Ching-Lin Wang, Cheng-Horng Liao |
Mobile Agent Protection and Verification in the Internet Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 2004 International Conference on Computer and Information Technology (CIT 2004), 14-16 September 2004, Wuhan, China, pp. 482-487, 2004, IEEE Computer Society, 0-7695-2216-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
AUthentication Mechanism, Verification Mechanism, Agent, Mobile Agent, Electronic Commerce |
12 | Inkyoung Jeun, Jongwook Park, TaeKyu Choi, Sang Wan Park, BaeHyo Park, ByungKwon Lee, YongSup Shin |
A Best Practice for Root CA Key Update in PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 278-291, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Grit Denker, Son Nguyen, Andrew Ton |
OWL-S Semantics of Security Web Services: a Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESWS ![In: The Semantic Web: Research and Applications, First European Semantic Web Symposium, ESWS 2004, Heraklion, Crete, Greece, May 10-12, 2004, Proceedings, pp. 240-253, 2004, Springer, 3-540-21999-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Qinghua Xiao, Lingdi Ping |
A general secure electronic auction protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (1) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 398-402, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah |
Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HSNMC ![In: High Speed Networks and Multimedia Communications, 7th IEEE International Conference, HSNMC 2004, Toulouse, France, June 30 - July 2, 2004, Proceedings, pp. 1056-1067, 2004, Springer, 3-540-22262-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Seung-Hyun Seo, Sang-Ho Lee |
A Secure and Flexible Multi-signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part IV, pp. 689-697, 2004, Springer, 3-540-22060-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Signcryption, multi-signature |
12 | Wei Wu, Ling Shen, Haitao Huo, Xiaojian Li |
Research on Secure Multicast Technology in Grid-Based Large-Scale Distributed Simulation Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC Workshops ![In: Grid and Cooperative Computing - GCC 2004 Workshops: GCC 2004 International Workshops, IGKG, SGT, GISS, AAC-GEVO, and VVS, Wuhan, China, October 21-24, 2004. Proceedings, pp. 538-545, 2004, Springer, 3-540-23578-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Jianhong Zhang, Qianhong Wu, Jilin Wang, Yumin Wang |
An Improved Nominative Proxy Signature Scheme for Mobile Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 23-26, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Zewen Chen, Jiwu Huang, Daren Huang, Jianhong Zhang, Yumin Wang |
Provably Secure and ID-Based Group Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 384-388, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Xin Lü, Dengguo Feng |
An Arbitrated Quantum Message Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational and Information Science, First International Symposium, CIS 2004, Shanghai, China, December 16-18, 2004, Proceedings, pp. 1054-1060, 2004, Springer, 3-540-24127-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Yan Wang 0002, Tieyan Li |
LITESET/A++: A New Agent-Assisted Secure Payment Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 6-9 July 2004, San Diego, CA, USA, pp. 244-251, 2004, IEEE Computer Society, 0-7695-2098-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Kihun Hong, Souhwan Jung |
An Efficient Authentication Scheme Using Recovery Information in Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 520-531, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Luke Hebbes, Andrew P. Lenaghan |
A Semi-fragile Steganographic Digital Signature for Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 200-210, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina |
Decidability Results for Parametric Probabilistic Transition Systems with an Application to Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEFM ![In: 2nd International Conference on Software Engineering and Formal Methods (SEFM 2004), 28-30 September 2004, Beijing, China, pp. 114-121, 2004, IEEE Computer Society, 0-7695-2222-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Thomas Newe, Tom Coffey |
Security protocols for 2G and 3G wireless communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISICT ![In: Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, Dublin, Ireland, September 24-26, 2003, pp. 335-340, 2003, Trinity College Dublin. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
2G, radio-link, security, mobile, 3G, end-to-end |
12 | Wenbo Mao |
Deniable Authenticated Key Establishment for Internet Protocols (Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 272-273, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Seung-Hyun Seo, Sang-Ho Lee |
A Secure Mobile Agent System Using Multi-signature Scheme in Electronic Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Human.Society@Internet 2003 ![In: Web Communication Technologies and Internet-Related Social Issues - HSI 2003, Second International Conference on Human Society@Internet, Seoul, Korea, June 18-20, 2003, Proceedings, pp. 527-536, 2003, Springer, 3-540-40456-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Multi-signature scheme, Mobile agent system |
12 | Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng |
Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings, pp. 96-110, 2003, Springer, 3-540-20176-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Ueli M. Maurer |
Intrinsic Limitations of Digital Signatures and How to Cope with Them. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings, pp. 180-192, 2003, Springer, 3-540-20176-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #301 - #400 of 435 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ >>] |
|