The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for PKI with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1995-1999 (31) 2000 (27) 2001 (30) 2002 (39) 2003 (72) 2004 (76) 2005 (94) 2006 (89) 2007 (108) 2008 (86) 2009 (62) 2010 (30) 2011 (29) 2012-2013 (28) 2014 (16) 2015-2016 (30) 2017 (25) 2018 (26) 2019 (16) 2020 (19) 2021 (20) 2022 (21) 2023-2024 (15)
Publication types (Num. hits)
article(202) book(1) incollection(12) inproceedings(765) phdthesis(5) proceedings(4)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 859 occurrences of 387 keywords

Results
Found 989 publication records. Showing 989 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Ray Hunt PKI and digital certification infrastructure. Search on Bibsonomy ICON The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Tin-Wo Cheung, Samuel T. Chanson A PKI-Based End-to-End Secure Infrastructure for Mobile E-Commerce. Search on Bibsonomy FORTE The full citation details ... 2001 DBLP  BibTeX  RDF
17Gregory G. Rose PKI/Cryptography. Search on Bibsonomy LISA The full citation details ... 2001 DBLP  BibTeX  RDF
17Alexander Hertz Multifunctional Smart Card and PKI at the University of Mannheim. Search on Bibsonomy EUNIS The full citation details ... 2001 DBLP  BibTeX  RDF
17Juanita J. Hung Ethical Dimensions of the UW-Madison PKI E-mail Security Usability Study. Search on Bibsonomy AMIA The full citation details ... 2001 DBLP  BibTeX  RDF
17Carlos M. A. Costa, José Luís Oliveira, Augusto Silva A Trusted Brokering Service for PKI Interoperability and Thin-Clients Integration. Search on Bibsonomy ICEIS (2) The full citation details ... 2001 DBLP  BibTeX  RDF
17Chris J. Mitchell PKI standards. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Steve Matthews Authorization Models - PKI Versus the Real World. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Robert Bickmore Implementing a PKI. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Chris Sundt PKI - Panacea or Silver Bullet? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Sixto Ortiz Jr. Will PKI Become a Key to Online Security? Search on Bibsonomy Computer The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Carl M. Ellison, Bruce Schneier Risks of PKI: E-Commerce. Search on Bibsonomy Commun. ACM The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Carl M. Ellison, Bruce Schneier Risks of PKI: Secure Email. Search on Bibsonomy Commun. ACM The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Angelos P. Varvitsiotis Scaling issues in large PKI communities. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Bill Hancock Not Everyone Wants PKI NSF Opts for Digital Signature Alternativ. Search on Bibsonomy Comput. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Carlisle M. Adams, Mike Burmester, Yvo Desmedt, Michael K. Reiter, Philip Zimmermann Which PKI (public key infrastructure) is the right one? (panel session). Search on Bibsonomy CCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Virgil D. Gligor Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Himanshu Khurana, Virgil D. Gligor Review and Revocation of Access Privileges Distributed with PKI Certificates. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Maris A. Ozols, Marie Henderson, Chuchang Liu, Anthony Cant The PKI Specification Dilemma: A Formal Solution. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Audun Jøsang, Ingar Glenn Pedersen, Dean Povey PKI Seeks a Trusting Relationship. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Junseok Lee, Yeonjeong Jeong, Seongoun Hwang, Young B. Choi, Kisong Yoon, Myung-Joon Kim A Design of the Hybrid Messaging System (HMS) Based on PKI. Search on Bibsonomy PDPTA The full citation details ... 2000 DBLP  BibTeX  RDF
17Nick Mansfield Designing a practical Public Key Infrastructure (PKI). Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Peter Landrock Challenging the conventional view of PKI - will it really work? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Harry B. DeMaio Getting Started with PKI. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Carl M. Ellison The nature of a useable PKI. Search on Bibsonomy Comput. Networks The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Thomas Hetschold PKI-Interoperabilität: PKIX und SigI im Vergleich. Search on Bibsonomy Datenschutz und Datensicherheit The full citation details ... 1999 DBLP  BibTeX  RDF
17Jobst Biester MailTrusT-PKI-Spezifikation. Search on Bibsonomy Datenschutz und Datensicherheit The full citation details ... 1999 DBLP  BibTeX  RDF
17Radia J. Perlman An overview of PKI trust models. Search on Bibsonomy IEEE Netw. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17William J. Caelli, Ed Dawson, Scott A. Rea PKI, elliptic curve cryptography, and digital signatures. Search on Bibsonomy Comput. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17John Hughes The Realities of PKI Inter-operability. Search on Bibsonomy CQRE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Chenxi Wang, William A. Wulf Towards a Scalable PKI for Electronic Commerce Systems. Search on Bibsonomy WECWIS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Qi He, Katia P. Sycara, Timothy W. Finin Personal Security Agent: KQML-Based PKI. Search on Bibsonomy Agents The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17J. Lee, K. Yoon Design of a System to Support Security Communication between a Web Proxy and a CGI Program Based on PKI. Search on Bibsonomy ICPADS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Zhao Qiu, Mingrui Chen, Jun Huang A Study on CRL Issue by P2P Network. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF P2P, PKI, CRL
17David O'Callaghan, Louise Doran, Brian A. Coghlan Evaluating trust in grid certificates. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF trust, grid, PKI
17Ki-Woong Park, Sung Kyu Park, Jaesun Han, Kyu Ho Park THEMIS: Towards Mutually Verifiable Billing Transactions in the Cloud Computing Environment. Search on Bibsonomy IEEE CLOUD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Cloud Computing, PKI, Non-Repudiation, Billing
17Alastair Nisbet, Mohammed A. Rashid, Fakhrul Alam The Quest for Optimum Server Location Selection in Mobile Ad Hoc Networks Utilising Threshold Cryptography. Search on Bibsonomy ITNG The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Security, MANET, Wireless, Encryption, PKI
17Hisashi Takahara, Motonori Nakamura Enhancement of SIP Signaling for Integrity Verification. Search on Bibsonomy SAINT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF SIP Identity, Proxy Authentication, ZRTP, PKI
17Takahiro Fujishiro, Akane Sato, Yoko Kumagai, Tadashi Kaji, Kenichi Okada Development of Hi-Speed X.509 Certification Path Validation System. Search on Bibsonomy AINA Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Path Validation, Security, Certificate, PKI, X.509, Certification Path
17Massimiliano Pala A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS). Search on Bibsonomy IDtrust The full citation details ... 2010 DBLP  DOI  BibTeX  RDF distributed systems, peer-to-peer, PKI, federated identities
17Mücahit Mutlugün, Oktay Adalier Turkish national electronic identity card. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF national identity card, biometrics, smart card, pki
17Christopher Kunz, Jan Wiebelitz, Stefan Piger, Christian Grimm A Concept for Grid Credential Lifecycle Management and Heuristic Credential Abuse Detection. Search on Bibsonomy ISPDC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF abuse detection, Grid, PKI, auditing, X.509, proxy certificate
17Martin Pirker, Ronald Toegl, Daniel M. Hein, Peter Danner A PrivacyCA for Anonymity and Trust. Search on Bibsonomy TRUST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Java, Privacy, Virtualization, Trusted Computing, PKI, Trusted Computing Base
17Bendik B. Mjaaland, Danilo Gligoroski, Svein J. Knapskog The Altinn Case Study: Proposal for a Large-Scale Public-Key Biometric Infrastructure. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF biocryptics, biometric encryption, biometrics, fingerprint, PKI, public key
17Sarbari Gupta Personal identity verification (PIV) cards as federated identities: challenges and opportunities. Search on Bibsonomy IDtrust The full citation details ... 2009 DBLP  DOI  BibTeX  RDF federal bridge certification authority, authentication, authorization, smart cards, PKI, assurance
17Hyun-Chul Kim, Hong-Woo Lee, Kyung-Seok Lee, Moon-Seog Jun A Design of One-Time Password Mechanism Using Public Key Infrastructure. Search on Bibsonomy NCM (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Certificate, PKI, One-time password
17Takeshi Nishimura, Hiroyuki Sato LESSO: Legacy Enabling SSO. Search on Bibsonomy SAINT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication, web application, PKI, SSO
17David Bauer, Douglas M. Blough, David Cash Minimal information disclosure with efficiently verifiable credentials. Search on Bibsonomy Digital Identity Management The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash-tree, identity assertion, privacy, PKI, identity management, credential, merkle tree
17Thomas Ristenpart, Scott Yilek The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Proofs of possession, PKI, bilinear maps, ring signatures, multisignatures
17Ian D. Alderman, Miron Livny Task-specific restricted delegation. Search on Bibsonomy HPDC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distributed batch computing, security, PKI
17R. Radhakrishnan, Majid Jamil, Shabana Mehfuz, Moinuddin Moinuddin Security issues in IPv6. Search on Bibsonomy ICNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF TCP/IP, IPv6, PKI, IPSec, NAT, IKE, CGA
17Nick Pope, Juan Carlos Cruellas Oasis Digital Signature Services: Digital Signing without the Headaches. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DSS, digital signature, PKI, public-key infrastructure
17Jean-Sébastien Coron What Is Cryptography? Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, cryptography, PKI, public key
17Mikkel Hippe Brun, Christian Lanng Reducing barriers for e-business in SME's through an open service oriented infrastructure. Search on Bibsonomy ICEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF EdiFact, OIOXML, interoperability, integration, digital signatures, business process, e-business, PKI, WSDL, EDI, procurement, UDDI, eCommerce, purchasing, UBL, data interchange
17Jiho Kim, Duhyun Bae, Sehyun Park, Ohyoung Song Enhanced Security Scheme for Managing Heterogeneous Server Platforms. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security server management, access control, PKI, single sign on
17Alexander Iliev, Sean W. Smith Protecting Client Privacy with Trusted Computing at the Server. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Secure coprocessor, Oblivious RAM, network traffic archival, prototype, PKI, Private Information Retrieval
17Ulrike Meyer, Jared Cordasco, Susanne Wetzel An approach to enhance inter-provider roaming through secret sharing and its application to WLANs. Search on Bibsonomy WMASH The full citation details ... 2005 DBLP  DOI  BibTeX  RDF EAP-TLS-KS, distributed DSS, inter-provider roaming, micropayment scheme, WLAN, secret sharing, PKI, 802.11i
17Sang Seok Lim, Jong Hyuk Choi, Kurt D. Zeilenga Secure and flexible certificate access in WS-security through LDAP component matching. Search on Bibsonomy SWS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF certificate repository, component matching, PKI, LDAP, X.509 certificate
17Germano Caronni Walking the Web of Trust. Search on Bibsonomy WETICE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Heuristic Trust Calculation, PKI, Web of Trust
17David Henry Who's Got the Key? Search on Bibsonomy SIGUCCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF encryption, PKI, certificate authority
16Hao Yang 0004, Eric Osterweil, Daniel Massey, Songwu Lu, Lixia Zhang 0001 Deploying Cryptography in Internet-Scale Systems: A Case Study on DNSSEC. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF PKI hierarchy, incremental deployment, key rollover, heterogeneous operations, distributed monitoring, key revocation, DNSSEC
16H. Gilbert Miller, James L. Fisher Requiring Strong Credentials: What's Taking So Long?. Search on Bibsonomy IT Prof. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Smart IT, authentication, authorization, cybersecurity, digital certificates, public-key infrastructure (PKI)
16Ryu Watanabe, Toshiaki Tanaka Federated Authentication Mechanism using Cellular Phone - Collaboration with OpenID. Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ID federation, mobile PKI, network security, privacy protection
16Jon A. Solworth Beacon certificate push revocation. Search on Bibsonomy CSAW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication, certificate, public key infrastructure (pki), revocation
16Cristina Satizábal, Jordi Forné, Rafael Martínez-Peláez, Francisco Rico-Novella Hierarchical Trust Architecture in a Mobile Ad-Hoc Network Using Ant Algorithms. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Certification Architectures, Ad-Hoc Networks, Ant Algorithms, Public Key Infrastructure (PKI), Certification Path
16Cheng Yang, Jianbo Liu, Aina Sui, Yongbin Wang A Digital Rights Management Architecture for Multimedia in P2P. Search on Bibsonomy PAKDD Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Identity Authentication, Digital Watermarking, Peer-to-Peer (P2P), Public Key Infrastructure (PKI), Digital Rights Management (DRM)
16Athanasios Moralis, Vassiliki Pouli, Mary Grammatikou, Symeon Papavassiliou, Vasilis Maglaris Performance Comparison of Web Services Security: Kerberos Token Profile Against X.509 Token Profile. Search on Bibsonomy ICNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Web Services Security (WSS), Web Services, Kerberos, Public Key Infrastructure (PKI), X.509
16Somasekhar Vemulapalli, Mahantesh Halappanavar, Ravi Mukkamala Security in Distributed Digital Libraries: Issues and Challenges . Search on Bibsonomy ICPP Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Distributed Digital Library (DDL), Quality-of-Service (QoS) and Security, Performance, Kerberos, Public-Key Infrastructure (PKI)
16Man-Chi Pong EC-SignGate: Electronic Contract Signing Gateway. Search on Bibsonomy COMPSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF web-based e-business, digital signature, public key infrastructure (PKI)
10Gregory Neven Privacy-enhanced access control in primelife. Search on Bibsonomy Digital Identity Management The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
10Ebrima N. Ceesay, Coimbatore Chandersekaran, William R. Simpson An authentication model for delegation, attribution and least privilege. Search on Bibsonomy PETRA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF WS-*, security assertion markup language (SAML), authentication, authorization, delegation, public key infrastructure, attribution, credentialing, least privilege
10Chung-Ming Ou, Chung-Ren Ou Security of Intelligent Agents in the Web-Based Applications. Search on Bibsonomy Intelligent Agents in the Evolution of Web and Applications The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Dario Catalano, Dario Fiore 0001, Rosario Gennaro Certificateless onion routing. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anonymity, onion routing, certificateless cryptography
10Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy TruWallet: trustworthy and migratable wallet-based web authentication. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF password wallet, secure migration, trusted computing, phishing, identity theft
10Yike Yu, Xuefeng Zheng, Mingde Zhang, Qingguo Zhang An Identity-Based Authentication Model for Mobile Agent. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Vijay Laxmi, Mudassar N. Khan, Sarath S. Kumar, Manoj Singh Gaur Buyer seller watermarking protocol for digital rights management. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF buyer-seller protocol, unbinding., watermark, digital rights management, certificate authority, piracy
10Cong Tang, Ruichuan Chen, Zhuhua Cai, Anmin Xie, Jian-bin Hu, Liyong Tang, Zhong Chen 0001 Securing key issuing in peer-to-peer networks. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Jing Sun 0009, Huiqun Zhao, Huibing Xiao, Gongzhu Hu Lightweight Public Key Infrastructure and Service Relation Model for Designing a Trustworthy ONS. Search on Bibsonomy ACIS-ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Kanokwan Kanyamee, Chanboon Sathitwiriyawong High-Availability Decentralized Multi-Agent Key Recovery System. Search on Bibsonomy ACIS-ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Yevgeniy Dodis, Jonathan Katz, Adam D. Smith, Shabsi Walfish Composability and On-Line Deniability of Authentication. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Ivan Damgård, Jesper Buus Nielsen, Daniel Wichs Universally Composable Multiparty Computation with Partially Isolated Parties. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF public-key infrastructure, multiparty computation, universally composable security
10Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt A-COLD: Access Control of Web OLAP over Multi-data Warehouse. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Gauthier Van Damme, Karel Wouters, Hakan Karahan, Bart Preneel Offline NFC payments with electronic vouchers. Search on Bibsonomy MobiHeld The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Nokia, voucher, security, NFC
10Yudith Cardinale, Jesús De Oliveira, Carlos Figueira Dynamic and Secure Data Access Extensions of Grid Boundaries. Search on Bibsonomy GPC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Julien Cathalo, Benoît Libert, Moti Yung Group Encryption: Non-interactive Realization in the Standard Model. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Group encryption, anonymity, provable security
10Mansoor Alicherry, Angelos D. Keromytis DoubleCheck: Multi-path verification against man-in-the-middle attacks. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Jong Sik Moon, Deok-Gyu Lee, Im-Yeong Lee Device Authentication/Authorization Protocol for Home Network in Next Generation Security. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Authentication, Authorization, Home Network, Roaming
10Jose L. Muñoz, Oscar Esparza, Carlos Gañán, Javier Parra-Arnau PKIX Certificate Status in Hybrid MANETs. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hybrid MANET, Certification, Risk, Public Key Infrastructure, Revocation
10Ronald Kainda, Ivan Flechais, A. W. Roscoe 0001 Usability and security of out-of-band channels in secure device pairing protocols. Search on Bibsonomy SOUPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF pairing devices, usability, security protocols
10Jianhong Zhang, Hua Chen, Qin Geng Efficient and Provably Secure Self-certified Signature Scheme. Search on Bibsonomy AMT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Khoongming Khoo, Ford-Long Wong, Chu-Wee Lim On a Construction of Short Digests for Authenticating Ad Hoc Networks. Search on Bibsonomy ICCSA (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ad hoc networks, authentication, hash, digest
10Daisuke Moriyama, Tatsuaki Okamoto An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Benoît Libert, Damien Vergnaud Adaptive-ID Secure Revocable Identity-Based Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF provable security, revocation, Identity-based encryption
10S. Britto R. Kumar, S. Albert Rabara, J. Ronald Martin MPCS: a secure Mobile Payment Consortia System for higher educational institutions. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mobile payment consortia, secured transactions, software architecture, framework, mobile payment
10Xiaodong Lin 0001, Xiaoting Sun, Xiaoyu Wang 0010, Chenxi Zhang, Pin-Han Ho, Xuemin Shen TSVC: timed efficient and secure vehicular communications with privacy preserving. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Taekyoung Kwon 0002, Hyeonjoon Moon Biometric Authentication for Border Control Applications. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Shahriar Mohammadi, Sanaz Abedi ECC-Based Biometric Signature: A New Approach in Electronic Banking Security. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF biometeric signature, electronic banking, ECC
10Zhun Cai A Password-Based Grid Security Infrastructure. Search on Bibsonomy ICDS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AKE, EKE, Authentication, Delegation, Grid Security
10Huafei Zhu, Feng Bao 0001, Robert H. Deng Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Chia-Hsin Owen Chen, Chung-Wei Chen, Cynthia Kuo, Yan-Hao Lai, Jonathan M. McCune, Ahren Studer, Adrian Perrig, Bo-Yin Yang, Tzong-Chen Wu GAnGS: gather, authenticate 'n group securely. Search on Bibsonomy MobiCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF group protocol, operator error, security, key establishment
Displaying result #701 - #800 of 989 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license