The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for authenticity with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1977-1996 (16) 1997-1998 (18) 1999-2000 (27) 2001 (22) 2002 (32) 2003 (38) 2004 (46) 2005 (67) 2006 (92) 2007 (99) 2008 (97) 2009 (70) 2010 (23) 2011 (17) 2012 (19) 2013 (20) 2014 (16) 2015 (16) 2016 (26) 2017 (35) 2018 (32) 2019 (40) 2020 (24) 2021 (46) 2022 (51) 2023 (52) 2024 (18)
Publication types (Num. hits)
article(300) incollection(4) inproceedings(745) phdthesis(10)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 798 occurrences of 452 keywords

Results
Found 1059 publication records. Showing 1059 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Dominique A. Winne, Henry D. Knowles, David R. Bull, Cedric Nishan Canagarajah Digital watermarking in wavelet domain with predistortion for authenticity verification and localization. Search on Bibsonomy Security and Watermarking of Multimedia Contents The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Dominique A. Winne, Henry D. Knowles, David R. Bull, Cedric Nishan Canagarajah Compression-compatible digital watermark algorithm for authenticity verification and localization. Search on Bibsonomy Security and Watermarking of Multimedia Contents The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Xiaoqiang Zhou, H. K. Huang, Shieh-Liang Lou Authenticity and Integrity of Digital Mammography Images. Search on Bibsonomy IEEE Trans. Medical Imaging The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Donna Champion, Frank Stowell PEArL: a systems approach to demonstrating authenticity in information systems design. Search on Bibsonomy J. Inf. Technol. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Anne J. Gilliland-Swetland, Philip B. Eppard Preserving the Authenticity of Contingent Digital Objects: The InterPARES Project. Search on Bibsonomy D Lib Mag. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Ronald J. Kantor, Tad Waddington, Richard E. Osgood Fostering the Suspension of Disbelief: The Role of Authenticity in Goal-Based Scenarios. Search on Bibsonomy Interact. Learn. Environ. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Lee Herman, Alan Mandell The Given and the Made: Authenticity and Nature in Virtual Education. Search on Bibsonomy First Monday The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Guohua Pan Authenticity in Web-based instruction environment. Search on Bibsonomy WebNet The full citation details ... 2000 DBLP  BibTeX  RDF
17Stephen K. Probert Ethics, authenticity and emancipation in information systems development. Search on Bibsonomy IRMA Conference The full citation details ... 2000 DBLP  BibTeX  RDF
17Jennifer Trant When all You've Got is "The Real Thing": Museums and Authenticity in the Networked World. Search on Bibsonomy Arch. Mus. Informatics The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17David Bearman, Jennifer Trant Authenticity of Digital Resources: Towards a Statement of Requirements in the Research Process. Search on Bibsonomy D Lib Mag. The full citation details ... 1998 DBLP  BibTeX  RDF
17Wei-Bin Lee, Chin-Chen Chang 0001 Authenticity of public keys in asymmetric cryptosystems. Search on Bibsonomy Comput. Commun. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Kimberly Cass The World Wide Web's shadow of opportunity: A Heideggerian perspective of authenticity in the information age. Search on Bibsonomy Inf. Technol. People The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Scott D. Dexter An adversary-centric logic of security and authenticity. Search on Bibsonomy 1998   RDF
17Bernd Ludwig A Contribution to the Question of Authenticity of Resus Using Part-of-Speech Tagging. Search on Bibsonomy KI The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
17Michael T. Black Consensus and Authenticity in Representation: Simulation as Participative Theatre. Search on Bibsonomy AI Soc. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
17Siegfried Herda Authenticity Anonymity and Security in OSIS - an open System for Information Services. Search on Bibsonomy Datenschutz und Datensicherung The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
9Arijit Laha On the issues of building information warehouses. Search on Bibsonomy Bangalore Compute Conf. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF archival framework, contents and contexts, knowledge-work support systems, information management
9Michael Backes 0001, Stefan Lorenz, Matteo Maffei, Kim Pecina Brief announcement: anonymity and trust in distributed systems. Search on Bibsonomy PODC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF anonymity in decentralized systems, formal verification, cryptographic protocols
9Claudio A. B. Tiellet, André Grahl Pereira, Eliseo Berni Reategui, José Valdeni de Lima, Teresa Chambel Design and evaluation of a hypervideo environment to support veterinary surgery learning. Search on Bibsonomy HT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF high education, veterinary, evaluation, design, video, surgery, hypervideo
9Lucia Keller, Dennis Komm, Giovanni Serafini, Andreas Sprock, Björn Steffen Teaching Public-Key Cryptography in School. Search on Bibsonomy ISSEP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
9Elmar Schoch, Frank Kargl On the efficiency of secure beaconing in VANETs. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security, efficiency, vehicular ad hoc networks (vanets)
9Hao Chen 0095 Efficient compromising resilient authentication schemes for large scale wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF code and function based authentication schemes, polynomial based authentication scheme, wireless sensor netowork
9Rene Mayrhofer, Hans Gellersen Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Mo-Che Chan, Shun-Yun Hu, Jehn-Ruey Jiang Secure peer-to-peer 3D streaming. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Nonlinear media, Security, Peer-to-peer, Virtual environments, Online games, 3D streaming
9Heesook Choi, William Enck, Jaesheung Shin, Patrick D. McDaniel, Thomas F. La Porta ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks. Search on Bibsonomy Wirel. Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Secure link layer acknowledgment, Secure reporting protocol, Security, MANET, Monitoring, Anonymity, Packet forwarding
9Llanos Tobarra, Diego Cazorla, Fernando Cuartero, Gregorio Díaz 0001, María-Emilia Cambronero Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AVISPA toolbox, Model checking, Security protocols, Wireless sensor
9Richa Singh 0001, Mayank Vatsa, Sanjay Kumar Singh, Saurabh Upadhyay Integrating SVM classification with SVD watermarking for intelligent video authentication. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Video authentication, Relative correlation, Support vector machine, Watermarking, Singular value decomposition
9Kyriakos Mouratidis, Dimitris Sacharidis, HweeHwa Pang Partially materialized digest scheme: an efficient verification method for outsourced databases. Search on Bibsonomy VLDB J. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Query result verification, Authentication in outsourced databases
9Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy, Hao Chen 0003 Multi-party off-the-record messaging. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy, instant messaging, deniability, multi-party
9Caimei Wang, Zhengmao Li Self-selecting Sub-secret Keys Sharing Scheme Based on Polynomials over Elliptic Curve. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Wei-Min Shi ID-Based Non-interactive Deniable Authentication Protocol. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Ningning Lu, Huachun Zhou, Hongke Zhang A New Source Address Validation Scheme Based on IBS. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Gonçalo Antunes, José Barateiro Securing the iRODS Metadata Catalog for Digital Preservation. Search on Bibsonomy ECDL The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Digital Libraries, Data Grids, Digital Preservation
9Rui Zhang 0007, Jing Shi 0002, Yanchao Zhang Secure multidimensional range queries in sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multidimensional range query, security, sensor networks
9Sandra Steinbrecher, Stephan Groß, Markus Meichau Jason: A Scalable Reputation System for the Semantic Web. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secure semantic web, privacy-preserving data management, secure information integration, Trust management, identity management, reputation system
9Taswar Iqbal, Volker Lohweg, Dinh Khoi Le, Michael Nolte Human Perception Based Counterfeit Detection for Automated Teller Machines. Search on Bibsonomy KI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF counterfeit resistance, digital authentication, surface coding, pattern recognition, ATMs, human perception
9Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson Package-Role Based Authorization Control Model for Wireless Network Services. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Claudio Tosatto, Marco Gribaudo A 3D History Class: A New Perspective for the Use of Computer Based Technology in History Classes. Search on Bibsonomy EC-TEL The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Wen Hu, Peter I. Corke, Wen Chan Shih, Leslie Overs secFleck: A Public Key Technology Platform for Wireless Sensor Networks. Search on Bibsonomy EWSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Ge Cheng Unattended Remote Attestation Delegation for Grid Computing. Search on Bibsonomy NAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Bobby L. Tait, Sebastiaan H. von Solms Biovault: Biometrically Based Encryption. Search on Bibsonomy I3E The full citation details ... 2009 DBLP  DOI  BibTeX  RDF BioVault, secure transaction, security, Biometrics, Encryption, key management, data security, data protection, privacy-enhancing technology
9Guobo Li, Songwen Pei, Gang Chen 0012, Wenjun Cao, Baifeng Wu A self-embedded watermarking scheme based on relationship function of corresponding inter-blocks DCT coefficient. Search on Bibsonomy CSCWD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Mingwu Zhang, Yusheng Zhong, Bo Yang 0003, Wenzheng Zhang Analysis and Improvement of an ID-Based Anonymous Signcryption Model. Search on Bibsonomy ICIC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anonymous signcryption, anonymity, bilinear pairings, unforgeability
9Alex P. Lambert, Stephen M. Bezek, Karrie Karahalios Waterhouse: enabling secure e-mail with social networking. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, privacy, cryptography, social computing
9Yue-Hsun Lin, Ahren Studer, Hsu-Chun Hsiao, Jonathan M. McCune, King-Hang Wang, Maxwell N. Krohn, Phen-Lan Lin, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang SPATE: small-group PKI-less authenticated trust establishment. Search on Bibsonomy MobiSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF group protocol, security, implementation, key exchange
9Mazleena Salleh, Teoh Chin Yew Application of 2D Barcode in Hardcopy Document Verification System. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hardcopy document, verification, integrity
9Wei Wang 0025, Jing Dong 0003, Tieniu Tan A Survey of Passive Image Tampering Detection. Search on Bibsonomy IWDW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Image Tampering, Image Tampering Detection, Imaging Process, Image Model
9Mate Soos, Karsten Nohl, Claude Castelluccia Extending SAT Solvers to Cryptographic Problems. Search on Bibsonomy SAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Christina Brzuska, Marc Fischlin, Tobias Freudenreich, Anja Lehmann, Marcus Page, Jakob Schelbert, Dominique Schröder, Florian Volk Security of Sanitizable Signatures Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Zhenyu Wang, Jianhua Huang, Yu Wang, Xiangdong Li, Xuetao Sun, Ruimin Wang A Multi-party Contract Signing Protocol and Its Implementation via Trusted Computing. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Nicolai Kuntze, Andreas Fuchs 0002, Carsten Rudolph Reliable Identities Using Off-the-Shelf Hardware Security in MANETs. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Helen Balinsky, Edward McDonnell, Liqun Chen 0002, Keith A. Harrison Anti-counterfeiting Using Memory Spots. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF memory spot, anti-counterfeiting, package authentication, RFID
9Dmitriy Kuptsov, Andrei V. Gurtov SAVAH: Source Address Validation with Host Identity Protocol . Search on Bibsonomy MobiSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, Authentication, LAN, HIP
9John Black, Martin Cochran MAC Reforgeability. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Provable Security, Message Authentication Codes, Birthday Attacks
9Andrea Weise, Adil Hasan, Mark Hedges, Jens Jensen Managing Provenance in iRODS. Search on Bibsonomy ICCS (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Kianoosh Mokhtarian, Mohamed Hefeeda End-to-end secure delivery of scalable video streams. Search on Bibsonomy NOSSDAV The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multimedia authentication, secure streaming, video authentication, multimedia security, scalable video
9Martin Pirker, Ronald Toegl, Daniel M. Hein, Peter Danner A PrivacyCA for Anonymity and Trust. Search on Bibsonomy TRUST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Java, Privacy, Virtualization, Trusted Computing, PKI, Trusted Computing Base
9S. Sharmila Deva Selvi, S. Sree Vivek, Rahul Srinivasan, Chandrasekaran Pandu Rangan An Efficient Identity-Based Signcryption Scheme for Multiple Receivers. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Multiple Receivers, Provable Security, Signcryption, Identity-Based Cryptography
9S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan Identity Based Aggregate Signcryption Schemes. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Aggregate Signcryption, Provable Security, Bilinear Pairings, Random Oracle Model, Identity Based Cryptography
9Véronique Cortier Verification of Security Protocols. Search on Bibsonomy VMCAI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Sascha Zmudzinski, Martin Steinebach Perception-Based Audio Authentication Watermarking in the Time-Frequency Domain. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Weihui Dai, Yue Yu, Bin Deng BinText steganography based on Markov state transferring probability. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Markov transferring probability, online communication, information hiding, text steganography
9Agnes Hui Chan, Rajmohan Rajaraman, Zhifeng Sun, Feng Zhu Approximation Algorithms for Key Management in Secure Multicast. Search on Bibsonomy COCOON The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Daniel Y. Deng, Andrew H. Chan, G. Edward Suh Hardware authentication leveraging performance limits in detailed simulations and emulations. Search on Bibsonomy DAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hardware authentication, secure processors
9Robert Beverly, Arthur W. Berger, Young Hyun, kc claffy Understanding the efficacy of deployed internet source address validation filtering. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ip spoofing, source address validation, filtering
9Kui Ren 0001, Wenjing Lou, Yanchao Zhang LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Wireless sensor networks, integrity and protection
9Li Bai, Erik Blasch Two-Way Handshaking Circular Sequential k-Out-of-n Congestion System. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Wolf Zimmer, Thomas Langkabel, Carsten Hentrich ArchiSafe: Legally Compliant Electronic Storage. Search on Bibsonomy IT Prof. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Adil Haouzia, Rita Noumeir Methods for image authentication: a survey. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Digital image signature, Cryptography, Image authentication, Fragile watermarking, Image content, Semi-fragile watermarking
9Mihir Bellare, Chanathip Namprempre Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Message authentication, Authenticated encryption, Symmetric encryption, Concrete security
9Mohamed Shehab, Arif Ghafoor, Elisa Bertino Secure Collaboration in a Mediator-Free Distributed Environment. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Roberto Gorrieri, Fabio Martinelli, Marinella Petrocchi Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks. Search on Bibsonomy J. Autom. Reason. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Formal security models and analysis, Multicast communication
9Al-Sakib Khan Pathan, Choong Seon Hong SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks. Search on Bibsonomy Ann. des Télécommunications The full citation details ... 2008 DBLP  DOI  BibTeX  RDF One-way hash chain, Shared secret key, Energy, Distance
9Zhishou Zhang, Qibin Sun, John G. Apostolopoulos, Wai-Choong Wong Rate-Distortion-Authentication optimized streaming with Generalized Butterfly Graph authentication. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Zhenhua Wu Biometrics Authentication System on Open Network and Security Analysis. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, Diethelm Ostry A key loss recovery scheme for secure broadcasts in wireless sensor networks. Search on Bibsonomy PIMRC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Haixun Wang, Jian Yin 0002, Chang-Shing Perng, Philip S. Yu Dual encryption for query integrity assurance. Search on Bibsonomy CIKM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF database outsourcing, security, integrity, encryption, audit
9Reihaneh Safavi-Naini, Shaoquan Jiang Non-interactive conference key distribution and its applications. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF conference key distribution, ring authentication, broadcast encryption, unconditional security
9Haowen Chan, Adrian Perrig Efficient security primitives derived from a secure aggregation algorithm. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF public key management, sensor networks, authentication, integrity, broadcast, signatures, data aggregation
9Michael Backes 0001, Catalin Hritcu, Matteo Maffei Type-checking zero-knowledge. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF type systems, language-based security, authorization policies, zero-knowledge protocols
9Michael Backes 0001, Stefan Lorenz, Matteo Maffei, Kim Pecina The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis. Search on Bibsonomy CAV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Vineela Devarashetty, Jeffrey J. P. Tsai, Lu Ma, Du Zhang Modeling a secure sensor network system using an Extended Elementary Object System. Search on Bibsonomy IEEE ICCI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Wen Chan Shih, Wen Hu, Peter I. Corke, Leslie Overs A public key technology platform for wireless sensor networks. Search on Bibsonomy SenSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF tpm, wireless sensor networks, rsa, public key
9Di Ma, Gene Tsudik DISH: Distributed Self-Healing. Search on Bibsonomy SSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Jason Crampton, Hoon Wei Lim Role Signatures for Access Control in Open Distributed Systems. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Huaqun Wang, Hong Yu Cryptanalysis of Two Ring Signcryption Schemes. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ring signcryption, privacy and trust, cryptanalysis, certificateless cryptography
9Reed Newman, Raheem A. Beyah A Performance Analysis of Authentication Using Covert Timing Channels. Search on Bibsonomy Networking The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Jian Ren 0001, Tongtong Li, Keesook Han Anonymous Communication Protocol in Overlay Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Chenxi Zhang, Xiaodong Lin 0001, Rongxing Lu, Pin-Han Ho RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Xiaoyuan Yang 0002, Maotang Li, Lixian Wei, Yiliang Han New ECDSA-Verifiable Multi-receiver Generalization Signcryption. Search on Bibsonomy HPCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Na Wang, Yingjian Zhi, Binqiang Wang A New Path Verification Protocol for Securing BGP. Search on Bibsonomy HPCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Summit R. Tuladhar, Carlos E. Caicedo, James B. D. Joshi Inter-domain Authentication for Seamless Roaming in Heterogeneous Wireless Networks. Search on Bibsonomy SUTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF seamless roaming, ubiquitous mobility, authentication, heterogeneous networks
9Hung-Min Sun, Shuai-Min Chen, Yao-Hsin Chen, Heng-Jeng Chung, I-Hung Lin Secure and Efficient Handover Schemes for Heterogeneous Networks. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Raylin Tso Signcryption Scheme with Standardized Verification Algorithm. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Pierre-Alain Fouque, Gwenaëlle Martinet, Frédéric Valette, Sébastien Zimmer On the Security of the CCM Encryption Mode and of a Slight Variant. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CCM, CBC-MAC, Counter mode
9Sergio Castillo-Perez, Joaquín García-Alfaro Anonymous Resolution of DNS Queries. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Privacy Information Retrieval, Privacy, Anonymity, Domain Name System, IT Security
9Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji Toda Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems. Search on Bibsonomy FPL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Nicolai Kuntze, Andreas U. Schmidt, Zaharina Velikova, Carsten Rudolph Trust in Business Processes. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Omar M. Al-Jarrah, Ramzi R. Saifan A novel key management algorithm in sensor networks. Search on Bibsonomy MoMM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 1059 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license