Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | David Galindo, Paz Morillo, Carla Ràfols |
Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 81-91, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
certificate-based and certificate-less encryption, cryptanalysis, public-key infrastructure, identity-based encryption |
17 | Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim 0001 |
Efficient Conjunctive Keyword Search on Encrypted Data Storage System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 184-196, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Sebastian Fritsch, Vangelis Karatsiolis, Marcus Lippert, Alexander Wiesmaier, Johannes Buchmann 0001 |
Towards Secure Electronic Workflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 154-168, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Workflow Security, Digitize Workflows, XACML, XPDL, Workflow Engine |
17 | Massimiliano Pala, Antonio Lioy |
Fighting E-Mail Abuses: The EMPE Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 130-144, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Manuel Sánchez, Gabriel López 0001, Óscar Cánovas Reverte, Juan A. Sánchez, Antonio Fernandez Gómez-Skarmeta |
An Access Control System for Multimedia Content Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 169-183, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Stephen Farrell |
DomainKeys Identified Mail Demonstrates Good Reasons to Re-invent the Wheel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 145-153, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Man Ho Au, Sherman S. M. Chow, Willy Susilo, Patrick P. Tsang |
Short Linkable Ring Signatures Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 101-115, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Yongtae Kim, Chang Han Kim, Taek-Young Youn |
On the Security of Multilevel Cryptosystems over Class Semigroups of Imaginary Quadratic Non-maximal Orders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 92-100, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Key generation algorithm, Class semigroup, Key exchange system, Hierarchy |
17 | Maurizio Adriano Strangio |
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 233-247, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
key agreement protocols, key compromise impersonation |
17 | Eun-Jun Yoon, Kee-Young Yoo |
An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 45-53, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Authentication, Network security, Smart card, Password |
17 | Eun-Jun Yoon, Kee-Young Yoo |
Enhanced Forward-Secure User Authentication Scheme with Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 197-206, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Authentication, Network security, Smart card, Secure protocol, Password |
17 | Ulrich Sax, Isaac S. Kohane, Kenneth D. Mandl |
Position Paper: Wireless Technology Infrastructures for Authentication of Patients: PKI that Rings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Am. Medical Informatics Assoc. ![In: J. Am. Medical Informatics Assoc. 12(3), pp. 263-268, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Stefanos Gritzalis |
A good-practice guidance on the use of PKI services in the public sector of the European Union member states. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Manag. Comput. Security ![In: Inf. Manag. Comput. Security 13(5), pp. 379-398, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Jerzy Pejas, Imed El Fray |
Some methods of the analysis and risk assessment in the PKI system services providers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems ![In: Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems., pp. 61-70, 2005, Springer, 978-1-4020-7776-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Soon Hwa Sung, Eunbae Kong |
A Distributed Certificate Status Verification Using Mobile Code PSTU(Proactive Self Transaction Unit) of Secure Mobile Agent in PKI(Public Key Infrastructure). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of The 2005 International Conference on Security and Management, SAM 2005, Las Vegas, Nevada, USA, June 20-23, 2005, pp. 33-39, 2005, CSREA Press, 1-932415-82-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
17 | Chikara Ohkubo, Yoichi Muraoka |
Biometric Authentication Using PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of The 2005 International Conference on Security and Management, SAM 2005, Las Vegas, Nevada, USA, June 20-23, 2005, pp. 446-452, 2005, CSREA Press, 1-932415-82-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
17 | David W. Chadwick, Gansen Zhao (eds.) |
Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![Springer, 3-540-28062-6 The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Geraint Price |
PKI Challenges: An Industry Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWAP ![In: Applied Public Key Infrastructure - 4th International Workshop: IWAP 2005, Singapore, September 21-23, 2005, pp. 3-16, 2005, IOS Press, 978-1-58603-550-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
17 | Jian Leng, DongQin Xie, Kibaya Erisania |
Efforts Towards PKI Interoperability: A Case of Bridge CA Construction in China. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computational Intelligence ![In: IASTED International Conference on Computational Intelligence, Calgary, Alberta, Canada, July 4-6, 2005, pp. 348-353, 2005, IASTED/ACTA Press, 0-88986-481-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
17 | Yanchao Zhang, Wei Liu 0008, Wenjing Lou, Yuguang Fang, Younggoo Kwon |
AC-PKI: anonymous and certificateless public-key infrastructure for mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2005, Seoul, Korea, 16-20 May 2005, pp. 3515-3519, 2005, IEEE, 0-7803-8938-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Bogdan Ksiezopolski, Zbigniew Kotulski |
On a Concept of Scalable Security: PKI-based Model using Additional Cryptographic Modules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADBIS Research Communications ![In: ADBIS 2005, Advances in Databases and Information Systems, Communications of the Ninth East-European Conference on Advances in Databases and Information Systems, Tallinn, Estonia, September 12-15, 2005, 2005, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
17 | Taekyoung Kwon 0002, Hyeonjoon Moon |
Multi-modal Biometrics with PKI Technologies for Border Control Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings, pp. 99-114, 2005, Springer, 3-540-25999-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Radia J. Perlman |
What's a PKI, Why Would I Want One, and How Should it Be Designed? ![Search on Bibsonomy](Pics/bibsonomy.png) |
LISA ![In: Proceedings of the 19th Conference on Systems Administration (LISA 2005), December 4-9, 2005, San Diego, California, USA, 2005, USENIX. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
17 | Frank Losemann |
Zertifikatsmanagement für große Organisationen: PKI-Aspekte in der praktischen Anwendung. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2005 |
RDF |
|
17 | Jesus Luna, Manel Medina, Oscar Manso |
Towards a Unified Authentication and Authorization Infrastructure for Grid Services: Implementing an Enhanced OCSP Service Provider into GT4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 36-54, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Adil Alsaid, Chris J. Mitchell |
Installing Fake Root Keys in a PC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 227-239, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | YoungGyo Lee, In-Jung Kim, Seungjoo Kim, Dongho Won |
A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 215-226, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
D-OCSP, D-OCSP-KIS, OCSP Responder, hash function |
17 | Javier López 0001, Rolf Oppliger, Günther Pernul |
Classifying Public Key Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 135-143, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Gabriel López Millán, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Sassa Otenko, David W. Chadwick |
A Heterogeneous Network Access Service Based on PERMIS and SAML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 55-72, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Secure Role Activation and Authorization in the Enterprise Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 22-35, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Role Activation, Role Based Access Control, Proxy Signature, Digital Credential |
17 | Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong |
Recoverable and Untraceable E-Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 206-214, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Untraceable, E-Cash, Recoverable |
17 | Tobias Straub, Thilo-Alexander Ginkel, Johannes Buchmann 0001 |
A Multipurpose Delegation Proxy for WWW Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 1-21, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Credential Delegation, WWW Authentication, Usability, X.509 Certificate, Man-In-The-Middle |
17 | Valentina Casola, Antonino Mazzeo, Nicola Mazzocca, Massimiliano Rak |
An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 100-117, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Guillermo Álvaro, Stephen Farrell, Tommy Lindberg, Roland Lockhart, Yunhao Zhang |
XKMS Working Group Interoperability Status Report. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 86-99, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Andreas U. Schmidt, Zbynek Loebl |
Legal Security for Transformations of Signed Documents: Fundamental Concepts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 255-270, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Wensheng Xu, David W. Chadwick, Sassa Otenko |
Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 162-179, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Chi-Sung Laih, K. Y. Chen |
Generating visible RSA public keys for PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 2(2), pp. 103-109, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Public key generation, RSA, Certificate, Integer factorization |
17 | Ed Dawson |
Preface to the special issue on PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 2(2), pp. 65, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Delia Critchlow, Ning Zhang 0001 |
Security enhanced accountable anonymous PKI certificates for mobile e-commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 45(4), pp. 483-503, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Pekka Jelekäinen |
GSM-PKI solution enabling secure mobile communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Medical Informatics ![In: Int. J. Medical Informatics 73(3), pp. 317-320, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Hiroshi Takeda, Yasushi Matsumura, Shigeki Kuwata, Hirohiko Nakano, Ji Shanmai, Qiyan Zhang, Chen Yufen, Hideo Kusuoka, Masaki Matsuoka |
An assessment of PKI and networked electronic patient record system: lessons learned from real patient data exchange at the platform of OCHIS (Osaka Community Healthcare Information System). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Medical Informatics ![In: Int. J. Medical Informatics 73(3), pp. 311-316, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Adam J. Slagell, Rafael Bonilla |
PKI Scalability Issues ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR cs.CR/0409018, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
17 | Vangelis Karatsiolis, Marcus Lippert, Alexander Wiesmaier |
Using LDAP Directories for Management of PKI Processes ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR cs.CR/0411066, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
17 | Steven Tuecke, Von Welch, Douglas Engert, Laura Pearlman, Mary R. Thompson |
Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 3820, pp. 1-37, June 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Mohammad Peyravian, Allen Roginsky, Nevenko Zunic |
Non-PKI methods for public key distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 23(2), pp. 97-103, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Tobias Straub |
On usability issues of PKI-enabled applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications, Internet, and Information Technology ![In: IASTED International Conference on Communications, Internet, and Information Technology, November 22 - 24, 2004, St. Thomas, US Virgin Islands, USA, pp. 141-146, 2004, IASTED/ACTA Press. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
17 | Partha Dasgupta |
Panel II: PKI to the masses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, IPCCC 2004, April 15-17, 2004, Phoenix, Arizona, USA, pp. x-xi, 2004, IEEE, 0-7803-8396-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | A. Jancic, Matthew J. Warren |
PKI - Advantages and Obstacles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISM ![In: Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004, pp. 104-114, 2004, School of Computer and Information Science, Edith Cowan University, Western Australia, 0-7298-0572-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
17 | Namje Park, Kiyoung Moon, Jongsu Jang, Sungwon Sohn |
Development of XKMS-Based Service Component for Using PKI in XML Web Services Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 784-791, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Zhengxian Gao, Zhongxue Li, Yaqing Tu |
Design and Completion of Digital Certificate with Authorization Based on PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IRI ![In: Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, IRI - 2004, November 8-10, 2004, Las Vegas Hilton, Las Vegas, NV, USA, pp. 462-466, 2004, IEEE Systems, Man, and Cybernetics Society, 0-7803-8819-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Venus L. S. Cheung, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan, C. F. Chong |
Delegation of signing and decryption rights using pki proxy memo. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IASTED Conf. on Software Engineering ![In: IASTED International Conference on Software Engineering, part of the 22nd Multi-Conference on Applied Informatics, Innsbruck, Austria, February 17-19, 2004, pp. 281-285, 2004, IASTED/ACTA Press, 0-88986-381-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
17 | Hanane El Bakkali |
E-Payment Security - Recommendations About the Use of a PKI for E-Payment Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICETE (2) ![In: ICETE 2004, 1st International Conference on E-Business and Telecommunication Networks, Setúbal, Portugal, August 24-28, 2004, Proceedings, pp. 317-, 2004, INSTICC Press, 972-8865-15-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
17 | Malek Bechlaghem |
Light-weight PKI-Enabling through the Service of a Central Signature Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSE ![In: ISSE 2004 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2004 Conference, Berlin, Germany, September 28-30, 2004, pp. 117-126, 2004, Vieweg+Teubner, 978-3-528-05910-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Milan Markovic |
Recent PKI Experiences in Serbia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSE ![In: ISSE 2004 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2004 Conference, Berlin, Germany, September 28-30, 2004, pp. 321-332, 2004, Vieweg+Teubner, 978-3-528-05910-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | InKyung Jeun, Jaeil Lee, Sang Hwan Park |
Asia PKI Interoperability Guideline. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSE ![In: ISSE 2004 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2004 Conference, Berlin, Germany, September 28-30, 2004, pp. 309-320, 2004, Vieweg+Teubner, 978-3-528-05910-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Karlo Berket, Abdelilah Essiari, Artur Muratas |
PKI-Based Security for Peer-to-Peer Information Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer-to-Peer Computing ![In: 4th International Conference on Peer-to-Peer Computing (P2P 2004), 15-17 August 2004, Zurich, Switzerland, pp. 45-52, 2004, IEEE Computer Society, 0-7695-2156-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Venus L. S. Cheung, Lucas Chi Kwong Hui, Siu-Ming Yiu |
The Delegation Problem and Practical PKI-Based Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEIS (3) ![In: ICEIS 2004, Proceedings of the 6th International Conference on Enterprise Information Systems, Porto, Portugal, April 14-17, 2004, pp. 73-84, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
17 | Mary R. Thompson, Abdelilah Essiari, Srilekha Mudumbai |
Certificate-based authorization policy in a PKI environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 6(4), pp. 566-588, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
XML, Public key infrastructure, digital certificates |
17 | David W. Chadwick, Darren P. Mundy, John P. New |
Experiences of using a PKI to access a hospital information system by high street opticians. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 26(16), pp. 1893-1903, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Costas Lambrinoudakis, Stefanos Gritzalis, Fredj Dridi, Günther Pernul |
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 26(16), pp. 1873-1883, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Volker Hammer |
Das Verzeichnisdienstkonzept der PKI-1-Verwaltung. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 27(11), 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
17 | Shinji Yamane, Jiahong Wang, Hironobu Suzuki, Norihisa Segawa, Yuko Murayama |
Rethinking OpenPGP PKI and OpenPGP Public Keyserver ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR cs.CY/0308015, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
17 | David W. Chadwick |
Deficiencies in LDAP when used to support PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 46(3), pp. 99-104, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Antonio Fernandez Gómez-Skarmeta, Gregorio Martínez Pérez, Óscar Cánovas Reverte |
New security services based on PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 19(2), pp. 251-262, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Danilo Bruschi, Giusi Poletti, Emilia Rosti |
E-vote and Pki's: a Need, a Bliss or a Curse? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Electronic Voting ![In: Secure Electronic Voting, pp. 195-209, 2003, Springer, 1-4020-7301-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Simeon Xenitellis, Pita Jarupunphol |
Security Vulnerabilities in the Trust-List PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the International Conference on Security and Management, SAM '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 1, pp. 72-77, 2003, CSREA Press, 1-932415-16-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
17 | Pavan K. Sura, Ravi Mukkamala |
A PKI Architecture for Academic Institutions: Design and Prototype. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the International Conference on Security and Management, SAM '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 1, pp. 205-212, 2003, CSREA Press, 1-932415-16-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
17 | Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis |
Introducing PKI to Enhance Security in Future Mobile Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece, pp. 109-120, 2003, Kluwer, 1-4020-7449-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
17 | Gustavo A. Santana Torrellas, Leonid Sheremetov, Luis A. Villa Vargas |
Modelling a PKI-Based Network System using Multi-Agents Systems Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MWCN ![In: Mobile and Wireless Communications Networks - Proceedings of the Fifth IFIP-TC6 International Conference, Singapore, October 27-29, 2003, 2003, World Scientific, 978-981-238-686-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | James Backhouse, Carol Hsu 0001, John Baptista, Jimmy C. Tseng |
The key to trust? signalling quality in the PKI market. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECIS ![In: Proceedings of the 11th European Conference on Information Systems, ECIS 2003, Naples, Italy 16-21 June 2003, pp. 118-121, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
17 | Boaz Gelbord |
On the use of PKI technologies for secure and private e-learning environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CompSysTech ![In: Proceedings of the 4th International Conference on Computer Systems and Technologies: e-Learning, CompSysTech 2003, Rousse, Bulgaria, June 19-20, 2003, pp. 568-572, 2003, ACM, 978-954-9641-33-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Boaz Gelbord, Geert Kleinhuis |
On the Use of PKI in a Residential Gateway Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWI ![In: Proceedings of the IADIS International Conference WWW/Internet 2003, ICWI 2003, Algarve, Portugal, November 5-8, 2003, pp. 1125-1128, 2003, IADIS, 972-98947-1-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
17 | Yücel Karabulut |
Implementation of an Agent-Oriented Trust Management Infrastructure Based on a Hybrid PKI Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, First International Conference, iTrust 2003, Heraklion, Crete, Greece, May 28-30, 2002, Proceedings, pp. 318-331, 2003, Springer, 3-540-40224-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Adam L. Young |
A Weakness in Smart Card PKI Certification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAW ![In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, USA, pp. 30-34, 2003, IEEE, 0-7803-7808-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
17 | David W. Chadwick, Edward Ball 0002, M. V. Sahalayev |
Modifying LDAP to Support PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XVII: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA, pp. 205-214, 2003, Kluwer/Springer, 1-4020-8069-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Pino Persiano, Ivan Visconti |
An Anonymous Credential System and a Privacy-Aware PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, pp. 27-38, 2003, Springer, 3-540-40515-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Volker Hammer, Dörte Neundorf, Albrecht Rosenhauer, Andreas Schmidt |
Das Verzeichnisdienstkonzept für die PKI-1-Verwaltung. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit") ![In: 33. Jahrestagung der Gesellschaft für Informatik, Schwerpunkt `Sicherheit - Schutz und Zuverlässigkeit`, INFORMATIK 2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September 29 - October 2, 2003, pp. 363-374, 2003, GI, 3-88579-365-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
17 | Lican Huang, Zhaohui Wu 0001 |
A PKI-Based Scalable Security Infrastructure for Scalable Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (2) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part II, pp. 1051-1054, 2003, Springer, 3-540-21993-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Marjan Suselj, Tomaz Marcun, Denis Trcek, Gorazd Kandus |
Application of PKI in Health Care - Needs, Ambitions, Prospects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIE ![In: The New Navigators: from Professionals to Patients - Proceedings of MIE2003, Saint Malo, France., pp. 188-193, 2003, IOS Press, 978-1-58603-347-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Gregory G. Rose |
PKI/Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LISA ![In: Proceedings of the 17th Conference on Systems Administration (LISA 2003), San Diego, California, USA, October 26-31, 2003, 2003, USENIX. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
17 | Timothy J. Smith, Gregory T. Byrd, Xiaoyong Wu, Hongjie Xin, Krithiga Thangavelu, Rong Wang, Arpan Shah |
Dynamic PKI and Secure Tuplespaces for Distributed Coalitions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISCEX (1) ![In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 22-24 April 2003, Washington, DC, USA, pp. 189-200, 2003, IEEE Computer Society, 0-7695-1897-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Timothy J. Smith, Gregory T. Byrd |
Yalta: A Dynamic PKI and Secure Tuplespaces for Distributed Coalitions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISCEX (2) ![In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 22-24 April 2003, Washington, DC, USA, pp. 52-54, 2003, IEEE Computer Society, 0-7695-1897-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson |
Scalable and Efficient PKI for Inter-Organizational Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA, pp. 308-318, 2003, IEEE Computer Society, 0-7695-2041-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Stefan Strobel |
Firewalls und IT-Sicherheit - Grundlagen und Praxis sicherer Netze: IP-Filter, Content Security, PKI, Intrusion Detection und Applikationssicherheit, 3. Auflage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2002 |
RDF |
|
17 | Yoon-Jung Rhee, Tai-Yun Kim |
Practical Solutions to Key Recovery Based on PKI in IP Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability and Security, 21st International Conference, SAFECOMP 2002, Catania, Italy, September 10-13, 2002, Proceedings, pp. 44-52, 2002, Springer, 3-540-44157-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Chandra Patni |
Critical Review of B2B Commerce PKI Trust Topologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWI ![In: Proceedings of the IADIS International Conference WWW/Internet 2002, ICWI 2002, Lisbon, Portugal, November 13-15, 2002, pp. 120-127, 2002, IADIS, 972-9027-53-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
17 | Miguel F. Bañón Puente |
The PKI Secure Kernel Protection Profile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIS ![In: Security in Information Systems, Proceedings of the 1st International Workshop on Security in Information Systems, SIS 2002, In conjunction with ICEIS 2002, Ciudad Real, Spain, April 2002, pp. 72-80, 2002, ICEIS Press, 972-98050-9-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
17 | Joachim Biskup, Yücel Karabulut |
A Hybrid PKI Model: Application to Secure Mediation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Research Directions in Data and Applications Security, IFIP WG 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, UK, pp. 271-282, 2002, Kluwer, 1-4020-7541-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
17 | Ravi Mukkamala, Satyam Das, Mahantesh Halappanavar |
Recertification: A Technique to Improve Services in PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Research Directions in Data and Applications Security, IFIP WG 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, UK, pp. 259-270, 2002, Kluwer, 1-4020-7541-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
17 | Matthias Honka |
UNDINE / Smartcards und PKI zur medienbruchfreien elektronischen Softwarebeschaffung. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DFN-Arbeitstagung über Kommunikationsnetze ![In: Zukunft der Netze - Die Verlezbarkeit meistern, 16. DFN-Arbeitstagung über Kommunikationsnetze, Düsseldorf, 2002, pp. 157-169, 2002, GI, 3-88579-346-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
17 | Tamara O'Brien |
Accomplishments and Obstacles of PKI Implementation Within a Small Family Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMIA ![In: AMIA 2002, American Medical Informatics Association Annual Symposium, San Antonio, TX, USA, November 9-13, 2002, 2002, AMIA. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
17 | Peter Alterman |
The US Federal PKI and the Federal Bridge Certification Authority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 37(6), pp. 685-690, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Samuel T. Chanson, Tin-Wo Cheung |
Design and Implementation of PKI-based End-to-End Secure Infrastructure for Mobile E-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
World Wide Web ![In: World Wide Web 4(4), pp. 235-254, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Ray Hunt |
Technological infrastructure for PKI and digital certification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 24(14), pp. 1460-1471, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Ingo Böhmer |
Erfahrungen beim Einsatz und Aufbau einer konzernweiten PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 25(8), 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
17 | Bernhard Esslinger, David Barcklow, Martin Bartosch |
Global PKI and S/MIME Interoperability - The European Bridge-CA Initiative. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 25(9), 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
17 | Hans-Willi Fell |
Interoperabilität in PKI-Anwendungen - Notwendigkeit oder Marketingfloskel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 25(9), 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
17 | Mikael Linden, Janne Kanner, Mika Kivilompolo |
FEIDHE - integrating PKI in Finnish higher education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Informatica (Slovenia) ![In: Informatica (Slovenia) 25(2), 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
17 | Richard Forno, William Feinbloom |
PKI: a question of trust and value. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 44(6), pp. 120, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Kok Ming Ang, William J. Caelli |
Certificate Based PKI and B2B E-Commerce: Suitable Match or Not? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on Information Security (IFIP/Sec'01), June 11-13, 2001, Paris, France, pp. 19-34, 2001, Kluwer, 0-7923-7389-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|