The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for SSL with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-1997 (17) 1998-2000 (22) 2001 (16) 2002 (23) 2003 (24) 2004 (33) 2005 (50) 2006 (51) 2007 (44) 2008 (45) 2009 (30) 2010 (18) 2011 (27) 2012 (17) 2013 (17) 2014 (22) 2015 (23) 2016 (21) 2017 (17) 2018 (30) 2019 (29) 2020-2021 (39) 2022 (30) 2023 (46) 2024 (15)
Publication types (Num. hits)
article(198) incollection(5) inproceedings(500) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 510 occurrences of 301 keywords

Results
Found 706 publication records. Showing 706 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
11Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Ruby B. Lee, Niraj K. Jha Configuration and Extension of Embedded Processors to Optimize IPSec Protocol Execution. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Joaquín García-Alfaro, Guillermo Navarro-Arribas Prevention of Cross-Site Scripting Attacks on Current Web Applications. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security Policies, Software Protection, Code Injection Attacks
11Ryota Narita, Kazuhito Murakami, Tadashi Naruse Strategic Layout of Multi-cameras Based on a Minimum Risk Criterion. Search on Bibsonomy RoboCup The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Kazutoki Otake, Kazuhito Murakami, Tadashi Naruse Precise Extraction of Partially Occluded Objects by Using HLAC Features and SVM. Search on Bibsonomy RoboCup The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Kazuya Odagiri, Nao Tanoue, Rihito Yaegashi, Masaharu Tadauchi, Naohiro Ishii New Access Control on DACS Scheme. Search on Bibsonomy APNOMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Access control DACS Scheme Packet filtering
11Raphael C.-W. Phan, Serge Vaudenay Security-Preserving Asymmetric Protocol Encapsulation. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Dorina C. Petriu, C. Murray Woodside, Dorin Bogdan Petriu, Jing Xu 0024, Toqeer Israr, Geri Georg, Robert B. France, James M. Bieman, Siv Hilde Houmb, Jan Jürjens Performance analysis of security aspects in UML models. Search on Bibsonomy WOSP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, UML, model transformations, software performance engineering, aspect-oriented modeling
11Amaury Nègre, Cédric Pradalier, Matthew Dunbabin Robust Vision-Based Underwater Target Identification and Homing Using Self-Similar Landmarks. Search on Bibsonomy FSR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Mingliang Zhu, Weiming Hu, Xi Li 0001, Ou Wu Customizable Instance-Driven Webpage Filtering Based on Semi-Supervised Learning. Search on Bibsonomy Web Intelligence The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Adam L. Young, Moti Yung Space-Efficient Kleptography Without Random Oracles. Search on Bibsonomy Information Hiding The full citation details ... 2007 DBLP  DOI  BibTeX  RDF twisted elliptic curves, elliptic curve, Key exchange, kleptography
11Roberto Esposito, Daniele Paolo Radicioni Trip Around the HMPerceptron Algorithm: Empirical Findings and Theoretical Tenets. Search on Bibsonomy AI*IA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Daniele Paolo Radicioni, Roberto Esposito Tonal Harmony Analysis: A Supervised Sequential Learning Approach. Search on Bibsonomy AI*IA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF AI in Art and Music, Machine learning, Cognitive Modeling, Music Analysis
11Katsuyuki Okeya, Tsuyoshi Takagi Security analysis of CRT-based cryptosystems. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Multi-Prime RSA, PKCS #1, RSA, Side channel attacks, Factoring, Chinese remainder theorem
11Angelos D. Keromytis, Jason L. Wright, Theo de Raadt, Matthew Burnside Cryptography as an operating system service: A case study. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authentication, digital signatures, Encryption, hash functions, cryptographic protocols
11Denis Verdon Security policies and the software developer. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Baris Kayayurt, Tugkan Tuglular End-to-end security implementation for mobile devices using TLS protocol. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Shun'ichi Yamamoto, Kazuhiro Nakadai, Mikio Nakano, Hiroshi Tsujino, Jean-Marc Valin, Kazunori Komatani, Tetsuya Ogata, Hiroshi G. Okuno Real-Time Robot Audition System That Recognizes Simultaneous Speech in The Real World. Search on Bibsonomy IROS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Ji Wang 0001, Xiaodong Yi 0002, Xuejun Yang Towards a Framework for Scalable Model Checking of Concurrent C Programs. Search on Bibsonomy ISoLA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Wassim Itani, Ayman I. Kayssi, Ali Chehab An enterprise policy-based security protocol for protecting relational database network objects. Search on Bibsonomy IWCMC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF customizable security, policy-driven security, security, relational databases
11Pascal Urien, Mesmin Dandjinou Designing Smartcards for Emerging Wireless Networks. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Zhenxing Luo, NuerMaimaiti Heilili, Dawei Xu, Chen Zhao 0001, Zuoquan Lin Web Application Security Gateway with Java Non-blocking IO. Search on Bibsonomy NGITS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis W3Bcrypt: Encryption as a Stylesheet. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Hong-qiang Li, Chang-yun Miao Hardware Implementation of Hash Function SHA-512. Search on Bibsonomy ICICIC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Yuping Deng, Xiaowei Guo, Xiamu Niu A New Design Scheme of Role-Based Access Control Based on PKI. Search on Bibsonomy ICICIC (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Wen Wu, Jie Yang 0001 SmartLabel: an object labeling tool using iterated harmonic energy minimization. Search on Bibsonomy ACM Multimedia The full citation details ... 2006 DBLP  DOI  BibTeX  RDF gaussian random field, harmonic energy minimization, object labeling, semi-supervised learning
11Alexandra Boldyreva, Marc Fischlin On the Security of OAEP. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Ramon Nou, Jordi Guitart, David Carrera 0001, Jordi Torres Experiences with Simulations - A Light and Fast Model for Secure Web Applications. Search on Bibsonomy ICPADS (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Haeryong Park, Hak Soo Ju, Kilsoo Chun, Jaeil Lee, Seungho Ahn, Bongnam Noh The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment. Search on Bibsonomy ICPADS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ID-based threshold decryption(ID-ThD), Dynamic group management, Wireless network, Key escrow
11Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang, Joo Yeon Cho Formal analysis of card-based payment systems in mobile devices. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF card-based systems, formal verification, mobile payment, electronic payments
11Seoung-Hyeon Lee, Byung-Sun Choi, Jae-Seung Lee, Ki-Young Moon, Jae-Kwang Lee VO Authentication Framework in Grid Environment Using Digital Signature. Search on Bibsonomy ICCSA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Jan Jürjens Security Analysis of Crypto-based Java Programs using Automated Theorem Provers. Search on Bibsonomy ASE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Zvi Gutterman, Benny Pinkas, Tzachy Reinman Analysis of the Linux Random Number Generator. Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Ruby B. Lee, Niraj K. Jha Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors. Search on Bibsonomy VLSI Design The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Performance, Embedded Systems, Security Protocols, Configurability, Extensibility, Embedded Processors, IPSec, Embedded Security
11Jianzhong Huang 0001, Changsheng Xie, Xu Li iOBS3: An iSCSI-Based Object Storage Security System. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Yuqing Zhang 0001, Suping Jia Common Program Analysis of Two-Party Security Protocols Using SMV. Search on Bibsonomy APWeb Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi Secure E-Commerce Transactions for Multicast Services. Search on Bibsonomy CEC/EEE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Richard J. Edell, Peter Kruus, Uri Meth Tracing HTTP Activity Through Non-cooperating HTTP Proxies (Short Paper). Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Divya Arora, Anand Raghunathan, Srivaths Ravi 0001, Murugan Sankaradass, Niraj K. Jha, Srimat T. Chakradhar Software architecture exploration for high-performance security processing on a multiprocessor mobile SoC. Search on Bibsonomy DAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF computation offloading, software partitioning
11Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach Managing the Performance Impact of Web Security. Search on Bibsonomy Electron. Commer. Res. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF web performance scalability, security, Internet protocols
11Zishuang (Eileen) Ye, Sean W. Smith, Denise L. Anthony Trusted paths for browsers. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF HCISEC, Web browser security, Trust path
11Tobias Straub, Thilo-Alexander Ginkel, Johannes Buchmann 0001 A Multipurpose Delegation Proxy for WWW Credentials. Search on Bibsonomy EuroPKI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Credential Delegation, WWW Authentication, Usability, X.509 Certificate, Man-In-The-Middle
11Mauro Brunato, Danilo Severina WilmaGate: a new open access gateway for hotspot management. Search on Bibsonomy WMASH The full citation details ... 2005 DBLP  DOI  BibTeX  RDF access gateways, open access networks, wireless networks, authentication, authorization
11Mi Zhang 0001, Zunping Cheng, Ziji Ma, Binyu Zang A Security Model Design in Web Service Environment. Search on Bibsonomy CIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Vicenç Beltran 0001, David Carrera 0001, Jordi Guitart, Jordi Torres, Eduard Ayguadé A Hybrid Web Server Architecture for Secure e-Business Web Applications. Search on Bibsonomy HPCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Kevin J. Ma, Radim Bartos Performance Impact of Web Service Migration in Embedded Environments. Search on Bibsonomy ICWS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Jiani Guo, Laxmi N. Bhuyan, Raj Kumar, Sujoy Basu QoS Aware Job Scheduling in a Cluster-Based Web Server for Multimedia Applications. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Jean-Michel Sahut Internet Payment Solutions: Comparative Evaluation and Key Factors of Success. Search on Bibsonomy SAINT Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Patroklos G. Argyroudis, Donal O'Mahony Towards Flexible Authorization Management. Search on Bibsonomy ISCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Changshe Ma, Kefei Chen, Dong Zheng 0001, Shengli Liu 0001 Efficient and Proactive Threshold Signcryption. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF threshold signcryption, threshold approach, Network security, provable security, asynchronous network
11Young Whan Lee, Byung Mun Choi (SE-33)Intelligent ID-Based Threshold System by an Encryption and Decryption from Bilinear Pairing. Search on Bibsonomy KES (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Abdelhamid Bouchachia Learning with Hybrid Data. Search on Bibsonomy HIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Kazuhiro Ogata 0001, Kokichi Futatsugi Equational Approach to Formal Analysis of TLS. Search on Bibsonomy ICDCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, verification, algebraic specification, rewriting, interactive theorem proving
11Zoran Duric IPS - Secure Internet Payment System. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11John M. Brooke, Michael S. Parkin A PDA Client for the Computational Grid. Search on Bibsonomy WETICE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Jean Goubault-Larrecq, Fabrice Parrennes Cryptographic Protocol Analysis on Real C Code. Search on Bibsonomy VMCAI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Xiaodong Yi 0002, Ji Wang 0001, Xuejun Yang Verification of C Programs using Slicing Execution. Search on Bibsonomy QSIC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Dmitry P. Zegzhda, Alex M. Vovk Secure Hybrid Operating System "Linux over Fenix". Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Sungwoo Tak, Eun Kyo Park A Software Framework for Non-Repudiation Service based on Adaptive Secure Methodology in Electronic Commerce. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security software framework, electronic commerce (e-commerce), adaptive secure methodology, non-repudiation
11Patroklos G. Argyroudis, Raja Verma, Hitesh Tewari, Donal O'Mahony Performance Analysis of Cryptographic Protocols on Handheld Devices. Search on Bibsonomy NCA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Yasir Ali, Sean W. Smith Flexible and Scalable Public Key Security for SSH. Search on Bibsonomy EuroPKI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Haidong Xia, José Carlos Brustoloni Detecting and Blocking Unauthorized Access in Wi-Fi Networks. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Tawfiq S. M. Barhoom, Shen-sheng Zhang Trusted Exam Marks System at IUG Using XML-Signature. Search on Bibsonomy CIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF XML Digital Signature, Multi-Signed Document, non-repudiation, XML security
11Mao-Yin Wang, Chih-Pin Su, Chih-Tsun Huang, Cheng-Wen Wu An HMAC processor with integrated SHA-1 and MD5 algorithms. Search on Bibsonomy ASP-DAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Jean-Michel Sahut, Malgorzata Galuszewska Electronic Payment Market: A Non-Optimal Equilibrium. Search on Bibsonomy SAINT Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Ajay Chander, Drew Dean, John C. Mitchell A Distributed High Assurance Reference Monitor. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Sagar Chaki, Edmund M. Clarke, Joël Ouaknine, Natasha Sharygina, Nishant Sinha 0001 State/Event-Based Software Model Checking. Search on Bibsonomy IFM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Roar Lien, Tim Grembowski, Kris Gaj A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Satoshi Shirasuna, Aleksander Slominski, Liang Fang, Dennis Gannon Performance Comparison of Security Mechanisms for Grid Services. Search on Bibsonomy GRID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Qin Zhang 0004, Hai Jin 0001, Chuanjiang Yi, Liping Pang Tree-like Hierarchical Model for Distributed Micro-Security System. Search on Bibsonomy ISPAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11John Marchesini, Sean W. Smith, Omen Wild, Joshua Stabiner, Alex Barsamian Open-Source Applications of TCPA Hardware. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Min Choi, DaeWoo Lee, Seung Ryoul Maeng Cluster computing environment supporting single system image. Search on Bibsonomy CLUSTER The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11William G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein Using graphic turing tests to counter automated DDoS attacks against web servers. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF graphic turing tests, Java, web proxies
11Michael Roe Panel Session: Is Protocol Modelling Finished? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Matej Trampus, Mojca Ciglaric, Matjaz Pancur, Tone Vidmar Are E-Commerce Users Defenceless? Search on Bibsonomy IPDPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Run time modification, Security, E-commerce, Attack
11Bruno Blanchet, Benjamin Aziz A Calculus for Secure Mobility. Search on Bibsonomy ASIAN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Rafael Álvarez, Joan-Josep Climent, Leandro Tortosa, Antonio Zamora 0001 A Pseudorandom Bit Generator Based on Block Upper Triangular Matrices. Search on Bibsonomy ICWE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Cástor Mariño, Carlos Abalde, Manuel G. Penedo, Marta Penas Design of a Medical Application Using XML Based Data Interchange. Search on Bibsonomy EUROCAST The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Abhishek Singh, André L. M. dos Santos Grammar based off line generation of disposable credit card numbers. Search on Bibsonomy SAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Anastasios Ioannidis, Manos Spanoudakis, Giannis Priggouris, C. Eliopoulou, Stathes Hadjiefthymiades, Lazaros F. Merakos EURO-CITI Security Manager: Supporting Transaction Services in the e-Government Domain. Search on Bibsonomy EGOV The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Ichiro Satoh Dynamic Configuration of Agent Migration Protocols for the Internet. Search on Bibsonomy SAINT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF agent migration, protocol, mobile agent, adaptive system
11Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen, Peter Bellows, Jaroslav Flidr, Tom Lehman, Brian Schott Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Vorapranee Khu-smith, Chris J. Mitchell Using EMV Cards to Protect E-commerce Transactions. Search on Bibsonomy EC-Web The full citation details ... 2002 DBLP  DOI  BibTeX  RDF EMV cards, payment protocol, e-commerce security
11Jong-Phil Yang, Kyung Hyune Rhee The Design and Implementation of Improved Secure Cookies Based on Certificate. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF authentication, web security, cookie, public key certificate
11Hiroyuki Tomimori, Yukikazu Nakamoto An Efficient and Flexible Access Control Framework for Java Programs in Mobile Terminals. Search on Bibsonomy ICDCS Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF server authentication, Java, mobile terminal, security domain
11Suresh Chari, Josyula R. Rao, Pankaj Rohatgi Template Attacks. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Nils Gura, Sheueling Chang Shantz, Hans Eberle, Sumit Gupta, Vipul Gupta, Daniel F. Finchelstein, Edouard Goupy, Douglas Stebila An End-to-End Systems Approach to Elliptic Curve Cryptography. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Joon S. Park, Ravi S. Sandhu, Gail-Joon Ahn Role-based access control on the web. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF WWW security, World Wide Web (WWW), role-based access control, cookies, digital certificates
11Don Cruickshank, Luc Moreau 0001, David De Roure Architectural design of a multi-agent system for handling metadata streams. Search on Bibsonomy Agents The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11Diana Berbecaru, Antonio Lioy, Marius Marian On the Complexity of Public-Key Certificate Validation. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF certificate validation, DPD, DPV, PKI, certificate revocation, CRL, OCSP
11Mahfuzur Rahman, Prabir Bhattacharya Secure Network Communication Using Biometrics. Search on Bibsonomy ICME The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11Jong-Phil Yang, Weon Shin, Kyung Hyune Rhee An End-to-End Authentication Protocol in Wireless Application Protocol. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11Paul A. Gray, Srividya Chandramohan, Vaidy S. Sunderam A Repository System with Secure File Access for Collaborative Environments. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11Bernd Blobel Trustworthiness in Distributed Electronic Healthcare Records-Basis for Shared Care. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11Dinesh Kadamuddi, Jeffrey J. P. Tsai Clustering Algorithm for Parallelizing Software Systems in Multiprocessors Environment. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Parallel processing, distributed application, deadlock, clustering algorithm, synchronous communication, software environment
11Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano Making Sense of Specifications: The Formalization of SET. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
11K. T. Ng, Y. M. Siu The Development of a Betting System on the Internet. Search on Bibsonomy ITCC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
11Dirk Balfanz, Drew Dean, Mike Spreitzer A Security Infrastructure for Distributed Java Applications. Search on Bibsonomy S&P The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Access Control Logics, Security, Java, Access Control, Distributed Computing
11Goedson T. Paixão, Wagner Meira Jr., Virgílio A. F. Almeida, Daniel A. Menascé, Adriano C. M. Pereira Design and Implementation of a Tool for Measuring the Performance of Complex E-commerce Sites. Search on Bibsonomy Computer Performance Evaluation / TOOLS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
11Lawrence C. Paulson Inductive Analysis of the Internet Protocol TLS. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF inductive method, proof tools, authentication, TLS, Isabelle
11Jean-Sébastien Coron, David Naccache, Julien P. Stern On the Security of RSA Padding. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 706 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license