|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 398 occurrences of 211 keywords
|
|
|
Results
Found 435 publication records. Showing 435 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
12 | Jianying Zhou 0001 |
Efficient Signature Validation Based on a New PKI. |
EC-Web |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Sung-Min Lee, O-Sik Kwon, Jae-Ho Lee, Chan-Joo Oh, Sung Hoon Ko |
TY*SecureWS: An Integrated Web Service Security Solution Based on Java. |
EC-Web |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Lein Harn, Wen-Jung Hsin |
On the security of wireless network access with enhancements. |
Workshop on Wireless Security |
2003 |
DBLP DOI BibTeX RDF |
3G mobile network security and authentication, security |
12 | Shing-Chi Cheung, Dickson K. W. Chiu |
A Watermarking Infrastructure for Enterprise Document Management. |
HICSS |
2003 |
DBLP DOI BibTeX RDF |
document distribution protocols, document management policies, copy deterrence, enterprise registration authority, registration certificate, copyright protection, digital rights management |
12 | John Malone-Lee, Wenbo Mao |
Two Birds One Stone: Signcryption Using RSA. |
CT-RSA |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Xavier Boyen |
Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography). |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Anwitaman Datta, Manfred Hauswirth, Karl Aberer |
Beyond "web of trust": Enabling P2P E-commerce. |
CEC |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Mohamed Al-Ibrahim |
A Signcryption Scheme Based on Secret Sharing Technique. |
MMM-ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina |
Weak Bisimulation for Probabilistic Timed Automata and Applications to Security. |
SEFM |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Giampaolo Bella, Lawrence C. Paulson |
Analyzing Delegation Properties. |
Security Protocols Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Alain Pannetrat, Refik Molva |
Authenticating real time packet streams and multicasts. |
ISCC |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Goichiro Hanaoka, Junji Shikata, Yuliang Zheng 0001, Hideki Imai |
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
12 | José R. M. Monteiro, Ricardo Dahab |
An Attack on a Protocol for Certified Delivery. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Kasun De Zoysa, Sead Muftic |
Bi-directional Web Document Protection System for Serious E-commerce Applications. |
ICPP Workshops |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Ravi Mukkamala |
QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI). |
INDOCRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Sastry Duri, Marco Gruteser, Xuan Liu, Paul Moskowitz, Ronald Perez, Moninder Singh, Jung-Mu Tang |
Framework for security and privacy in automotive telematics. |
Workshop Mobile Commerce |
2002 |
DBLP DOI BibTeX RDF |
automotive telematics, security, privacy, privacy policies |
12 | Keesook J. Han, Ahmed H. Tewfik |
Scalable cryptographic scheme for networked multimedia applications. |
ICIP (3) |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Larry Korba |
Towards Distributed Privacy for CSCW. |
CSCWD |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Yuji Watanabe, Goichiro Hanaoka, Hideki Imai |
Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Yifa Li |
A New Semantics of Authentication Logic. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Bruno Crispo, Giancarlo Ruffo |
Reasoning about Accountability within Delegation. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Shunge Li, Armin Kittel, Debin Jia, Guozhong Zhuang |
Security considerations for workflow systems. |
NOMS |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Kamel Adi, Mourad Debbabi, Mohamed Mejri |
A New Logic for Electronic Commerce Protocols. |
AMAST |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Ferdinand J. Dafelmair |
Improvements in Process Control Dependability through Internet Security Technology. |
SAFECOMP |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Victoria Ungureanu, Naftaly H. Minsky |
Establishing Business Rules for Inter-Enterprise Electronic Commerce. |
DISC |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Goichiro Hanaoka, Junji Shikata, Yuliang Zheng 0001, Hideki Imai |
Unconditionally Secure Digital Signature Schemes Admitting Transferability. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Brian D. Noble, Ben Fleis, Landon P. Cox |
Deferring trust in fluid replication. |
ACM SIGOPS European Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song |
Efficient Authentication and Signing of Multicast Streams over Lossy Channels. |
S&P |
2000 |
DBLP DOI BibTeX RDF |
Multicast Stream Authentication and Signature |
12 | Petra Wohlmacher, Peter Pharow |
Applications in Health Care using Public-Key Certificates and Attribute Certificates. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures |
12 | Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 |
Encrypted Message Authentication by Firewalls. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption |
12 | Sufatrio, Kwok-Yan Lam |
Mobile IP Registration Protocol: A Security Attack and New Secure Minimal Public-Key Based Authentication. |
ISPAN |
1999 |
DBLP DOI BibTeX RDF |
|
12 | Chenxi Wang, William A. Wulf |
Towards a Scalable PKI for Electronic Commerce Systems. |
WECWIS |
1999 |
DBLP DOI BibTeX RDF |
|
12 | Torben P. Pedersen |
Signing Contracts and Paying Electronically. |
Lectures on Data Security |
1998 |
DBLP DOI BibTeX RDF |
|
12 | Winfried Lamersdorf, Michael Merz, M. Tuan Tu |
Distributed Systems Technology for Electronic Commerce Applications. |
SOFSEM |
1998 |
DBLP DOI BibTeX RDF |
Service Trading/Brokerage, Distributed Systems, Middleware, Electronic Commerce, Workflow Management, Electronic Contracting |
12 | Wenbo Mao |
On two Proposals for On-line Bankcard Payments using Open Networks: Problems and Solutions. |
S&P |
1996 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #435 of 435 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5] |
|