|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 398 occurrences of 211 keywords
|
|
|
Results
Found 435 publication records. Showing 435 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
12 | Jianying Zhou 0001 |
Efficient Signature Validation Based on a New PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies, 4th International Conference, EC-Web, Prague, Czech Republic, September 2-5, 2003, Proceedings, pp. 94-103, 2003, Springer, 3-540-40808-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Sung-Min Lee, O-Sik Kwon, Jae-Ho Lee, Chan-Joo Oh, Sung Hoon Ko |
TY*SecureWS: An Integrated Web Service Security Solution Based on Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies, 4th International Conference, EC-Web, Prague, Czech Republic, September 2-5, 2003, Proceedings, pp. 186-195, 2003, Springer, 3-540-40808-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Lein Harn, Wen-Jung Hsin |
On the security of wireless network access with enhancements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2003 ACM Workshop on Wireless Security, San Diego, CA, USA, September 19, 2003, pp. 88-95, 2003, ACM, 1-58113-769-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
3G mobile network security and authentication, security |
12 | Shing-Chi Cheung, Dickson K. W. Chiu |
A Watermarking Infrastructure for Enterprise Document Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 36th Hawaii International Conference on System Sciences (HICSS-36 2003), CD-ROM / Abstracts Proceedings, January 6-9, 2003, Big Island, HI, USA, pp. 105, 2003, IEEE Computer Society, 0-7695-1874-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
document distribution protocols, document management policies, copy deterrence, enterprise registration authority, registration certificate, copyright protection, digital rights management |
12 | John Malone-Lee, Wenbo Mao |
Two Birds One Stone: Signcryption Using RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 211-225, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Xavier Boyen |
Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, pp. 383-399, 2003, Springer, 3-540-40674-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Anwitaman Datta, Manfred Hauswirth, Karl Aberer |
Beyond "web of trust": Enabling P2P E-commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 24-27 June 2003, Newport Beach, CA, USA, pp. 303-312, 2003, IEEE Computer Society, 0-7695-1969-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Mohamed Al-Ibrahim |
A Signcryption Scheme Based on Secret Sharing Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings, pp. 279-288, 2003, Springer, 3-540-40797-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina |
Weak Bisimulation for Probabilistic Timed Automata and Applications to Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEFM ![In: 1st International Conference on Software Engineering and Formal Methods (SEFM 2003), 22-27 September 2003, Brisbane, Australia, pp. 34-43, 2003, IEEE Computer Society, 0-7695-1949-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Giampaolo Bella, Lawrence C. Paulson |
Analyzing Delegation Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers, pp. 120-127, 2002, Springer, 3-540-20830-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Alain Pannetrat, Refik Molva |
Authenticating real time packet streams and multicasts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 1-4 July 2002, Taormina, Italy, pp. 490-495, 2002, IEEE Computer Society, 0-7695-1671-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Goichiro Hanaoka, Junji Shikata, Yuliang Zheng 0001, Hideki Imai |
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002, Proceedings, pp. 64-79, 2002, Springer, 3-540-43168-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
12 | José R. M. Monteiro, Ricardo Dahab |
An Attack on a Protocol for Certified Delivery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings, pp. 428-436, 2002, Springer, 3-540-44270-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Kasun De Zoysa, Sead Muftic |
Bi-directional Web Document Protection System for Serious E-commerce Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 20-23 August 2002, Vancouver, BC, Canada, pp. 11-16, 2002, IEEE Computer Society, 0-7695-1680-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Ravi Mukkamala |
QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI). ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002, pp. 108-121, 2002, Springer, 3-540-00263-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Sastry Duri, Marco Gruteser, Xuan Liu, Paul Moskowitz, Ronald Perez, Moninder Singh, Jung-Mu Tang |
Framework for security and privacy in automotive telematics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop Mobile Commerce ![In: Proceedings of the 2nd International Workshop on Mobile Commerce, Atlanta, Georgia, USA, September 28, 2002, pp. 25-32, 2002, ACM, 1-58113-600-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
automotive telematics, security, privacy, privacy policies |
12 | Keesook J. Han, Ahmed H. Tewfik |
Scalable cryptographic scheme for networked multimedia applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (3) ![In: Proceedings of the 2001 International Conference on Image Processing, ICIP 2001, Thessaloniki, Greece, October 7-10, 2001, pp. 987-990, 2001, IEEE, 0-7803-6725-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Larry Korba |
Towards Distributed Privacy for CSCW. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the Sixth International Conference on Computer Supported Cooperative Work in Design, CSCWD 2001, July 12-14, 2001, London, Ontario, Canada, pp. 95-101, 2001, IEEE, 0660184931. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Yuji Watanabe, Goichiro Hanaoka, Hideki Imai |
Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings, pp. 392-407, 2001, Springer, 3-540-41898-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Yifa Li |
A New Semantics of Authentication Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001, pp. 476-482, 2001, Springer, 3-540-42880-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Bruno Crispo, Giancarlo Ruffo |
Reasoning about Accountability within Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001, pp. 251-260, 2001, Springer, 3-540-42880-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Shunge Li, Armin Kittel, Debin Jia, Guozhong Zhuang |
Security considerations for workflow systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: The Networked Planet: Management Beyond 2000, 7th IEEE/IFIP Network Operations and Management Symposium, NOMS 2000, Honolulu, HI, USA, April 10-14, 2000. Proceedings, pp. 655-668, 2000, IEEE, 0-7803-5928-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Kamel Adi, Mourad Debbabi, Mohamed Mejri |
A New Logic for Electronic Commerce Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMAST ![In: Algebraic Methodology and Software Technology. 8th International Conference, AMAST 2000, Iowa City, Iowa, USA, May 20-27, 2000, Proceedings, pp. 499-513, 2000, Springer, 3-540-67530-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Ferdinand J. Dafelmair |
Improvements in Process Control Dependability through Internet Security Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability and Security, 19th International Conference, SAFECOMP 2000, Rotterdam, The Netherlands, October 24-27, 2000, Proceedings, pp. 321-332, 2000, Springer, 3-540-41186-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Victoria Ungureanu, Naftaly H. Minsky |
Establishing Business Rules for Inter-Enterprise Electronic Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 14th International Conference, DISC 2000, Toledo, Spain, October 4-6, 2000, Proceedings, pp. 179-193, 2000, Springer, 3-540-41143-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Goichiro Hanaoka, Junji Shikata, Yuliang Zheng 0001, Hideki Imai |
Unconditionally Secure Digital Signature Schemes Admitting Transferability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 130-142, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Brian D. Noble, Ben Fleis, Landon P. Cox |
Deferring trust in fluid replication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS European Workshop ![In: Proceedings of the 9th ACM SIGOPS European Workshop, Kolding, Denmark, September 17-20, 2000, pp. 79-84, 2000, ACM. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song |
Efficient Authentication and Signing of Multicast Streams over Lossy Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000, pp. 56-73, 2000, IEEE Computer Society, 0-7695-0665-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Multicast Stream Authentication and Signature |
12 | Petra Wohlmacher, Peter Pharow |
Applications in Health Care using Public-Key Certificates and Attribute Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 128-137, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures |
12 | Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 |
Encrypted Message Authentication by Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 69-81, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption |
12 | Sufatrio, Kwok-Yan Lam |
Mobile IP Registration Protocol: A Security Attack and New Secure Minimal Public-Key Based Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPAN ![In: 1999 International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN '99), 23-25 June 1999, Fremantle, Australia, pp. 364-369, 1999, IEEE Computer Society, 0-7695-0231-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
12 | Chenxi Wang, William A. Wulf |
Towards a Scalable PKI for Electronic Commerce Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WECWIS ![In: Proceedings of the First International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems, Santa Clara, California, USA, April 8-9, 1999, pp. 132-136, 1999, IEEE Computer Society, 0-7695-0334-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
12 | Torben P. Pedersen |
Signing Contracts and Paying Electronically. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Lectures on Data Security ![In: Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998, pp. 134-157, 1998, Springer, 3-540-65757-6. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
12 | Winfried Lamersdorf, Michael Merz, M. Tuan Tu |
Distributed Systems Technology for Electronic Commerce Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOFSEM ![In: SOFSEM '98: Theory and Practice of Informatics, 25th Conference on Current Trends in Theory and Practice of Informatics, Jasná, Slovakia, November 21-27, 1998, Proceedings, pp. 135-148, 1998, Springer, 3-540-65260-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Service Trading/Brokerage, Distributed Systems, Middleware, Electronic Commerce, Workflow Management, Electronic Contracting |
12 | Wenbo Mao |
On two Proposals for On-line Bankcard Payments using Open Networks: Problems and Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1996 IEEE Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, USA, pp. 201-210, 1996, IEEE Computer Society, 0-8186-7417-2. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #435 of 435 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5] |
|