Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Feng Hao 0001, Peter Y. A. Ryan |
J-PAKE: Authenticated Key Exchange without PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Comput. Sci. ![In: Transactions on Computational Science XI - Special Issue on Security in Computing, Part II, pp. 192-206, 2010, Springer, 978-3-642-17696-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Feng Hao 0001, Peter Y. A. Ryan |
J-PAKE: Authenticated Key Exchange Without PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 190, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
17 | Gabriel López Millán, Manuel Gil Pérez, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta |
PKI-based trust management in inter-domain scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 29(2), pp. 278-290, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Massimiliano Pala, Sean W. Smith |
Finding the PKI needles in the Internet haystack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 18(3), pp. 397-420, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Ryu Watanabe, Yuto Nakano, Toshiaki Tanaka |
Single Sign-on Techniques with PKI-based Authentication for Mobile Phones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the 2010 International Conference on Security & Management, SAM 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes, pp. 152-156, 2010, CSREA Press, 1-60132-163-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
17 | Dan Kaminsky, Meredith L. Patterson, Len Sassaman |
PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 14th International Conference, FC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers, pp. 289-303, 2010, Springer, 978-3-642-14576-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Massimiliano Pala, Sara Sinclair, Sean W. Smith |
PorKI: Portable PKI Credentials via Proxy Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers, pp. 1-16, 2010, Springer, 978-3-642-22632-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Walter J. Scheirer, William Bishop, Terrance E. Boult |
Beyond PKI: The Biocryptographic Key Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WIFS ![In: 2010 IEEE International Workshop on Information Forensics and Security, WIFS 2010, Seattle, WA, USA, December 12-15, 2010, pp. 1-6, 2010, IEEE, 978-1-4244-9078-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Joo-Kwan Lee, Moon-Seog Jun |
Security Protocol Design for Electronic-Cash Transactions in a Mobile-PKI Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 9th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2010, 18-20 August 2010, Yamagata, Japan, pp. 887-891, 2010, IEEE Computer Society, 978-0-7695-4147-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Agapios N. Platis, Vasilis P. Koutras |
Software rejuvenation on a PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WoSAR@ISSRE ![In: Second IEEE International Workshop on Software Aging and Rejuvenation, WoSAR@ISSRE 2010, San Jose, CA, USA, November 2, 2010, pp. 1-6, 2010, IEEE Computer Society, 978-1-61284-344-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Suresh Kumar, Rakesh K. Prajapati, Manjeet Singh, Asok De |
Security enforcement using PKI in Semantic Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIM ![In: 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM, Krakow, Poland, October 8-10, 2010, pp. 392-397, 2010, IEEE, 978-1-4244-7817-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Wenliang Bian, Xuyun Nie |
Unattended Home Delivery System based on PKI Trust Model in Urban Areas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISO ![In: ICISO 2010 - Proceedings of the Twelfth International Conference on Informatics and Semiotics in Organisations, Reading, UK, July 19-21, 2010, pp. 3-8, 2010, SciTePress, 978-989-8425-26-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
17 | Rishab Nithyanand, Gene Tsudik, Ersin Uzun |
Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 19-36, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Nasir Mahmood Malik, Tehmina Khalil, Samina Khalid, Faisal Munir Malik |
PKI Implementation Issues: A Comparative Study of Pakistan with some Asian Countries ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0912.2306, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
17 | |
Optimized Public Key Infrastructure - A PKI to Support Efficient Document's Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 121, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
17 | Rishab Nithyanand, Gene Tsudik, Ersin Uzun |
Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 465, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
17 | Massimiliano Pala, Shreyas Cholia, Scott A. Rea, Sean W. Smith |
Interoperable PKI Data Distribution in Computational Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Grid High Perform. Comput. ![In: Int. J. Grid High Perform. Comput. 1(2), pp. 56-73, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Diana Berbecaru, Amarkumar Desai, Antonio Lioy |
A unified and flexible solution for integrating CRL and OCSP into PKI applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Pract. Exp. ![In: Softw. Pract. Exp. 39(10), pp. 891-921, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | José M. Alcaraz Calero, Gabriel López Millán, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta |
Towards the homogeneous access and use of PKI solutions: Design and implementation of a WS-XKMS server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Archit. ![In: J. Syst. Archit. 55(4), pp. 289-297, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Christian Schanes, Andreas Mauczka, Uwe Kirchengast, Thomas Grechenig, Sven Marx |
Nationwide PKI Testing - Ensuring Interoperability of OCSP Server and Client Implementations Early during Component Tests. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructures, Services and Applications - 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers, pp. 114-129, 2009, Springer, 978-3-642-16440-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Chris Masone, Sean W. Smith |
ABUSE: PKI for Real-World Email Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructures, Services and Applications - 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers, pp. 146-162, 2009, Springer, 978-3-642-16440-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Wiem Rekik, Maher Khemakhem, Abdelfettah Belghith, Jacques Fayolle |
PKI and UDDI based trust centre: An attempt to improve web service security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, ICITST 2009, London, UK, November 9-12, 2009, pp. 1-4, 2009, IEEE, 978-1-4244-5648-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Toshiyuki Kataoka, Takeshi Nishimura, Masaki Shimaoka, Kazutsuna Yamaji, Motonori Nakamura, Noboru Sonehara, Yasuo Okabe |
Leveraging PKI in SAML 2.0 Federation for Enhanced Discovery Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: Ninth Annual International Symposium on Applications and the Internet, SAINT 2009, Bellevue, Washington, USA, July 20-24, 2009, Proceedings, pp. 239-242, 2009, IEEE Computer Society, 978-0-7695-3700-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Yue-Hsun Lin, Ahren Studer, Hsu-Chun Hsiao, Jonathan M. McCune, King-Hang Wang, Maxwell N. Krohn, Phen-Lan Lin, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang |
SPATE: small-group PKI-less authenticated trust establishment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services (MobiSys 2009), Kraków, Poland, June 22-25, 2009, pp. 1-14, 2009, ACM, 978-1-60558-566-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
group protocol, security, implementation, key exchange |
17 | Xiaoqi Zhang, Meina Song, Junde Song |
A Solution of Electronic Authentication Services Based on PKI for Enabling e-Business. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEBE ![In: 2009 IEEE International Conference on e-Business Engineering, ICEBE 2009, Macau, China, 21-23 October 2009, pp. 431-436, 2009, IEEE Computer Society, 978-0-7695-3842-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Jean Everson Martina, Túlio Cicero Salvaro de Souza, Ricardo Felipe Custódio |
Ceremonies Formal Analysis in PKI's Context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 392-398, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Phil D'Angio, Panos Vassilliadas, Phaidon Kaklamanis |
PKI - Crawling Out of the Grave & Into the Arms of Government. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSE ![In: ISSE 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009, pp. 108-115, 2009, Vieweg+Teubner, 978-3-8348-0958-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | François Lesueur, Ludovic Mé, Valérie Viet Triem Tong |
An Efficient Distributed PKI for Structured P2P Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer-to-Peer Computing ![In: Proceedings P2P 2009, Ninth International Conference on Peer-to-Peer Computing, 9-11 September 2009, Seattle, Washington, USA, pp. 1-10, 2009, IEEE, 978-1-4244-5066-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Sudip Misra, Sumit Goswami, Gyan Prakash Pathak, Nirav Shah 0002, Isaac Woungang |
Dividing PKI in strongest availability zones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: The 7th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2009, Rabat, Morocco, May 10-13, 2009, pp. 963-969, 2009, IEEE Computer Society, 978-1-4244-3807-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Ali Nasrat Haidar, Ali E. Abdallah |
Formal Modelling of PKI Based Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWV ![In: Proceedings of the 4th International Workshop on Automated Specification and Verification of Web Systems, WWV 2008, Siena, Italy, July 4, 2008, pp. 55-70, 2008, Elsevier. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Chung-Ming Ou, Chung-Ren Ou |
Non-repudiation Mechanism of Agent-based Mobile Payment Systems: Perspectives on Wireless PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Univers. Comput. Sci. ![In: J. Univers. Comput. Sci. 14(14), pp. 2309-2328, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | David Ahmad |
Two Years of Broken Crypto: Debian's Dress Rehearsal for a Global PKI Compromise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 6(5), pp. 70-73, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Sang Seok Lim, Jong Hyuk Choi, Kurt D. Zeilenga |
Design, implementation, and performance analysis of PKI certificate repository using LDAP Component Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Pract. Exp. ![In: Softw. Pract. Exp. 38(8), pp. 827-851, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Zhiqian Xu 0001, Hai Jiang 0003 |
A Framework of Decentralized PKI Key Management Based on Dynamic Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the 2008 International Conference on Security & Management, SAM 2008, Las Vegas, Nevada, USA, July 14-17, 2008, pp. 258-264, 2008, CSREA Press, 1-60132-085-X. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
17 | Sufatrio, Roland H. C. Yap |
Extending BAN Logic for Reasoning with Modern PKI-Based Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC Workshops ![In: IFIP International Conference on Network and Parallel Computing, NPC 2008, Shanghai, China, October 18-21, 2008, Workshop Proceedings, pp. 190-197, 2008, IEEE Computer Society, 978-0-7695-3354-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication logic, security protocol, Public-Key Infrastructure |
17 | Stig Fr. Mjølsnes, Sjouke Mauw, Sokratis K. Katsikas (eds.) |
Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![Springer, 978-3-540-69484-7 The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Hwajung Lee |
PKI Vulnerability and x-Cryptography in Grid Computing Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCNCS ![In: International Conference on High Performance Computing, Networking and Communication Systems, HPCNCS-08, Orlando, Florida, USA, July 7-10, 2008, pp. 201-205, 2008, ISRST, 978-1-60651-004-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
17 | Bhargav Bellur |
Certificate Assignment Strategies for a PKI-Based Security Architecture in a Vehicular Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November - 4 December 2008, pp. 1836-1841, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Ahmad Samer Wazan, Romain Laborde, François Barrère, Abdelmalek Benzekri |
Authentication in Virtual Organizations: A Reputation Based PKI Interconnection Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SVM ![In: Systems and Virtualization Management. Standards and New Technologies - Second International Workshop, SVM 2008, Munich, Germany, October, 21-22, 2008 Proceedings, pp. 84-95, 2008, 978-3-540-88707-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Wei Ren 0002, Kui Ren 0001, Wenjing Lou, Yanchao Zhang |
Efficient user revocation for privacy-aware PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QSHINE ![In: 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QSHINE 2008, Hong Kong, July 28-31, 2008, pp. 11, 2008, ICST, 978-963-9799-26-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Sibylle Hick, Luigi Lo Iacono |
Elliptic Curve Cryptography in x.509-based PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sicherheit ![In: Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 2.-4. April 2008 im Saarbrücker Schloss., pp. 137-147, 2008, GI, 978-3-88579-222-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
17 | Bart De Decker, Mohamed Layouni, Hans Vangheluwe, Kristof Verslype |
A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 118-133, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
electronic healthcare, privacy, anonymous credentials |
17 | Konstantin Hyppönen |
An Open Mobile Identity Tool: An Architecture for Mobile Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 207-222, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Basel Alomair, Krishna Sampigethaya, Radha Poovendran |
Efficient Generic Forward-Secure Signatures and Proxy Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 166-181, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
efficiency, Digital signatures, proxy, forward-security |
17 | Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa |
An Efficient Strong Key-Insulated Signature Scheme and Its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 150-165, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
strong key-insulated signature, key leakage, DL assumption, random oracle model, adaptive security |
17 | Ricardo Felipe Custódio, Martín A. Gagliotti Vigil, Juliano Romani, Fernando Carlos Pereira, Joni da Silva Fraga |
Optimized Certificates - A New Proposal for Efficient Electronic Document Signature Validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 49-59, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi |
An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 60-73, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
standard model, identity-based cryptography, identification scheme |
17 | Billy Bob Brumley, Kimmo U. Järvinen |
Fast Point Decompression for Standard Elliptic Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 134-149, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
square roots modulo p, elliptic curve cryptography, exponentiation, addition chains |
17 | Chong Hee Kim, Philippe Bulens, Christophe Petit 0001, Jean-Jacques Quisquater |
Fault Attacks on Public Key Elements: Application to DLP-Based Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 182-195, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Smart cards, fault injection, faults attacks, DSA, ElGamal, side channel |
17 | Manuel Sánchez, Óscar Cánovas Reverte, Gabriel López 0001, Antonio Fernandez Gómez-Skarmeta |
Levels of Assurance and Reauthentication in Federated Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 89-103, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
reauthentication, LoA, eduGAIN, authorization, federation, SSO |
17 | Alex Golod |
PKI Registration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Security Management Handbook, 6th ed. ![In: Information security management handbook, Sixth Edition., pp. 1183-1195, 2007, Auerbach Publ./CRC Press, 978-0-8493-7495-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Cristina Satizábal, Rafael Páez, Jordi Forné |
WAP PKI and certification path validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Internet Protoc. Technol. ![In: Int. J. Internet Protoc. Technol. 2(2), pp. 88-95, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Yong Lee 0001, Jaeil Lee, JooSeok Song |
Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 30(4), pp. 893-903, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Benjamin Aziz, Geoff W. Hamilton |
Modelling and Analysis of PKI-Based Systems Using Process Calculi. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Found. Comput. Sci. ![In: Int. J. Found. Comput. Sci. 18(3), pp. 593-618, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Brian Korver |
The Internet IP Security PKI Profile of IKEv1/ISAKMP, IKEv2, and PKIX. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4945, pp. 1-43, August 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Dakshi Agrawal, Charanjit S. Jutla |
Utility Sampling for Trust Metrics in PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 178, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
17 | Georgios Kambourakis, Denise-Penelope N. Kontoni, Angelos N. Rouskas, Stefanos Gritzalis |
A PKI approach for deploying modern secure distributed e-learning and m-learning environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Educ. ![In: Comput. Educ. 48(1), pp. 1-16, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Javier López 0001, Pierangela Samarati, Josep L. Ferrer (eds.) |
Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![Springer, 978-3-540-73407-9 The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Srijith Krishnan Nair, Muhammad Torabi Dashti, Bruno Crispo, Andrew S. Tanenbaum |
A Hybrid PKI-IBC Based Ephemerizer System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, pp. 241-252, 2007, Springer, 978-0-387-72366-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Katsuya Tanaka, Mayumi Yoshida, Ryuichi Yamamoto |
Secure Remote Access for Web Based Clinical Information System Using Policy Control of PCs Healthcare PKI Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MedInfo ![In: MEDINFO 2007 - Proceedings of the 12th World Congress on Health (Medical) Informatics - Building Sustainable Health Systems, 20-24 August, 2007, Brisbane, Australia, pp. 1480, 2007, IOS Press, 978-1-58603-774-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Vesselin Tzvetkov |
Decentralization of the Current PKI Infrastructure without Losing Backward Compatibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 4th IEEE Consumer Communications and Networking Conference, CCNC 2007, Las Vegas, NV, USA, January 11-13, 2007, pp. 691-695, 2007, IEEE, 1-4244-0667-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Xiaosu Chen, Dali Zhu, Jian Liu |
A Practical Digital Watermarking Protocol Based On PKI-CA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (1) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 483-488, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Zhiwei Gao 0001, Ping Luo, Zhimin Gu, Hongjun Liu |
A New and Scalable Certification Path Discovery Model in the Emerging Global PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 26-28 April 2007, Seoul, Korea, pp. 372-380, 2007, IEEE Computer Society, 978-0-7695-2777-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Chuanjun Wang, Xiamu Niu, Yong Zhang 0023 |
Anonymity in PKI Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), Kaohsiung, Taiwan, 26-28 November 2007, Proceedings, pp. 570-576, 2007, IEEE Computer Society, 978-0-7695-2994-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Jin-Bao Liu, Xian-Qing Hu, Qiong Li, Xiamu Niu |
Design and Implementation of a PKI-Based Electronic Documents Protection Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), Kaohsiung, Taiwan, 26-28 November 2007, Proceedings, pp. 87-92, 2007, IEEE Computer Society, 978-0-7695-2994-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Guido von der Heidt, Reinhard Schoepf |
PKI and Entitlement - Key Information Security Management Solutions for Business and IT Compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSE ![In: ISSE/SECURE 2007 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe/SECURE 2007 Conference, Warsaw, Poland, September 25-27, 2007, pp. 376-385, 2007, Vieweg+Teubner, 978-3-8348-0346-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Elena Trichina, Konstantin Hyppönen, Marko Hassinen |
SIM-enabled Open Mobile Payment System Based on Nation-wide PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSE ![In: ISSE/SECURE 2007 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe/SECURE 2007 Conference, Warsaw, Poland, September 25-27, 2007, pp. 355-366, 2007, Vieweg+Teubner, 978-3-8348-0346-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Marcus Hanke |
Embedded PKI in Industrial Facilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSE ![In: ISSE/SECURE 2007 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe/SECURE 2007 Conference, Warsaw, Poland, September 25-27, 2007, pp. 347-354, 2007, Vieweg+Teubner, 978-3-8348-0346-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Anja Beyer, Sophie Hellmann, Malte Hesse, Friedrich Holl, Peter Morcinek, Sachar Paulus, Helmut Reimer |
EKIAS - Success Criteria of PKI Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSE ![In: ISSE/SECURE 2007 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe/SECURE 2007 Conference, Warsaw, Poland, September 25-27, 2007, pp. 340-346, 2007, Vieweg+Teubner, 978-3-8348-0346-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Ana Isabel González-Tablas Ferreres, Benjamín Ramos Álvarez, Arturo Ribagorda Garnacho |
Spatial-Temporal Certification Framework and Extension of X.509 Attribute Certificate Framework and SAML Standard to Support Spatial-Temporal Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 321-329, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Spatial-temporal certification, X.509 AC, SAML |
17 | Agusti Solanas, Antoni Martínez-Ballesté |
Privacy Protection in Location-Based Services Through a Public-Key Privacy Homomorphism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 362-368, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
public-key privacy homomorphism, location privacy |
17 | Vanesa Daza, Josep Domingo-Ferrer |
On Partial Anonymity in Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 193-202, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Privacy, Protocols, Secret sharing |
17 | Maithili Narasimha, Gene Tsudik |
Privacy-Preserving Revocation Checking with Modified CRLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 18-33, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Anonymity and Privacy, Certificate Revocation |
17 | Shiqun Li, Guilin Wang, Jianying Zhou 0001, Kefei Chen |
Undeniable Mobile Billing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 338-345, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Diana Berbecaru, Antonio Lioy |
On the Robustness of Applications Based on the SSL and TLS Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 248-264, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
MITM attack, security, SSL/TLS, truncation attack |
17 | Kristian Gjøsteen, Lillian Kråkmo |
Universally Composable Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 346-353, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Secure messaging, signcryption, universal composability |
17 | Yutaka Oiwa, Kazukuni Kobara, Hajime Watanabe |
A New Variant for an Attack Against RSA Signature Verification Using Parameter Field. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 143-153, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
List of Keywords vulnerability, certificate verification, attacks |
17 | Sherman S. M. Chow, Duncan S. Wong |
Anonymous Identification and Designated-Verifiers Signatures from Insecure Batch Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 203-219, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ad hoc anonymous identification, strong de- signated verifier signatures, bilinear pairings, ring signatures, Identity-based, linkability |
17 | Mohamed Layouni, Hans Vangheluwe |
Anonymous k -Show Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 181-192, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Privacy-preserving digital credentials, multiple-show credentials, anonymity |
17 | Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka, Ida Sri Rejeki Siahaan |
Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 297-312, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Jong Hwan Park, Dong Hoon Lee 0001 |
Direct Chosen-Ciphertext Secure Hierarchical ID-Based Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 94-109, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Chosen Ciphertext Security, Hierarchical Identity Based Encryption |
17 | Son Thanh Nguyen, Chunming Rong |
Electronic Payment Scheme Using Identity-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 330-337, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
electronic wallet, Identity-based cryptography |
17 | Yan Song |
One-More Extension of Paillier Inversion Problem and Concurrent Secure Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 65-77, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Bessie C. Hu, Duncan S. Wong, Qiong Huang 0001, Guomin Yang, Xiaotie Deng |
Time Capsule Signature: Efficient and Provably Secure Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 126-142, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Time Capsule Signature |
17 | Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow |
An Efficient Signcryption Scheme with Key Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 78-93, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Ciphertext Anonymity, Gap Diffie-Hellman, Signcryption, Key Privacy |
17 | Ulrich Flegel, Michael Meier 0001 |
Authorization Architectures for Privacy-Respecting Surveillance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 1-17, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, Architecture, intrusion detection, authorization, surveillance, pseudonym, misuse detection |
17 | Rodrigo Roman, Cristina Alcaraz |
Applicability of Public Key Infrastructures in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 313-320, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks, Public Key Cryptography, Public Key Infrastructure |
17 | David W. Chadwick, Sean Anthony |
Using WebDAV for Improved Certificate Revocation and Publication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 265-279, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
HTPP, revocation, LDAP, WebDAV, CRLs |
17 | Manuel Sánchez, Gabriel López Millán, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta |
Bootstrapping a Global SSO from Network Access Control Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 170-180, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authorization, federation, SSO, SAML |
17 | Younho Lee, Yongsu Park, Heeyoul Kim, Seong-Min Hong 0001, Hyunsoo Yoon |
Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 89-D(8), pp. 2452-2455, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | George V. Neville-Neil |
Pointless PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Queue ![In: ACM Queue 4(6), pp. 11-12, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, Masakatsu Nishigaki |
Mechanism-Based PKI - A Real-Time Key Generation from Fingerprints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the 2006 International Conference on Security & Management, SAM 2006, Las Vegas, Nevada, USA, June 26-29, 2006, pp. 468-474, 2006, CSREA Press, 1-60132-001-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
17 | Andrea S. Atzeni, Antonio Lioy (eds.) |
Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![Springer, 3-540-35151-5 The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Lech J. Janczewski, Vladimir Petranovic |
Review of the PKI status in New Zealand. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACIS ![In: Pacific Asia Conference on Information Systems, PACIS 2006, Kuala Lumpur, Malaysia, July 6-9, 2006, pp. 69, 2006, AISeL. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
17 | Otto Dostál, Michal Javorník, Karel Slávicek |
PKI utilisation for PACS users authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN/ICONS/MCL ![In: Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 23-29 April 2006, Mauritius, pp. 84, 2006, IEEE Computer Society, 0-7695-2552-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Yih-Chun Hu, David A. McGrew, Adrian Perrig, Brian Weis, Dan Wendlandt |
(R)Evolutionary Bootstrapping of a Global PKI for Securing BGP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HotNets ![In: 5th ACM Workshop on Hot Topics in Networks - HotNets-V, Irvine, California, USA, November 29-30, 2006, 2006, ACM SIGCOMM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
17 | Milan Markovic, Milos Kilibarda, Aleksandar Milosevic |
PKi Consolidation Project and Multiapplicative Smart Payment Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSE ![In: ISSE 2006 - Securing Electronic Busines Processes, Highlights of the Information Security Solutions Europe 2006 Conference, 10-12 October 2006, Rome, Italy, pp. 249-258, 2006, Vieweg, 978-3-8348-0213-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Tobias Straub |
Usability challenges of PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2006 |
RDF |
|
17 | Willy Susilo, Yi Mu 0001 |
Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 68-80, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
repudiable, authentication, email, phishing, separable, ID-based, deniable |
17 | Sherman S. M. Chow |
Identity-Based Strong Multi-Designated Verifiers Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 257-259, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|