|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 859 occurrences of 387 keywords
|
|
|
Results
Found 989 publication records. Showing 989 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Ray Hunt |
PKI and digital certification infrastructure. |
ICON |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Tin-Wo Cheung, Samuel T. Chanson |
A PKI-Based End-to-End Secure Infrastructure for Mobile E-Commerce. |
FORTE |
2001 |
DBLP BibTeX RDF |
|
17 | Gregory G. Rose |
PKI/Cryptography. |
LISA |
2001 |
DBLP BibTeX RDF |
|
17 | Alexander Hertz |
Multifunctional Smart Card and PKI at the University of Mannheim. |
EUNIS |
2001 |
DBLP BibTeX RDF |
|
17 | Juanita J. Hung |
Ethical Dimensions of the UW-Madison PKI E-mail Security Usability Study. |
AMIA |
2001 |
DBLP BibTeX RDF |
|
17 | Carlos M. A. Costa, José Luís Oliveira, Augusto Silva |
A Trusted Brokering Service for PKI Interoperability and Thin-Clients Integration. |
ICEIS (2) |
2001 |
DBLP BibTeX RDF |
|
17 | Chris J. Mitchell |
PKI standards. |
Inf. Secur. Tech. Rep. |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Steve Matthews |
Authorization Models - PKI Versus the Real World. |
Inf. Secur. Tech. Rep. |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Robert Bickmore |
Implementing a PKI. |
Inf. Secur. Tech. Rep. |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Chris Sundt |
PKI - Panacea or Silver Bullet? |
Inf. Secur. Tech. Rep. |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Sixto Ortiz Jr. |
Will PKI Become a Key to Online Security? |
Computer |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Carl M. Ellison, Bruce Schneier |
Risks of PKI: E-Commerce. |
Commun. ACM |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Carl M. Ellison, Bruce Schneier |
Risks of PKI: Secure Email. |
Commun. ACM |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Angelos P. Varvitsiotis |
Scaling issues in large PKI communities. |
Future Gener. Comput. Syst. |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Bill Hancock |
Not Everyone Wants PKI NSF Opts for Digital Signature Alternativ. |
Comput. Secur. |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Carlisle M. Adams, Mike Burmester, Yvo Desmedt, Michael K. Reiter, Philip Zimmermann |
Which PKI (public key infrastructure) is the right one? (panel session). |
CCS |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Virgil D. Gligor |
Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Himanshu Khurana, Virgil D. Gligor |
Review and Revocation of Access Privileges Distributed with PKI Certificates. |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Maris A. Ozols, Marie Henderson, Chuchang Liu, Anthony Cant |
The PKI Specification Dilemma: A Formal Solution. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Audun Jøsang, Ingar Glenn Pedersen, Dean Povey |
PKI Seeks a Trusting Relationship. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Junseok Lee, Yeonjeong Jeong, Seongoun Hwang, Young B. Choi, Kisong Yoon, Myung-Joon Kim |
A Design of the Hybrid Messaging System (HMS) Based on PKI. |
PDPTA |
2000 |
DBLP BibTeX RDF |
|
17 | Nick Mansfield |
Designing a practical Public Key Infrastructure (PKI). |
Inf. Secur. Tech. Rep. |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Peter Landrock |
Challenging the conventional view of PKI - will it really work? |
Inf. Secur. Tech. Rep. |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Harry B. DeMaio |
Getting Started with PKI. |
Inf. Secur. J. A Glob. Perspect. |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Carl M. Ellison |
The nature of a useable PKI. |
Comput. Networks |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Thomas Hetschold |
PKI-Interoperabilität: PKIX und SigI im Vergleich. |
Datenschutz und Datensicherheit |
1999 |
DBLP BibTeX RDF |
|
17 | Jobst Biester |
MailTrusT-PKI-Spezifikation. |
Datenschutz und Datensicherheit |
1999 |
DBLP BibTeX RDF |
|
17 | Radia J. Perlman |
An overview of PKI trust models. |
IEEE Netw. |
1999 |
DBLP DOI BibTeX RDF |
|
17 | William J. Caelli, Ed Dawson, Scott A. Rea |
PKI, elliptic curve cryptography, and digital signatures. |
Comput. Secur. |
1999 |
DBLP DOI BibTeX RDF |
|
17 | John Hughes |
The Realities of PKI Inter-operability. |
CQRE |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Chenxi Wang, William A. Wulf |
Towards a Scalable PKI for Electronic Commerce Systems. |
WECWIS |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Qi He, Katia P. Sycara, Timothy W. Finin |
Personal Security Agent: KQML-Based PKI. |
Agents |
1998 |
DBLP DOI BibTeX RDF |
|
17 | J. Lee, K. Yoon |
Design of a System to Support Security Communication between a Web Proxy and a CGI Program Based on PKI. |
ICPADS |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Zhao Qiu, Mingrui Chen, Jun Huang |
A Study on CRL Issue by P2P Network. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
P2P, PKI, CRL |
17 | David O'Callaghan, Louise Doran, Brian A. Coghlan |
Evaluating trust in grid certificates. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
trust, grid, PKI |
17 | Ki-Woong Park, Sung Kyu Park, Jaesun Han, Kyu Ho Park |
THEMIS: Towards Mutually Verifiable Billing Transactions in the Cloud Computing Environment. |
IEEE CLOUD |
2010 |
DBLP DOI BibTeX RDF |
Cloud Computing, PKI, Non-Repudiation, Billing |
17 | Alastair Nisbet, Mohammed A. Rashid, Fakhrul Alam |
The Quest for Optimum Server Location Selection in Mobile Ad Hoc Networks Utilising Threshold Cryptography. |
ITNG |
2010 |
DBLP DOI BibTeX RDF |
Security, MANET, Wireless, Encryption, PKI |
17 | Hisashi Takahara, Motonori Nakamura |
Enhancement of SIP Signaling for Integrity Verification. |
SAINT |
2010 |
DBLP DOI BibTeX RDF |
SIP Identity, Proxy Authentication, ZRTP, PKI |
17 | Takahiro Fujishiro, Akane Sato, Yoko Kumagai, Tadashi Kaji, Kenichi Okada |
Development of Hi-Speed X.509 Certification Path Validation System. |
AINA Workshops |
2010 |
DBLP DOI BibTeX RDF |
Path Validation, Security, Certificate, PKI, X.509, Certification Path |
17 | Massimiliano Pala |
A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS). |
IDtrust |
2010 |
DBLP DOI BibTeX RDF |
distributed systems, peer-to-peer, PKI, federated identities |
17 | Mücahit Mutlugün, Oktay Adalier |
Turkish national electronic identity card. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
national identity card, biometrics, smart card, pki |
17 | Christopher Kunz, Jan Wiebelitz, Stefan Piger, Christian Grimm |
A Concept for Grid Credential Lifecycle Management and Heuristic Credential Abuse Detection. |
ISPDC |
2009 |
DBLP DOI BibTeX RDF |
abuse detection, Grid, PKI, auditing, X.509, proxy certificate |
17 | Martin Pirker, Ronald Toegl, Daniel M. Hein, Peter Danner |
A PrivacyCA for Anonymity and Trust. |
TRUST |
2009 |
DBLP DOI BibTeX RDF |
Java, Privacy, Virtualization, Trusted Computing, PKI, Trusted Computing Base |
17 | Bendik B. Mjaaland, Danilo Gligoroski, Svein J. Knapskog |
The Altinn Case Study: Proposal for a Large-Scale Public-Key Biometric Infrastructure. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
biocryptics, biometric encryption, biometrics, fingerprint, PKI, public key |
17 | Sarbari Gupta |
Personal identity verification (PIV) cards as federated identities: challenges and opportunities. |
IDtrust |
2009 |
DBLP DOI BibTeX RDF |
federal bridge certification authority, authentication, authorization, smart cards, PKI, assurance |
17 | Hyun-Chul Kim, Hong-Woo Lee, Kyung-Seok Lee, Moon-Seog Jun |
A Design of One-Time Password Mechanism Using Public Key Infrastructure. |
NCM (1) |
2008 |
DBLP DOI BibTeX RDF |
Certificate, PKI, One-time password |
17 | Takeshi Nishimura, Hiroyuki Sato |
LESSO: Legacy Enabling SSO. |
SAINT |
2008 |
DBLP DOI BibTeX RDF |
authentication, web application, PKI, SSO |
17 | David Bauer, Douglas M. Blough, David Cash |
Minimal information disclosure with efficiently verifiable credentials. |
Digital Identity Management |
2008 |
DBLP DOI BibTeX RDF |
hash-tree, identity assertion, privacy, PKI, identity management, credential, merkle tree |
17 | Thomas Ristenpart, Scott Yilek |
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
Proofs of possession, PKI, bilinear maps, ring signatures, multisignatures |
17 | Ian D. Alderman, Miron Livny |
Task-specific restricted delegation. |
HPDC |
2007 |
DBLP DOI BibTeX RDF |
distributed batch computing, security, PKI |
17 | R. Radhakrishnan, Majid Jamil, Shabana Mehfuz, Moinuddin Moinuddin |
Security issues in IPv6. |
ICNS |
2007 |
DBLP DOI BibTeX RDF |
TCP/IP, IPv6, PKI, IPSec, NAT, IKE, CGA |
17 | Nick Pope, Juan Carlos Cruellas |
Oasis Digital Signature Services: Digital Signing without the Headaches. |
IEEE Internet Comput. |
2006 |
DBLP DOI BibTeX RDF |
DSS, digital signature, PKI, public-key infrastructure |
17 | Jean-Sébastien Coron |
What Is Cryptography? |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
security, cryptography, PKI, public key |
17 | Mikkel Hippe Brun, Christian Lanng |
Reducing barriers for e-business in SME's through an open service oriented infrastructure. |
ICEC |
2006 |
DBLP DOI BibTeX RDF |
EdiFact, OIOXML, interoperability, integration, digital signatures, business process, e-business, PKI, WSDL, EDI, procurement, UDDI, eCommerce, purchasing, UBL, data interchange |
17 | Jiho Kim, Duhyun Bae, Sehyun Park, Ohyoung Song |
Enhanced Security Scheme for Managing Heterogeneous Server Platforms. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
security server management, access control, PKI, single sign on |
17 | Alexander Iliev, Sean W. Smith |
Protecting Client Privacy with Trusted Computing at the Server. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
Secure coprocessor, Oblivious RAM, network traffic archival, prototype, PKI, Private Information Retrieval |
17 | Ulrike Meyer, Jared Cordasco, Susanne Wetzel |
An approach to enhance inter-provider roaming through secret sharing and its application to WLANs. |
WMASH |
2005 |
DBLP DOI BibTeX RDF |
EAP-TLS-KS, distributed DSS, inter-provider roaming, micropayment scheme, WLAN, secret sharing, PKI, 802.11i |
17 | Sang Seok Lim, Jong Hyuk Choi, Kurt D. Zeilenga |
Secure and flexible certificate access in WS-security through LDAP component matching. |
SWS |
2004 |
DBLP DOI BibTeX RDF |
certificate repository, component matching, PKI, LDAP, X.509 certificate |
17 | Germano Caronni |
Walking the Web of Trust. |
WETICE |
2000 |
DBLP DOI BibTeX RDF |
Heuristic Trust Calculation, PKI, Web of Trust |
17 | David Henry |
Who's Got the Key? |
SIGUCCS |
1999 |
DBLP DOI BibTeX RDF |
encryption, PKI, certificate authority |
16 | Hao Yang 0004, Eric Osterweil, Daniel Massey, Songwu Lu, Lixia Zhang 0001 |
Deploying Cryptography in Internet-Scale Systems: A Case Study on DNSSEC. |
IEEE Trans. Dependable Secur. Comput. |
2011 |
DBLP DOI BibTeX RDF |
PKI hierarchy, incremental deployment, key rollover, heterogeneous operations, distributed monitoring, key revocation, DNSSEC |
16 | H. Gilbert Miller, James L. Fisher |
Requiring Strong Credentials: What's Taking So Long?. |
IT Prof. |
2010 |
DBLP DOI BibTeX RDF |
Smart IT, authentication, authorization, cybersecurity, digital certificates, public-key infrastructure (PKI) |
16 | Ryu Watanabe, Toshiaki Tanaka |
Federated Authentication Mechanism using Cellular Phone - Collaboration with OpenID. |
ITNG |
2009 |
DBLP DOI BibTeX RDF |
ID federation, mobile PKI, network security, privacy protection |
16 | Jon A. Solworth |
Beacon certificate push revocation. |
CSAW |
2008 |
DBLP DOI BibTeX RDF |
authentication, certificate, public key infrastructure (pki), revocation |
16 | Cristina Satizábal, Jordi Forné, Rafael Martínez-Peláez, Francisco Rico-Novella |
Hierarchical Trust Architecture in a Mobile Ad-Hoc Network Using Ant Algorithms. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Certification Architectures, Ad-Hoc Networks, Ant Algorithms, Public Key Infrastructure (PKI), Certification Path |
16 | Cheng Yang, Jianbo Liu, Aina Sui, Yongbin Wang |
A Digital Rights Management Architecture for Multimedia in P2P. |
PAKDD Workshops |
2007 |
DBLP DOI BibTeX RDF |
Identity Authentication, Digital Watermarking, Peer-to-Peer (P2P), Public Key Infrastructure (PKI), Digital Rights Management (DRM) |
16 | Athanasios Moralis, Vassiliki Pouli, Mary Grammatikou, Symeon Papavassiliou, Vasilis Maglaris |
Performance Comparison of Web Services Security: Kerberos Token Profile Against X.509 Token Profile. |
ICNS |
2007 |
DBLP DOI BibTeX RDF |
Web Services Security (WSS), Web Services, Kerberos, Public Key Infrastructure (PKI), X.509 |
16 | Somasekhar Vemulapalli, Mahantesh Halappanavar, Ravi Mukkamala |
Security in Distributed Digital Libraries: Issues and Challenges . |
ICPP Workshops |
2002 |
DBLP DOI BibTeX RDF |
Distributed Digital Library (DDL), Quality-of-Service (QoS) and Security, Performance, Kerberos, Public-Key Infrastructure (PKI) |
16 | Man-Chi Pong |
EC-SignGate: Electronic Contract Signing Gateway. |
COMPSAC |
2001 |
DBLP DOI BibTeX RDF |
web-based e-business, digital signature, public key infrastructure (PKI) |
10 | Gregory Neven |
Privacy-enhanced access control in primelife. |
Digital Identity Management |
2010 |
DBLP DOI BibTeX RDF |
|
10 | Ebrima N. Ceesay, Coimbatore Chandersekaran, William R. Simpson |
An authentication model for delegation, attribution and least privilege. |
PETRA |
2010 |
DBLP DOI BibTeX RDF |
WS-*, security assertion markup language (SAML), authentication, authorization, delegation, public key infrastructure, attribution, credentialing, least privilege |
10 | Chung-Ming Ou, Chung-Ren Ou |
Security of Intelligent Agents in the Web-Based Applications. |
Intelligent Agents in the Evolution of Web and Applications |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Dario Catalano, Dario Fiore 0001, Rosario Gennaro |
Certificateless onion routing. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
anonymity, onion routing, certificateless cryptography |
10 | Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy |
TruWallet: trustworthy and migratable wallet-based web authentication. |
STC |
2009 |
DBLP DOI BibTeX RDF |
password wallet, secure migration, trusted computing, phishing, identity theft |
10 | Yike Yu, Xuefeng Zheng, Mingde Zhang, Qingguo Zhang |
An Identity-Based Authentication Model for Mobile Agent. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Vijay Laxmi, Mudassar N. Khan, Sarath S. Kumar, Manoj Singh Gaur |
Buyer seller watermarking protocol for digital rights management. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
buyer-seller protocol, unbinding., watermark, digital rights management, certificate authority, piracy |
10 | Cong Tang, Ruichuan Chen, Zhuhua Cai, Anmin Xie, Jian-bin Hu, Liyong Tang, Zhong Chen 0001 |
Securing key issuing in peer-to-peer networks. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Jing Sun 0009, Huiqun Zhao, Huibing Xiao, Gongzhu Hu |
Lightweight Public Key Infrastructure and Service Relation Model for Designing a Trustworthy ONS. |
ACIS-ICIS |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Kanokwan Kanyamee, Chanboon Sathitwiriyawong |
High-Availability Decentralized Multi-Agent Key Recovery System. |
ACIS-ICIS |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Yevgeniy Dodis, Jonathan Katz, Adam D. Smith, Shabsi Walfish |
Composability and On-Line Deniability of Authentication. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Ivan Damgård, Jesper Buus Nielsen, Daniel Wichs |
Universally Composable Multiparty Computation with Partially Isolated Parties. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
public-key infrastructure, multiparty computation, universally composable security |
10 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
A-COLD: Access Control of Web OLAP over Multi-data Warehouse. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Gauthier Van Damme, Karel Wouters, Hakan Karahan, Bart Preneel |
Offline NFC payments with electronic vouchers. |
MobiHeld |
2009 |
DBLP DOI BibTeX RDF |
Nokia, voucher, security, NFC |
10 | Yudith Cardinale, Jesús De Oliveira, Carlos Figueira |
Dynamic and Secure Data Access Extensions of Grid Boundaries. |
GPC |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Julien Cathalo, Benoît Libert, Moti Yung |
Group Encryption: Non-interactive Realization in the Standard Model. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Group encryption, anonymity, provable security |
10 | Mansoor Alicherry, Angelos D. Keromytis |
DoubleCheck: Multi-path verification against man-in-the-middle attacks. |
ISCC |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Jong Sik Moon, Deok-Gyu Lee, Im-Yeong Lee |
Device Authentication/Authorization Protocol for Home Network in Next Generation Security. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Authentication, Authorization, Home Network, Roaming |
10 | Jose L. Muñoz, Oscar Esparza, Carlos Gañán, Javier Parra-Arnau |
PKIX Certificate Status in Hybrid MANETs. |
WISTP |
2009 |
DBLP DOI BibTeX RDF |
Hybrid MANET, Certification, Risk, Public Key Infrastructure, Revocation |
10 | Ronald Kainda, Ivan Flechais, A. W. Roscoe 0001 |
Usability and security of out-of-band channels in secure device pairing protocols. |
SOUPS |
2009 |
DBLP DOI BibTeX RDF |
pairing devices, usability, security protocols |
10 | Jianhong Zhang, Hua Chen, Qin Geng |
Efficient and Provably Secure Self-certified Signature Scheme. |
AMT |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Khoongming Khoo, Ford-Long Wong, Chu-Wee Lim |
On a Construction of Short Digests for Authenticating Ad Hoc Networks. |
ICCSA (2) |
2009 |
DBLP DOI BibTeX RDF |
ad hoc networks, authentication, hash, digest |
10 | Daisuke Moriyama, Tatsuaki Okamoto |
An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Benoît Libert, Damien Vergnaud |
Adaptive-ID Secure Revocable Identity-Based Encryption. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
provable security, revocation, Identity-based encryption |
10 | S. Britto R. Kumar, S. Albert Rabara, J. Ronald Martin |
MPCS: a secure Mobile Payment Consortia System for higher educational institutions. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
mobile payment consortia, secured transactions, software architecture, framework, mobile payment |
10 | Xiaodong Lin 0001, Xiaoting Sun, Xiaoyu Wang 0010, Chenxi Zhang, Pin-Han Ho, Xuemin Shen |
TSVC: timed efficient and secure vehicular communications with privacy preserving. |
IEEE Trans. Wirel. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Taekyoung Kwon 0002, Hyeonjoon Moon |
Biometric Authentication for Border Control Applications. |
IEEE Trans. Knowl. Data Eng. |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Shahriar Mohammadi, Sanaz Abedi |
ECC-Based Biometric Signature: A New Approach in Electronic Banking Security. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
biometeric signature, electronic banking, ECC |
10 | Zhun Cai |
A Password-Based Grid Security Infrastructure. |
ICDS |
2008 |
DBLP DOI BibTeX RDF |
AKE, EKE, Authentication, Delegation, Grid Security |
10 | Huafei Zhu, Feng Bao 0001, Robert H. Deng |
Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Chia-Hsin Owen Chen, Chung-Wei Chen, Cynthia Kuo, Yan-Hao Lai, Jonathan M. McCune, Ahren Studer, Adrian Perrig, Bo-Yin Yang, Tzong-Chen Wu |
GAnGS: gather, authenticate 'n group securely. |
MobiCom |
2008 |
DBLP DOI BibTeX RDF |
group protocol, operator error, security, key establishment |
Displaying result #701 - #800 of 989 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|