|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 859 occurrences of 387 keywords
|
|
|
Results
Found 989 publication records. Showing 989 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Ray Hunt |
PKI and digital certification infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: Proceedings 9th IEEE International Conference on Networks, ICON 2001, Bangkok, Thailand, October 10-11, 2001., pp. 234-239, 2001, IEEE, 0-7695-1186-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Tin-Wo Cheung, Samuel T. Chanson |
A PKI-Based End-to-End Secure Infrastructure for Mobile E-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FORTE ![In: Formal Techniques for Networked and Distributed Systems, FORTE 2001, IFIP TC6/WG6.1 - 21st International Conference on Formal Techniques for Networked and Distributed Systems, August 28-31, 2001, Cheju Island, Korea, pp. 421-442, 2001, Kluwer, 0-7923-7470-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
17 | Gregory G. Rose |
PKI/Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LISA ![In: Proceedings of the 15th Conference on Systems Administration (LISA 2001), San Diego, California, USA, December 2-7, 2001, 2001, USENIX, 1-880446-05-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
17 | Alexander Hertz |
Multifunctional Smart Card and PKI at the University of Mannheim. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUNIS ![In: The Changing Universities - The Role of Technology, The 7th International Conference of European University Information Systems, March 28-30, 2001, Berlin, Germany, Proceedings, pp. 159-162, 2001, GI, 3-88579-339-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
17 | Juanita J. Hung |
Ethical Dimensions of the UW-Madison PKI E-mail Security Usability Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMIA ![In: AMIA 2001, American Medical Informatics Association Annual Symposium, Washington, DC, USA, November 3-7, 2001, 2001, AMIA. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
17 | Carlos M. A. Costa, José Luís Oliveira, Augusto Silva |
A Trusted Brokering Service for PKI Interoperability and Thin-Clients Integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEIS (2) ![In: ICEIS 2001, Proceedings of the 3rd International Conference on Enterprise Information Systems, Setubal, Portugal, July 7-10, 2001, pp. 1179-1182, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
17 | Chris J. Mitchell |
PKI standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. Tech. Rep. ![In: Inf. Secur. Tech. Rep. 5(4), pp. 17-32, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Steve Matthews |
Authorization Models - PKI Versus the Real World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. Tech. Rep. ![In: Inf. Secur. Tech. Rep. 5(4), pp. 66-71, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Robert Bickmore |
Implementing a PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. Tech. Rep. ![In: Inf. Secur. Tech. Rep. 5(4), pp. 33-38, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Chris Sundt |
PKI - Panacea or Silver Bullet? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. Tech. Rep. ![In: Inf. Secur. Tech. Rep. 5(4), pp. 53-65, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Sixto Ortiz Jr. |
Will PKI Become a Key to Online Security? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 33(12), pp. 13-15, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Carl M. Ellison, Bruce Schneier |
Risks of PKI: E-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 43(2), pp. 152, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Carl M. Ellison, Bruce Schneier |
Risks of PKI: Secure Email. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 43(1), pp. 160, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Angelos P. Varvitsiotis |
Scaling issues in large PKI communities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 16(4), pp. 361-372, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Bill Hancock |
Not Everyone Wants PKI NSF Opts for Digital Signature Alternativ. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 19(4), pp. 301-302, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Carlisle M. Adams, Mike Burmester, Yvo Desmedt, Michael K. Reiter, Philip Zimmermann |
Which PKI (public key infrastructure) is the right one? (panel session). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000., pp. 98-101, 2000, ACM, 1-58113-203-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Virgil D. Gligor |
Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 113-124, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Himanshu Khurana, Virgil D. Gligor |
Review and Revocation of Access Privileges Distributed with PKI Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 100-112, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Maris A. Ozols, Marie Henderson, Chuchang Liu, Anthony Cant |
The PKI Specification Dilemma: A Formal Solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings, pp. 206-219, 2000, Springer, 3-540-67742-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Audun Jøsang, Ingar Glenn Pedersen, Dean Povey |
PKI Seeks a Trusting Relationship. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings, pp. 191-205, 2000, Springer, 3-540-67742-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Junseok Lee, Yeonjeong Jeong, Seongoun Hwang, Young B. Choi, Kisong Yoon, Myung-Joon Kim |
A Design of the Hybrid Messaging System (HMS) Based on PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDPTA ![In: Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA 2000, June 24-29, 2000, Las Vegas, Nevada, USA, 2000, CSREA Press. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
17 | Nick Mansfield |
Designing a practical Public Key Infrastructure (PKI). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. Tech. Rep. ![In: Inf. Secur. Tech. Rep. 4(4), pp. 18-27, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Peter Landrock |
Challenging the conventional view of PKI - will it really work? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. Tech. Rep. ![In: Inf. Secur. Tech. Rep. 4(4), pp. 34-39, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Harry B. DeMaio |
Getting Started with PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 8(2), pp. 27-36, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Carl M. Ellison |
The nature of a useable PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 31(8), pp. 823-830, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Thomas Hetschold |
PKI-Interoperabilität: PKIX und SigI im Vergleich. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 23(4), 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
17 | Jobst Biester |
MailTrusT-PKI-Spezifikation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 23(4), 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
17 | Radia J. Perlman |
An overview of PKI trust models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Netw. ![In: IEEE Netw. 13(6), pp. 38-43, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | William J. Caelli, Ed Dawson, Scott A. Rea |
PKI, elliptic curve cryptography, and digital signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 18(1), pp. 47-66, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | John Hughes |
The Realities of PKI Inter-operability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CQRE ![In: Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30 - December 2, 1999, Proceedings, pp. 127-132, 1999, Springer, 3-540-66800-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Chenxi Wang, William A. Wulf |
Towards a Scalable PKI for Electronic Commerce Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WECWIS ![In: Proceedings of the First International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems, Santa Clara, California, USA, April 8-9, 1999, pp. 132-136, 1999, IEEE Computer Society, 0-7695-0334-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Qi He, Katia P. Sycara, Timothy W. Finin |
Personal Security Agent: KQML-Based PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Agents ![In: Proceedings of the Second International Conference on Autonomous Agents, AGENTS 1998, St. Paul, Minnepolis, USA, May 9-13, 1998, pp. 377-384, 1998, ACM, 0-89791-983-1. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
17 | J. Lee, K. Yoon |
Design of a System to Support Security Communication between a Web Proxy and a CGI Program Based on PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: International Conference on Parallel and Distributed Systems, ICPADS '98, Tainan, Taiwan, December 14-16, 1998, pp. 461-468, 1998, IEEE Computer Society, 0-8186-8603-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Zhao Qiu, Mingrui Chen, Jun Huang |
A Study on CRL Issue by P2P Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IITSI ![In: Third International Symposium on Intelligent Information Technology and Security Informatics, IITSI 2010, Jinggangshan, China, April 2-4, 2010, pp. 526-529, 2010, IEEE Computer Society, 978-0-7695-4020-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
P2P, PKI, CRL |
17 | David O'Callaghan, Louise Doran, Brian A. Coghlan |
Evaluating trust in grid certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 1449-1450, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
trust, grid, PKI |
17 | Ki-Woong Park, Sung Kyu Park, Jaesun Han, Kyu Ho Park |
THEMIS: Towards Mutually Verifiable Billing Transactions in the Cloud Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE CLOUD ![In: IEEE International Conference on Cloud Computing, CLOUD 2010, Miami, FL, USA, 5-10 July, 2010, pp. 139-147, 2010, IEEE Computer Society, 978-1-4244-8207-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Cloud Computing, PKI, Non-Repudiation, Billing |
17 | Alastair Nisbet, Mohammed A. Rashid, Fakhrul Alam |
The Quest for Optimum Server Location Selection in Mobile Ad Hoc Networks Utilising Threshold Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Seventh International Conference on Information Technology: New Generations, ITNG 2010, Las Vegas, Nevada, USA, 12-14 April 2010, pp. 891-896, 2010, IEEE Computer Society, 978-0-7695-3984-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Security, MANET, Wireless, Encryption, PKI |
17 | Hisashi Takahara, Motonori Nakamura |
Enhancement of SIP Signaling for Integrity Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: Tenth Annual International Symposium on Applications and the Internet, SAINT 2010, Seoul, Korea, 19-23 July, 2010, Proceedings, pp. 289-292, 2010, IEEE Computer Society, 978-1-4244-7526-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
SIP Identity, Proxy Authentication, ZRTP, PKI |
17 | Takahiro Fujishiro, Akane Sato, Yoko Kumagai, Tadashi Kaji, Kenichi Okada |
Development of Hi-Speed X.509 Certification Path Validation System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops ![In: 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010, Perth, Australia, 20-13 April 2010, pp. 269-274, 2010, IEEE Computer Society, 978-0-7695-4019-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Path Validation, Security, Certificate, PKI, X.509, Certification Path |
17 | Massimiliano Pala |
A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDtrust 2010, Gaithersburg, Maryland, USA, April 13-15, 2010, pp. 108-116, 2010, ACM, 978-1-60558-895-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
distributed systems, peer-to-peer, PKI, federated identities |
17 | Mücahit Mutlugün, Oktay Adalier |
Turkish national electronic identity card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 14-18, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
national identity card, biometrics, smart card, pki |
17 | Christopher Kunz, Jan Wiebelitz, Stefan Piger, Christian Grimm |
A Concept for Grid Credential Lifecycle Management and Heuristic Credential Abuse Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPDC ![In: Eighth International Symposium on Parallel and Distributed Computing, ISPDC 2009, Lisbon, Portugal, June 30-July 4 2009, pp. 245-248, 2009, IEEE Computer Society, 978-0-7695-3680-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
abuse detection, Grid, PKI, auditing, X.509, proxy certificate |
17 | Martin Pirker, Ronald Toegl, Daniel M. Hein, Peter Danner |
A PrivacyCA for Anonymity and Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings, pp. 101-119, 2009, Springer, 978-3-642-00586-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Java, Privacy, Virtualization, Trusted Computing, PKI, Trusted Computing Base |
17 | Bendik B. Mjaaland, Danilo Gligoroski, Svein J. Knapskog |
The Altinn Case Study: Proposal for a Large-Scale Public-Key Biometric Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings, pp. 1066-1071, 2009, IEEE Computer Society, 978-1-4244-4717-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
biocryptics, biometric encryption, biometrics, fingerprint, PKI, public key |
17 | Sarbari Gupta |
Personal identity verification (PIV) cards as federated identities: challenges and opportunities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2009, Proceedings of the 8th Symposium on Identity and Trust on the Internet, April 14-16, 2009, Gaithersburg, Maryland, USA, pp. 15-22, 2009, ACM, 978-1-60558-474-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
federal bridge certification authority, authentication, authorization, smart cards, PKI, assurance |
17 | Hyun-Chul Kim, Hong-Woo Lee, Kyung-Seok Lee, Moon-Seog Jun |
A Design of One-Time Password Mechanism Using Public Key Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCM (1) ![In: NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008 - Volume 1, pp. 18-24, 2008, IEEE Computer Society, 978-0-7695-3322-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Certificate, PKI, One-time password |
17 | Takeshi Nishimura, Hiroyuki Sato |
LESSO: Legacy Enabling SSO. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: Proceedings of the 2008 International Symposium on Applications and the Internet, SAINT 2008, 28 July - 1 August 2008, Turku, Finland, pp. 301-304, 2008, IEEE Computer Society, 978-0-7695-3297-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication, web application, PKI, SSO |
17 | David Bauer, Douglas M. Blough, David Cash |
Minimal information disclosure with efficiently verifiable credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008, pp. 15-24, 2008, ACM, 978-1-60558-294-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
hash-tree, identity assertion, privacy, PKI, identity management, credential, merkle tree |
17 | Thomas Ristenpart, Scott Yilek |
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings, pp. 228-245, 2007, Springer, 978-3-540-72539-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Proofs of possession, PKI, bilinear maps, ring signatures, multisignatures |
17 | Ian D. Alderman, Miron Livny |
Task-specific restricted delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPDC ![In: Proceedings of the 16th International Symposium on High-Performance Distributed Computing (HPDC-16 2007), 25-29 June 2007, Monterey, California, USA, pp. 243-244, 2007, ACM, 978-1-59593-673-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
distributed batch computing, security, PKI |
17 | R. Radhakrishnan, Majid Jamil, Shabana Mehfuz, Moinuddin Moinuddin |
Security issues in IPv6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNS ![In: Third International Conference on Networking and Services (ICNS 2007), June 19-25, 2007, Athens, Greece, pp. 110, 2007, IEEE Computer Society, 978-0-7695-2858-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
TCP/IP, IPv6, PKI, IPSec, NAT, IKE, CGA |
17 | Nick Pope, Juan Carlos Cruellas |
Oasis Digital Signature Services: Digital Signing without the Headaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 10(5), pp. 81-84, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
DSS, digital signature, PKI, public-key infrastructure |
17 | Jean-Sébastien Coron |
What Is Cryptography? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(1), pp. 70-73, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, cryptography, PKI, public key |
17 | Mikkel Hippe Brun, Christian Lanng |
Reducing barriers for e-business in SME's through an open service oriented infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce - Innovations for Conquering Current Barriers, Obstacles and Limitations to Conducting Successful Business on the Internet, 2006, Fredericton, New Brunswick, Canada, August 13-16, 2006, pp. 403-410, 2006, ACM, 1-59593-392-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
EdiFact, OIOXML, interoperability, integration, digital signatures, business process, e-business, PKI, WSDL, EDI, procurement, UDDI, eCommerce, purchasing, UBL, data interchange |
17 | Jiho Kim, Duhyun Bae, Sehyun Park, Ohyoung Song |
Enhanced Security Scheme for Managing Heterogeneous Server Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 451-459, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security server management, access control, PKI, single sign on |
17 | Alexander Iliev, Sean W. Smith |
Protecting Client Privacy with Trusted Computing at the Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(2), pp. 20-28, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Secure coprocessor, Oblivious RAM, network traffic archival, prototype, PKI, Private Information Retrieval |
17 | Ulrike Meyer, Jared Cordasco, Susanne Wetzel |
An approach to enhance inter-provider roaming through secret sharing and its application to WLANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WMASH ![In: Proceedings of the 3rd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, WMASH 2005, Cologne, Germany, September 2, 2005, pp. 1-13, 2005, ACM, 1-59593-143-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
EAP-TLS-KS, distributed DSS, inter-provider roaming, micropayment scheme, WLAN, secret sharing, PKI, 802.11i |
17 | Sang Seok Lim, Jong Hyuk Choi, Kurt D. Zeilenga |
Secure and flexible certificate access in WS-security through LDAP component matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 1st ACM Workshop On Secure Web Services, SWS 2004, Fairfax, VA, USA, October 29, 2004, pp. 87-96, 2004, ACM, 1-58113-973-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
certificate repository, component matching, PKI, LDAP, X.509 certificate |
17 | Germano Caronni |
Walking the Web of Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 4-16 June 2000, Gaithersburg, MD, USA, pp. 153-158, 2000, IEEE Computer Society, 0-7695-0798-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Heuristic Trust Calculation, PKI, Web of Trust |
17 | David Henry |
Who's Got the Key? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 27th Annual ACM SIGUCCS Conference on User Services: Mile High Expectations 1999, Denver, Colorado, USA, pp. 106-110, 1999, ACM, 1-58113-144-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
encryption, PKI, certificate authority |
16 | Hao Yang 0004, Eric Osterweil, Daniel Massey, Songwu Lu, Lixia Zhang 0001 |
Deploying Cryptography in Internet-Scale Systems: A Case Study on DNSSEC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 8(5), pp. 656-669, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
PKI hierarchy, incremental deployment, key rollover, heterogeneous operations, distributed monitoring, key revocation, DNSSEC |
16 | H. Gilbert Miller, James L. Fisher |
Requiring Strong Credentials: What's Taking So Long?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IT Prof. ![In: IT Prof. 12(1), pp. 57-60, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Smart IT, authentication, authorization, cybersecurity, digital certificates, public-key infrastructure (PKI) |
16 | Ryu Watanabe, Toshiaki Tanaka |
Federated Authentication Mechanism using Cellular Phone - Collaboration with OpenID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009, pp. 435-442, 2009, IEEE Computer Society, 978-0-7695-3596-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ID federation, mobile PKI, network security, privacy protection |
16 | Jon A. Solworth |
Beacon certificate push revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008, pp. 59-66, 2008, ACM, 978-1-60558-300-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication, certificate, public key infrastructure (pki), revocation |
16 | Cristina Satizábal, Jordi Forné, Rafael Martínez-Peláez, Francisco Rico-Novella |
Hierarchical Trust Architecture in a Mobile Ad-Hoc Network Using Ant Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1000-1007, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Certification Architectures, Ad-Hoc Networks, Ant Algorithms, Public Key Infrastructure (PKI), Certification Path |
16 | Cheng Yang, Jianbo Liu, Aina Sui, Yongbin Wang |
A Digital Rights Management Architecture for Multimedia in P2P. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKDD Workshops ![In: Emerging Technologies in Knowledge Discovery and Data Mining, PAKDD 2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised Selected Papers, pp. 664-672, 2007, Springer, 978-3-540-77016-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Identity Authentication, Digital Watermarking, Peer-to-Peer (P2P), Public Key Infrastructure (PKI), Digital Rights Management (DRM) |
16 | Athanasios Moralis, Vassiliki Pouli, Mary Grammatikou, Symeon Papavassiliou, Vasilis Maglaris |
Performance Comparison of Web Services Security: Kerberos Token Profile Against X.509 Token Profile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNS ![In: Third International Conference on Networking and Services (ICNS 2007), June 19-25, 2007, Athens, Greece, pp. 28, 2007, IEEE Computer Society, 978-0-7695-2858-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Web Services Security (WSS), Web Services, Kerberos, Public Key Infrastructure (PKI), X.509 |
16 | Somasekhar Vemulapalli, Mahantesh Halappanavar, Ravi Mukkamala |
Security in Distributed Digital Libraries: Issues and Challenges . ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 20-23 August 2002, Vancouver, BC, Canada, pp. 480-486, 2002, IEEE Computer Society, 0-7695-1680-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Distributed Digital Library (DDL), Quality-of-Service (QoS) and Security, Performance, Kerberos, Public-Key Infrastructure (PKI) |
16 | Man-Chi Pong |
EC-SignGate: Electronic Contract Signing Gateway. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 25th International Computer Software and Applications Conference (COMPSAC 2001), Invigorating Software Development, 8-12 October 2001, Chicago, IL, USA, pp. 245-248, 2001, IEEE Computer Society, 0-7695-1372-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
web-based e-business, digital signature, public key infrastructure (PKI) |
10 | Gregory Neven |
Privacy-enhanced access control in primelife. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 6th Workshop on Digital Identity Management, Chicago, Illinois, USA, October 8, 2010, pp. 1-2, 2010, ACM, 978-1-4503-0090-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
10 | Ebrima N. Ceesay, Coimbatore Chandersekaran, William R. Simpson |
An authentication model for delegation, attribution and least privilege. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PETRA ![In: Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments, PETRA 2010, Samos, Greece, June 23-25, 2010, 2010, ACM, 978-1-4503-0071-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
WS-*, security assertion markup language (SAML), authentication, authorization, delegation, public key infrastructure, attribution, credentialing, least privilege |
10 | Chung-Ming Ou, Chung-Ren Ou |
Security of Intelligent Agents in the Web-Based Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Agents in the Evolution of Web and Applications ![In: Intelligent Agents in the Evolution of Web and Applications, pp. 303-329, 2009, Springer, 978-3-540-88070-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Dario Catalano, Dario Fiore 0001, Rosario Gennaro |
Certificateless onion routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 151-160, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymity, onion routing, certificateless cryptography |
10 | Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy |
TruWallet: trustworthy and migratable wallet-based web authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, STC 2009, Chicago, Illinois, USA, November 13, 2009, pp. 19-28, 2009, ACM, 978-1-60558-788-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
password wallet, secure migration, trusted computing, phishing, identity theft |
10 | Yike Yu, Xuefeng Zheng, Mingde Zhang, Qingguo Zhang |
An Identity-Based Authentication Model for Mobile Agent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 475-478, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Vijay Laxmi, Mudassar N. Khan, Sarath S. Kumar, Manoj Singh Gaur |
Buyer seller watermarking protocol for digital rights management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 298-301, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
buyer-seller protocol, unbinding., watermark, digital rights management, certificate authority, piracy |
10 | Cong Tang, Ruichuan Chen, Zhuhua Cai, Anmin Xie, Jian-bin Hu, Liyong Tang, Zhong Chen 0001 |
Securing key issuing in peer-to-peer networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 84-85, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Jing Sun 0009, Huiqun Zhao, Huibing Xiao, Gongzhu Hu |
Lightweight Public Key Infrastructure and Service Relation Model for Designing a Trustworthy ONS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 8th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2009, June 1-3, 2009, Shanghai, China, pp. 295-300, 2009, IEEE Computer Society, 978-0-7695-3641-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Kanokwan Kanyamee, Chanboon Sathitwiriyawong |
High-Availability Decentralized Multi-Agent Key Recovery System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 8th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2009, June 1-3, 2009, Shanghai, China, pp. 290-294, 2009, IEEE Computer Society, 978-0-7695-3641-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Yevgeniy Dodis, Jonathan Katz, Adam D. Smith, Shabsi Walfish |
Composability and On-Line Deniability of Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings, pp. 146-162, 2009, Springer, 978-3-642-00456-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Ivan Damgård, Jesper Buus Nielsen, Daniel Wichs |
Universally Composable Multiparty Computation with Partially Isolated Parties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings, pp. 315-331, 2009, Springer, 978-3-642-00456-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
public-key infrastructure, multiparty computation, universally composable security |
10 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
A-COLD: Access Control of Web OLAP over Multi-data Warehouse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 469-474, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Gauthier Van Damme, Karel Wouters, Hakan Karahan, Bart Preneel |
Offline NFC payments with electronic vouchers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHeld ![In: Proceedings of the 1st ACM SIGCOMM Workshop on Networking, Systems, and Applications for Mobile Handhelds, MobiHeld 2009, Barcelona, Spain, August 17, 2009, pp. 25-30, 2009, ACM, 978-1-60558-444-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Nokia, voucher, security, NFC |
10 | Yudith Cardinale, Jesús De Oliveira, Carlos Figueira |
Dynamic and Secure Data Access Extensions of Grid Boundaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GPC ![In: Advances in Grid and Pervasive Computing, 4th International Conference, GPC 2009, Geneva, Switzerland, May 4-8, 2009. Proceedings, pp. 36-47, 2009, Springer, 978-3-642-01670-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Julien Cathalo, Benoît Libert, Moti Yung |
Group Encryption: Non-interactive Realization in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 179-196, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Group encryption, anonymity, provable security |
10 | Mansoor Alicherry, Angelos D. Keromytis |
DoubleCheck: Multi-path verification against man-in-the-middle attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), July 5-8, Sousse, Tunisia, pp. 557-563, 2009, IEEE Computer Society, 978-1-4244-4672-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Jong Sik Moon, Deok-Gyu Lee, Im-Yeong Lee |
Device Authentication/Authorization Protocol for Home Network in Next Generation Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 760-768, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Authentication, Authorization, Home Network, Roaming |
10 | Jose L. Muñoz, Oscar Esparza, Carlos Gañán, Javier Parra-Arnau |
PKIX Certificate Status in Hybrid MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings, pp. 153-166, 2009, Springer, 978-3-642-03943-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Hybrid MANET, Certification, Risk, Public Key Infrastructure, Revocation |
10 | Ronald Kainda, Ivan Flechais, A. W. Roscoe 0001 |
Usability and security of out-of-band channels in secure device pairing protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15-17, 2009, 2009, ACM, 978-1-60558-736-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
pairing devices, usability, security protocols |
10 | Jianhong Zhang, Hua Chen, Qin Geng |
Efficient and Provably Secure Self-certified Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMT ![In: Active Media Technology, 5th International Conference, AMT 2009, Beijing, China, October 22-24, 2009. Proceedings, pp. 501-512, 2009, Springer, 978-3-642-04874-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Khoongming Khoo, Ford-Long Wong, Chu-Wee Lim |
On a Construction of Short Digests for Authenticating Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part II, pp. 863-876, 2009, Springer, 978-3-642-02456-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ad hoc networks, authentication, hash, digest |
10 | Daisuke Moriyama, Tatsuaki Okamoto |
An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 154-167, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Benoît Libert, Damien Vergnaud |
Adaptive-ID Secure Revocable Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 1-15, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
provable security, revocation, Identity-based encryption |
10 | S. Britto R. Kumar, S. Albert Rabara, J. Ronald Martin |
MPCS: a secure Mobile Payment Consortia System for higher educational institutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 571-579, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
mobile payment consortia, secured transactions, software architecture, framework, mobile payment |
10 | Xiaodong Lin 0001, Xiaoting Sun, Xiaoyu Wang 0010, Chenxi Zhang, Pin-Han Ho, Xuemin Shen |
TSVC: timed efficient and secure vehicular communications with privacy preserving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 7(12-1), pp. 4987-4998, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Taekyoung Kwon 0002, Hyeonjoon Moon |
Biometric Authentication for Border Control Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 20(8), pp. 1091-1096, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Shahriar Mohammadi, Sanaz Abedi |
ECC-Based Biometric Signature: A New Approach in Electronic Banking Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 763-766, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
biometeric signature, electronic banking, ECC |
10 | Zhun Cai |
A Password-Based Grid Security Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: Second International Conference on the Digital Society (ICDS 2008), February 10-15, 2008, Sainte Luce, Martinique, France, pp. 157-164, 2008, IEEE Computer Society, 978-0-7695-3087-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AKE, EKE, Authentication, Delegation, Grid Security |
10 | Huafei Zhu, Feng Bao 0001, Robert H. Deng |
Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1635-1641, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Chia-Hsin Owen Chen, Chung-Wei Chen, Cynthia Kuo, Yan-Hao Lai, Jonathan M. McCune, Ahren Studer, Adrian Perrig, Bo-Yin Yang, Tzong-Chen Wu |
GAnGS: gather, authenticate 'n group securely. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, MOBICOM 2008, San Francisco, California, USA, September 14-19, 2008, pp. 92-103, 2008, ACM, 978-1-60558-096-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
group protocol, operator error, security, key establishment |
Displaying result #701 - #800 of 989 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|