The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase non-repudiation (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-1998 (18) 1999-2000 (32) 2001-2002 (37) 2003 (29) 2004 (36) 2005 (48) 2006 (29) 2007 (48) 2008 (36) 2009 (31) 2010 (17) 2011-2013 (23) 2014-2016 (15) 2017-2018 (15) 2019-2023 (20) 2024 (1)
Publication types (Num. hits)
article(94) book(1) incollection(2) inproceedings(335) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 398 occurrences of 211 keywords

Results
Found 435 publication records. Showing 435 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
12Jianying Zhou 0001 Efficient Signature Validation Based on a New PKI. Search on Bibsonomy EC-Web The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Sung-Min Lee, O-Sik Kwon, Jae-Ho Lee, Chan-Joo Oh, Sung Hoon Ko TY*SecureWS: An Integrated Web Service Security Solution Based on Java. Search on Bibsonomy EC-Web The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Lein Harn, Wen-Jung Hsin On the security of wireless network access with enhancements. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF 3G mobile network security and authentication, security
12Shing-Chi Cheung, Dickson K. W. Chiu A Watermarking Infrastructure for Enterprise Document Management. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF document distribution protocols, document management policies, copy deterrence, enterprise registration authority, registration certificate, copyright protection, digital rights management
12John Malone-Lee, Wenbo Mao Two Birds One Stone: Signcryption Using RSA. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Xavier Boyen Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography). Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Anwitaman Datta, Manfred Hauswirth, Karl Aberer Beyond "web of trust": Enabling P2P E-commerce. Search on Bibsonomy CEC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Mohamed Al-Ibrahim A Signcryption Scheme Based on Secret Sharing Technique. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina Weak Bisimulation for Probabilistic Timed Automata and Applications to Security. Search on Bibsonomy SEFM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Giampaolo Bella, Lawrence C. Paulson Analyzing Delegation Properties. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Alain Pannetrat, Refik Molva Authenticating real time packet streams and multicasts. Search on Bibsonomy ISCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Goichiro Hanaoka, Junji Shikata, Yuliang Zheng 0001, Hideki Imai Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12José R. M. Monteiro, Ricardo Dahab An Attack on a Protocol for Certified Delivery. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Kasun De Zoysa, Sead Muftic Bi-directional Web Document Protection System for Serious E-commerce Applications. Search on Bibsonomy ICPP Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Ravi Mukkamala QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI). Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Sastry Duri, Marco Gruteser, Xuan Liu, Paul Moskowitz, Ronald Perez, Moninder Singh, Jung-Mu Tang Framework for security and privacy in automotive telematics. Search on Bibsonomy Workshop Mobile Commerce The full citation details ... 2002 DBLP  DOI  BibTeX  RDF automotive telematics, security, privacy, privacy policies
12Keesook J. Han, Ahmed H. Tewfik Scalable cryptographic scheme for networked multimedia applications. Search on Bibsonomy ICIP (3) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Larry Korba Towards Distributed Privacy for CSCW. Search on Bibsonomy CSCWD The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Yuji Watanabe, Goichiro Hanaoka, Hideki Imai Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Yifa Li A New Semantics of Authentication Logic. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Bruno Crispo, Giancarlo Ruffo Reasoning about Accountability within Delegation. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Shunge Li, Armin Kittel, Debin Jia, Guozhong Zhuang Security considerations for workflow systems. Search on Bibsonomy NOMS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Kamel Adi, Mourad Debbabi, Mohamed Mejri A New Logic for Electronic Commerce Protocols. Search on Bibsonomy AMAST The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Ferdinand J. Dafelmair Improvements in Process Control Dependability through Internet Security Technology. Search on Bibsonomy SAFECOMP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Victoria Ungureanu, Naftaly H. Minsky Establishing Business Rules for Inter-Enterprise Electronic Commerce. Search on Bibsonomy DISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Goichiro Hanaoka, Junji Shikata, Yuliang Zheng 0001, Hideki Imai Unconditionally Secure Digital Signature Schemes Admitting Transferability. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Brian D. Noble, Ben Fleis, Landon P. Cox Deferring trust in fluid replication. Search on Bibsonomy ACM SIGOPS European Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song Efficient Authentication and Signing of Multicast Streams over Lossy Channels. Search on Bibsonomy S&P The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Multicast Stream Authentication and Signature
12Petra Wohlmacher, Peter Pharow Applications in Health Care using Public-Key Certificates and Attribute Certificates. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures
12Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 Encrypted Message Authentication by Firewalls. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption
12Sufatrio, Kwok-Yan Lam Mobile IP Registration Protocol: A Security Attack and New Secure Minimal Public-Key Based Authentication. Search on Bibsonomy ISPAN The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
12Chenxi Wang, William A. Wulf Towards a Scalable PKI for Electronic Commerce Systems. Search on Bibsonomy WECWIS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
12Torben P. Pedersen Signing Contracts and Paying Electronically. Search on Bibsonomy Lectures on Data Security The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
12Winfried Lamersdorf, Michael Merz, M. Tuan Tu Distributed Systems Technology for Electronic Commerce Applications. Search on Bibsonomy SOFSEM The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Service Trading/Brokerage, Distributed Systems, Middleware, Electronic Commerce, Workflow Management, Electronic Contracting
12Wenbo Mao On two Proposals for On-line Bankcard Payments using Open Networks: Problems and Solutions. Search on Bibsonomy S&P The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #435 of 435 (100 per page; Change: )
Pages: [<<][1][2][3][4][5]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license