|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 411 occurrences of 203 keywords
|
|
|
Results
Found 597 publication records. Showing 597 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
11 | Son Thanh Nguyen, Chunming Rong |
Electronic Payment Scheme Using Identity-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 330-337, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
electronic wallet, Identity-based cryptography |
11 | Felicia Ionescu, Vlad Nae, Alexandru Gherega |
Credentials Management for Authentication in a Grid-Based E-Learning Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPDC ![In: 6th International Symposium on Parallel and Distributed Computing (ISPDC 2007), Hagenberg, Austria, July 5-8, 2007, pp. 101-106, 2007, IEEE Computer Society, 0-7695-2936-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Valentina Casola, Nicola Mazzocca, Jesus Luna, Oscar Manso, Manel Medina |
Static evaluation of Certificate Policies for GRID PKIs interoperability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 391-399, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Oluwafemi O. Ajayi, Richard O. Sinnott, Anthony Stell |
Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 3-10, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Tetsuo Imai, Hideaki Goto, Hideaki Sone |
A Policy-Based, Secure Access Control Mechanism for Network Roaming Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2007 International Symposium on Applications and the Internet - Workshops (SAINT 2007 Workshops), 15-19 January 2007, Hiroshima, Japan, pp. 30, 2007, IEEE Computer Society, 0-7695-2757-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Shushan Zhao, Akshai K. Aggarwal, Robert D. Kent |
A Framework for Revocation of Proxy Certificates in a Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (3) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 532-537, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi |
Implementing identity provider on mobile phone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2007 Workshop on Digital Identity Management, Fairfax, VA, USA, November 2, 2007, pp. 46-52, 2007, ACM, 978-1-59593-889-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
identity provider, authentication, mobile phone, federated identity |
11 | Seon-Ho Park, Joon-Sic Cho, Sung-Min Jung, Young-Ju Han, Tai-Myoung Chung |
Architecture of Context-Aware Integrated Security Management Systems for Smart Home Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Managing Next Generation Networks and Services, 10th Asia-Pacific Network Operations and Management Symposium, APNOMS 2007, Sapporo, Japan, October 10-12, 2007, Proceedings, pp. 102-111, 2007, Springer, 978-3-540-75475-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Reto Kohlas, Jacek Jonczy, Rolf Haenni |
A New Model for Public-Key Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KiVS ![In: Kommunikation in Verteilten Systemen (KiVS), 15. Fachtagung Kommunikation in Verteilten Systemen, KiVS 2007, Bern, Schweiz, 26. Februar - 2. März 2007, pp. 213-224, 2007, Springer, 978-3-540-69961-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Pedro Felix, Carlos Ribeiro |
A scalable and flexible web services authentication model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 4th ACM Workshop On Secure Web Services, SWS 2007, Fairfax, VA, USA, November 2, 2007, pp. 66-72, 2007, ACM, 978-1-59593-892-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authentication, trust management, web services security |
11 | Marcin Czenko, Sandro Etalle, Dongyi Li, William H. Winsborough |
An Introduction to the Role Based Trust Management Framework RT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures, pp. 246-281, 2007, Springer, 978-3-540-74809-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Yan He 0001, Miaoliang Zhu |
A complete and efficient strategy based on petri net in automated trust negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infoscale ![In: Proceedings of the 2nf International Conference on Scalable Information Systems, Infoscale 2007, Suzhou, China, June 6-8, 2007, pp. 75, 2007, ACM, 978-1-59593-757-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
negotiation petri net, automated trust negotiation, negotiation strategy |
11 | Rodrigo Lopes, Dongwan Shin |
Controlled sharing of identity attributes for better privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing, White Plains, New York, USA, November 12-15, 2007, pp. 2-7, 2007, IEEE Computer Society / ICST, 1-4244-1317-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Marten van Dijk, Dwaine E. Clarke, Blaise Gassend, G. Edward Suh, Srinivas Devadas |
Speeding up Exponentiation using an Untrusted Computational Resource. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 39(2), pp. 253-273, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
11 | Alain P. Hiltgen, Thorsten Kramp, Thomas Weigold |
Secure Internet Banking Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(2), pp. 21-29, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
short-time passwords, short-lived passwords, taxonomy of attacks, authentication, Internet banking, public-key certificates |
11 | Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Indrakshi Ray |
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 3(1), pp. 13-30, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ontology, Privacy, trust negotiations |
11 | Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich |
How to win the clonewars: efficient periodic n-times anonymous authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 201-210, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
n-anonymous authentication, credentials, clone detection |
11 | Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang |
Secure information sharing enabled by Trusted Computing and PEI models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 2-12, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
PEI models, secure information sharing, access control, authorization, trusted computing, security framework |
11 | Qin Li 0014, Jianxin Li 0002, Jinpeng Huai, Xingang Liu, Chunming Hu |
CROWN-ST: A Security and Trustworthiness Architecture for CROWN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Science ![In: Second International Conference on e-Science and Grid Technologies (e-Science 2006), 4-6 December 2006, Amsterdam, The Netherlands, pp. 23, 2006, IEEE Computer Society, 0-7695-2734-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Jürgen Hofer, Thomas Fahringer |
Presenting Scientific Legacy Programs as Grid Services via Program Synthesis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Science ![In: Second International Conference on e-Science and Grid Technologies (e-Science 2006), 4-6 December 2006, Amsterdam, The Netherlands, pp. 34, 2006, IEEE Computer Society, 0-7695-2734-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | David Spence, Neil Geddes, Jens Jensen, Andrew Richards, Matthew Viljoen, Andrew P. Martin, Matthew J. Dovey, Mark Norman, Kang Tang, Anne E. Trefethen, David Wallom, Rob Allan, David Meredith 0003 |
ShibGrid: Shibboleth Access for the UK National Grid Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Science ![In: Second International Conference on e-Science and Grid Technologies (e-Science 2006), 4-6 December 2006, Amsterdam, The Netherlands, pp. 75, 2006, IEEE Computer Society, 0-7695-2734-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Claudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Fulvio Frati, Pierangela Samarati |
CAS++: An Open Source Single Sign-On Solution for Secure e-Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 208-220, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Jan Camenisch, Dieter Sommer, Roger Zimmermann |
A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 25-37, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Zhide Chen, Li Xu 0002 |
Anti-Collusion Anonymous Credentials Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Sixth International Conference on Computer and Information Technology (CIT 2006), 20-22 September 2006, Seoul, Korea, pp. 150, 2006, IEEE Computer Society, 0-7695-2687-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | He Ge, Stephen R. Tate |
A group signature scheme with signature claiming and variable linkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 25th IEEE International Performance Computing and Communications Conference, IPCCC 2006, April 10-12, 2006, Phoenix, Arizona, USA, 2006, IEEE, 1-4244-0198-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Jesus Luna, Manel Medina, Oscar Manso |
Using OGRO and CertiVeR to Improve OCSP Validation for Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GPC ![In: Advances in Grid and Pervasive Computing, First International Conference, GPC 2006, Taichung, Taiwan, May 3-5, 2006, Proceedings, pp. 12-21, 2006, Springer, 3-540-33809-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen |
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings, pp. 67-86, 2006, Springer, 3-540-47820-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Delegation of Authority, Policies, XACML, Attributes, Credentials, PDP |
11 | Pawel Czarnul |
Reaching and Maintaining High Quality of Distributed J2EE Applications - BeesyCluster Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SET ![In: Software Engineering Techniques: Design for Quality, SET 2006, October 17-20, 2006, Warsaw, Poland, pp. 179-190, 2006, Springer, 978-0-387-39387-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Taekyoung Kwon 0002, Jung Hee Cheon, Yongdae Kim, Jaeil Lee |
Privacy Protection in PKIs: A Separation-of-Authority Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers, pp. 297-311, 2006, Springer, 978-3-540-71092-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Andreas Pashalidis, Bernd Meyer 0002 |
Linking Anonymous Transactions: The Consistent View Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 384-392, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Hai Jin 0001, Zhensong Liao, Deqing Zou, Weizhong Qiang |
A New Approach to Hide Policy for Automated Trust Negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings, pp. 168-178, 2006, Springer, 3-540-47699-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Terry Fleury, Jim Basney, Von Welch |
Single sign-on for java web start applications using myproxy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006, pp. 95-102, 2006, ACM, 1-59593-546-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
session passwords, single sign-on, grid portals |
11 | Walid Bagga, Stefano Crosta, Refik Molva |
Proof-Carrying Proxy Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings, pp. 321-335, 2006, Springer, 3-540-38080-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Data Minimization, Authorization, Bilinear Pairings, Credentials, Proxy Certificates |
11 | Jie Jiang, Deren Chen, Tim Chen 0004, Xiaodong Shen |
A Security Grid Portal Using PKI and Online Proxy Certificate Repository. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS (2) ![In: Interdisciplinary and Multidisciplinary Research in Computer Science, IEEE CS Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS|06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2, pp. 93-96, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Salvatore Vitabile, Giovanni Milici, S. Scolaro, Filippo Sorbello, Giovanni Pilato |
A MAS Security Framework Implementing Reputation Based Policies and Owners Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 746-752, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Antonella Di Stefano, Emiliano Tramontana, Daniele Zito |
Strategies for Reserving Resources on a Grid Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 15th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2006), 26-28 June 2006, Manchester, United Kingdom, pp. 207-213, 2006, IEEE Computer Society, 0-7695-2623-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Jürgen Hofer, Thomas Fahringer |
Specification-based Synthesis of Tailor-made Grid Service Wrappers for Scientific Legacy Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 7th IEEE/ACM International Conference on Grid Computing (GRID 2006), September 28-29, 2006, Barcelona, Spain, Proceedings, pp. 305-306, 2006, IEEE Computer Society, 1-4244-0344-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Riccardo Melen, Maurizio Pignolo, Moreno Sioli |
A Multimodal Authentication System for Authorizing the Access to NGN Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNS ![In: 2006 International Conference on Networking and Services (ICNS 2006), 16-21 July 2006, Silicon Valley, California, USA, pp. 47, 2006, IEEE Computer Society, 0-7695-2622-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Henrik Thostrup Jensen, Josva Kleist, Jesper Ryge Leth |
A Framework for Job Management in the NorduGrid ARC Middleware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGC ![In: Advances in Grid Computing - EGC 2005, European Grid Conference, Amsterdam, The Netherlands, February 14-16, 2005, Revised Selected Papers, pp. 861-871, 2005, Springer, 3-540-26918-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Walid Bagga, Refik Molva |
Policy-Based Cryptography and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 72-87, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Privacy, Authorization, Policy, Credentials, ID-based Cryptography |
11 | Gabriel López Millán, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Sassa Otenko, David W. Chadwick |
A Heterogeneous Network Access Service Based on PERMIS and SAML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 55-72, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Paolo Ceravolo, Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati |
Advanced Metadata for Privacy-Aware Representation of Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 21st International Conference on Data Engineering Workshops, ICDE 2005, 5-8 April 2005, Tokyo, Japan, pp. 1199, 2005, IEEE Computer Society, 0-7695-2657-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Victoria Ungureanu |
Efficient support for enterprise delegation policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 340-345, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
decentralized authorization, delegation chain, delegation policy |
11 | Babu Sundaram, Barbara M. Chapman |
A Grid Authentication System with Revocation Guarantees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HiPC ![In: High Performance Computing - HiPC 2005, 12th International Conference, Goa, India, December 18-21, 2005, Proceedings, pp. 508-517, 2005, Springer, 3-540-30936-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslett, Charles C. Zhang |
Ontology-Based Policy Specification and Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESWC ![In: The Semantic Web: Research and Applications, Second European Semantic Web Conference, ESWC 2005, Heraklion, Crete, Greece, May 29 - June 1, 2005, Proceedings, pp. 290-302, 2005, Springer, 3-540-26124-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Barbara Carminati, Elena Ferrari |
AC-XML documents: improving the performance of a web access control module. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings, pp. 67-76, 2005, ACM, 1-59593-045-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
XML, access control, web |
11 | Ioannis A. Kakadiaris, Georgios Passalis, Theoharis Theoharis, George Toderici, Ioannis Konstantinidis 0001, Mohammed N. Murtuza |
Multimodal Face Recognition: Combination of Geometry with Physiological Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR (2) ![In: 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2005), 20-26 June 2005, San Diego, CA, USA, pp. 1022-1029, 2005, IEEE Computer Society, 0-7695-2372-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Jirí Denemark, Michal Jankowski, Ales Krenek, Ludek Matyska, Norbert Meyer, Miroslav Ruda, Pawel Wolniewicz |
Best Practices of User Account Management with Virtual Organization Based Access to Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPAM ![In: Parallel Processing and Applied Mathematics, 6th International Conference, PPAM 2005, Poznan, Poland, September 11-14, 2005, Revised Selected Papers, pp. 633-642, 2005, Springer, 3-540-34141-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Wenbao Jiang, Chen Li 0005, Shuang Hao, Yiqi Dai |
Using Trust for Restricted Delegation in Grid Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 293-301, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Xiaohui Wei, Wilfred W. Li, Osamu Tatebe, Gaochao Xu, Liang Hu 0001, Jiubin Ju |
Integrating Local Job Scheduler - LSFTM with GfarmTM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: Parallel and Distributed Processing and Applications, Third International Symposium, ISPA 2005, Nanjing, China, November 2-5, 2005, Proceedings, pp. 196-204, 2005, Springer, 3-540-29769-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
data aware scheduling, LSF, Gfarm, data grid, GSI |
11 | Lan Nguyen |
Accumulators from Bilinear Pairings and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, pp. 275-292, 2005, Springer, 3-540-24399-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
membership revocation, privacy, anonymity, group signatures, ring signatures, ID-based, identity escrow, Dynamic accumulators |
11 | Piero A. Bonatti, Daniel Olmedilla |
Driving and Monitoring Provisional Trust Negotiation with Metapolicies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 6-8 June 2005, Stockholm, Sweden, pp. 14-23, 2005, IEEE Computer Society, 0-7695-2265-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Amir Herzberg, Yosi Mass |
Relying Party Credentials Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Commer. Res. ![In: Electron. Commer. Res. 4(1-2), pp. 23-39, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Vijayalakshmi Atluri, Soon Ae Chun |
An Authorization Model for Geospatial Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 1(4), pp. 238-254, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, access control, Geospatial databases |
11 | Nong Xiao, Xiaonian Wu, Wei Fu 0001, Xiangli Qu |
A Data Grid Security System Based on Shared Context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC ![In: Network and Parallel Computing, IFIP International Conference, NPC 2004, Wuhan, China, October 18-20, 2004, Proceedings, pp. 30-37, 2004, Springer, 3-540-23388-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Andrew Teoh Beng Jin, David Ngo Chek Ling, Alwyn Goh |
An Integrated Dual Factor Authenticator Based on the Face Data and Tokenised Random Number. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICBA ![In: Biometric Authentication, First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004, Proceedings, pp. 117-123, 2004, Springer, 3-540-22146-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Endre Bangerter |
A Cryptographic Framework for the Controlled Release of Certified Data (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers, pp. 43-50, 2004, Springer, 3-540-40925-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein |
A Pay-per-Use DoS Protection Mechanism for the Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 120-134, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Changqin Huang, Zhiting Zhu, Xianqing Wang, Deren Chen |
Grid Authorization Management Oriented to Large-Scale Collaborative Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD (Selected papers) ![In: Computer Supported Cooperative Work in Design I, 8th International Conference, CSCWD 2004, Xiamen, China, May 26-28, 2004, Revised Selected Papers, pp. 55-66, 2004, Springer, 3-540-29400-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Delia Critchlow, Ning Zhang 0001 |
Revocation invocation for accountable anonymous PKI certificate trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28 - July 1, 2004, Alexandria, Egypt, pp. 386-392, 2004, IEEE Computer Society, 0-7803-8623-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Richard Au, Harikrishna Vasanta, Kim-Kwang Raymond Choo, Mark Looi |
A user-centric anonymous authorisation framework in e-commerce environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 6th International Conference on Electronic Commerce, ICEC 2004, Delft, The Netherlands, October 25-27, 2004, pp. 138-147, 2004, ACM, 1-58113-930-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Xuhua Ding, Gene Tsudik, Shouhuai Xu |
Leak-Free Group Signatures with Immediate Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 24th International Conference on Distributed Computing Systems (ICDCS 2004), 24-26 March 2004, Hachioji, Tokyo, Japan, pp. 608-615, 2004, IEEE Computer Society, 0-7695-2086-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Jongil Jeong, Dongkyoo Shin, Dongil Shin, Hyun-Mok Oh |
A Study on the XML-Based Single Sign-On System Supporting Mobile and Ubiquitous Service Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: Embedded and Ubiquitous Computing, International Conference EUC 2004, Aizu-Wakamatsu City, Japan, August 25-27, 2004, Proceedings, pp. 903-913, 2004, Springer, 3-540-22906-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Tianchi Ma, Lin Chen 0025, Cho-Li Wang, Francis C. M. Lau 0001 |
G-PASS: Security Infrastructure for Grid Travelers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing - GCC 2004: Third International Conference, Wuhan, China, October 21-24, 2004. Proceedings, pp. 301-308, 2004, Springer, 3-540-23564-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Moritz Y. Becker, Peter Sewell |
Cassandra: Distributed Access Control Policies with Tunable Expressiveness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 7-9 June 2004, Yorktown Heights, NY, USA, pp. 159-168, 2004, IEEE Computer Society, 0-7695-2141-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Bryan Smith, Kent E. Seamons, Michael D. Jones |
Responding to Policies at Runtime in TrustBuilder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 7-9 June 2004, Yorktown Heights, NY, USA, pp. 149-158, 2004, IEEE Computer Society, 0-7695-2141-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Jan Camenisch, Anna Lysyanskaya |
Signature Schemes and Anonymous Credentials from Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings, pp. 56-72, 2004, Springer, 3-540-22668-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. Smetters |
Securing a Remote Terminal Application with a Mobile Trusted Device. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 438-447, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Elisa Bertino, Elena Ferrari, Andrea Perego |
Content-based filtering of Web documents: the MaX system and the EUFORBIA project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 2(1), pp. 45-58, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Internet filtering, User credentials, Rating systems, Access control |
11 | Ting Yu 0001, Marianne Winslett |
Policy migration for sensitive credentials in trust negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003, pp. 9-20, 2003, ACM, 1-58113-776-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
policy migration, trust negotiation |
11 | Hristo Koshutanski, Fabio Massacci |
An access control framework for business processes for web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
XML Security ![In: Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, pp. 15-24, 2003, ACM, 1-58113-777-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
controlled disclosure, interactive access control, web services, e-business, security management, distributed systems security |
11 | Elisa Bertino, Elena Ferrari, Loredana Parasiliti Provenza |
Signature and Access Control Policies for XML Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings, pp. 1-22, 2003, Springer, 3-540-20300-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Von Welch, Frank Siebenlist, Ian T. Foster, John Bresnahan, Karl Czajkowski, Jarek Gawor, Carl Kesselman, Sam Meder, Laura Pearlman, Steven Tuecke |
Security for Grid Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPDC ![In: 12th International Symposium on High-Performance Distributed Computing (HPDC-12 2003), 22-24 June 2003, Seattle, WA, USA, pp. 48-57, 2003, IEEE Computer Society, 0-7695-1965-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Alexander Levine 0002, Vassilis Prevelakis, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis |
WebDAVA: An Administrator-Free Approach To Web File-Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), Infrastructure for Collaborative Enterprises, 9-11 June 2003, Linz, Austria, pp. 59-64, 2003, IEEE Computer Society, 0-7695-1963-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Timothy J. Smith, Lavanya Ramakrishnan |
Joint Policy Management and Auditing in Virtual Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 4th International Workshop on Grid Computing (GRID 2003), 17 November 2003, Phoenix, AZ, USA, Proceedings, pp. 117-124, 2003, IEEE Computer Society, 0-7695-2026-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Patrick M. Widener, Karsten Schwan, Fabián E. Bustamante |
Differential Data Protection for Dynamic Distributed Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA, pp. 396-405, 2003, IEEE Computer Society, 0-7695-2041-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Jean Bacon, Ken Moody, Walt Yao |
A model of OASIS role-based access control and its support for active security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 5(4), pp. 492-540, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
distributed systems, RBAC, role-based access control, policy, service-level agreements, Certificates, OASIS |
11 | Adam Kolawa |
Software Certification Debate: Certification Will Do More Harm than Good. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 35(6), pp. 34-35, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
11 | Leonard L. Tripp |
Software Certification Debate: Benefits of Certification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 35(6), pp. 31-33, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
11 | Simon N. Foley |
Supporting Imprecise Delegation in KeyNote. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers, pp. 179-188, 2002, Springer, 3-540-20830-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
11 | Elisa Bertino, Elena Ferrari, Andrea Perego |
Ma X : An Access Control System for Digital Libraries and the Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 26th International Computer Software and Applications Conference (COMPSAC 2002), Prolonging Software Life: Development and Redevelopment, 26-29 August 2002, Oxford, England, Proceedings, pp. 945-950, 2002, IEEE Computer Society, 0-7695-1727-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
11 | Eric Freudenthal, Tracy Pesin, Lawrence Port, Edward Keenan, Vijay Karamcheti |
dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), Vienna, Austria, July 2-5, 2002, pp. 411-420, 2002, IEEE Computer Society, 0-7695-1585-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
11 | Eric Freudenthal, Lawrence Port, Tracy Pesin, Edward Keenan |
Switchboard: Secure, Monitored Connections for Client-Server Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 22nd International Conference on Distributed Computing Systems, Workshops (ICDCSW '02) July 2-5, 2002, Vienna, Austria, Proceedings, pp. 660-665, 2002, IEEE Computer Society, 0-7695-1588-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
11 | Ninghui Li, John C. Mitchell, William H. Winsborough |
Design of a Role-Based Trust-Management Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2002 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002, pp. 114-130, 2002, IEEE Computer Society, 0-7695-1543-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
access control, role-based access control, trust management, distributed system security, attribute-based access control, attribute certificates |
11 | William H. Winsborough, Ninghui Li |
Towards Practical Automated Trust Negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 5-7 June 2002, Monterey, CA, USA, pp. 92-103, 2002, IEEE Computer Society, 0-7695-1611-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
11 | Kent E. Seamons, Marianne Winslett, Ting Yu 0001, Bryan Smith, Evan Child, Jared Jacobson, Hyrum Mills, Lina Yu |
Requirements for Policy Languages for Trust Negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 5-7 June 2002, Monterey, CA, USA, pp. 68-79, 2002, IEEE Computer Society, 0-7695-1611-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
11 | Ting Yu 0001, Marianne Winslett, Kent E. Seamons |
Interoperable strategies in automated trust negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001., pp. 146-155, 2001, ACM, 1-58113-385-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
11 | Aris Anagnostopoulos, Michael T. Goodrich, Roberto Tamassia |
Persistent Authenticated Dictionaries and Their Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings, pp. 379-393, 2001, Springer, 3-540-42662-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
11 | David P. Jablon |
Password Authentication Using Multiple Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings, pp. 344-360, 2001, Springer, 3-540-41898-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
11 | Kyung-Ah Chang, Do-Gun Jung, Byung-Rae Lee, Tai-Yun Kim |
CORBA-Based Fair Contracts Support System for Subjects of Electronic Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: Proceedings of the 1999 International Conference on Parallel Processing Workshops, ICPPW 1999, Wakamatsu, Japan, September 21-24, 1999, pp. 462-467, 1999, IEEE Computer Society, 0-7695-0353-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
11 | Nittida Nuansri, Samar Singh, Tharam S. Dillon |
A Process State-Transition Analysis and Its Application to Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 378-387, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
11 | Richard Hayton, Jean Bacon, Ken Moody |
Access Control in an Open Distributed Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: Security and Privacy - 1998 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 3-6, 1998, Proceedings, pp. 3-14, 1998, IEEE Computer Society, 0-8186-8386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
11 | Marianne Winslett, Neil Ching, Vicki Ellen Jones, Igor Slepchin |
Assuring Security and Privacy for Digital Library Transactions on the Web: Client and Server Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADL ![In: 4th International Forum on Research and Technology Advances in Digital Libraries (ADL '97), Washington, DC, USA, May 7-9, 1997, pp. 140-152, 1997, IEEE Computer Society, 0-8186-8010-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
11 | Olivier Delos, Jean-Jacques Quisquater |
An Identity-Based Signature Scheme with Bounded Life-Span. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings, pp. 83-94, 1994, Springer, 3-540-58333-5. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
11 | David Chaum, Eugène van Heyst |
Group Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings, pp. 257-265, 1991, Springer, 3-540-54620-0. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
11 | David Chaum |
Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings, pp. 177-182, 1988, Springer, 3-540-50251-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
11 | David Chaum |
Showing Credentials Without Identification: SIgnatures Transferred Between Unconditionally Unlinkable Pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '85, Workshop on the Theory and Application of of Cryptographic Techniques, Linz, Austria, April 1985, Proceedings, pp. 241-244, 1985, Springer, 3-540-16468-5. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #597 of 597 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6] |
|