|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 859 occurrences of 387 keywords
|
|
|
Results
Found 989 publication records. Showing 989 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
10 | Chung-Ming Ou, Chung-Ren Ou, Yao-Tien Wang |
Security of Mobile Agent-Based Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 107-112, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi |
Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 1225-1230, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Ali Khalili, Shahriar Mohammadi |
Using Logically Hierarchical Meta Web Services to Support Accountability in Mashup Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 410-415, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Jian Wu, Zhimin Huang |
Proxy-Based Web Service Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 1282-1288, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Bing H. Cheung |
Data analysis on mobile ad-hoc networks with commercial pre-wimax, EVDO and Wi-Fi products. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PE-WASUN ![In: Proceedings of the 5th ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, PE-WASUN 2008, Vancouver, British Columbia, Canada, October 27-28, 2008, pp. 15-18, 2008, ACM, 978-1-60558-236-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
evdo, wimax, ad-hoc, wi-fi, vpn, high speed, wlan, data rates |
10 | Tong-Lee Lim, Anantharaman Lakshminarayanan, Vira Saksen |
A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pp. 392-410, 2008, 978-3-540-68913-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Yang Lu 0001, Jiguo Li 0001, Junmo Xiao |
Generic Construction of Certificate-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 1589-1594, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Zecheng Wang, Taozhi Si, Haifeng Qian, Zhibin Li 0005 |
A CDH-Based Multi-Signature Scheme with Tight Security Reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2096-2101, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Paul Rabinovich |
ECL: A TLS Extension for Authentication in Complex PKIs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2210-2215, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Izumi Fuse, Shigeto Okabe, Takashi Yamanoue, Atsushi Nakamura, Michio Nakanishi, Shozo Fukada, Takahiro Tagawa, Tatsumi Takeo, Ikuya Murata, Tetsutaro Uehara, Tsuneo Yamada |
Improving computer ethics video clips for higher education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 36th Annual ACM SIGUCCS Conference on User Services 2008, Portland, OR, USA, October 19-22, 2008, pp. 235-242, 2008, ACM, 978-1-60558-074-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
educational material, information security, computer ethics, video clips |
10 | Kai Hwang 0001 |
Massively Distributed Systems : From Grids and P2P to Clouds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GPC ![In: Advances in Grid and Pervasive Computing, Third International Conference, GPC 2008, Kunming, China, May 25-28, 2008. Proceedings, pp. 1, 2008, Springer, 978-3-540-68081-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Florina Almenárez, Andrés Marín López, Daniel Díaz Sánchez, Alberto Cortés, Celeste Campo, Carlos García-Rubio |
Building an Open Toolkit of Digital Certificate Validation for Mobile Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 17-21 March 2008, Hong Kong, pp. 560-565, 2008, IEEE Computer Society, 978-0-7695-3113-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
certificate validation, open toolkit, X.509 certificates |
10 | Miranda Mowbray, Antonio Lain |
Dominator-tree analysis for distributed authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, PLAS 2008, Tucson, AZ, USA, June 8, 2008, pp. 101-112, 2008, ACM, 978-1-59593-936-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control, dominator tree, distributed authorization |
10 | Liang Yan, Chunming Rong |
RFID System Security Using Identity-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 482-489, 2008, Springer, 978-3-540-69292-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Deqing Zou, Jong Hyuk Park, Laurence Tianruo Yang, Zhensong Liao, Tai-Hoon Kim |
A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 35-45, 2008, Springer, 978-3-540-69292-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang |
An On-Line Secure E-Passport Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 14-28, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Liu Peng, Zong Rui, Liu Sizuo |
A New Model for Authentication and Authorization across Heterogeneous Trust-Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 789-792, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Yiling Wen, Jianfeng Ma 0001 |
An Aggregate Signature Scheme with Constant Pairing Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 830-833, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Guoyan Zhang, Shaohui Wang |
A Certificateless Signature and Group Signature Schemes against Malicious PKG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, GinoWan, Okinawa, Japan, March 25-28, 2008, pp. 334-341, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
malicious PKG, group signature, certificateless signature |
10 | Wen-Chao Yang, Che-Yen Wen, Chung-Hao Chen |
Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 278-287, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Integrity, Public-key Cryptography, Digital Image, Credibility, Digital Image Forensic |
10 | Chung-Ming Ou, Chung-Ren Ou |
SETNR/A: An Agent-Based Secure Payment Protocol for Mobile Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES-AMSTA ![In: Agent and Multi-Agent Systems: Technologies and Applications, Second KES International Symposium, KES-AMSTA 2008, Incheon, Korea, March 26-28, 2008. Proceedings, pp. 574-583, 2008, Springer, 978-3-540-78581-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Ahren Studer, Christina Johns, Jaanus Kase, Kyle O'Meara, Lorrie Faith Cranor |
A Survey to Guide Group Key Protocol Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 475-484, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Guang Yao, Jun Bi |
A CGAbased IP source address authentication method in IPv6 access network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings, pp. 534-535, 2008, IEEE Computer Society, 978-1-4244-2412-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Antonio Ruiz-Martínez, Daniel Sánchez-Martínez, C. Inmaculada Marín-López, Manuel Gil Pérez, Antonio Fernandez Gómez-Skarmeta |
ACVS: An Advanced Certificate Validation Service in Service-Oriented Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIW ![In: Third International Conference on Internet and Web Applications and Services, ICIW 2008, 8-13 June 2008, Athens, Greece, pp. 297-302, 2008, IEEE Computer Society, 978-0-7695-3163-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
certificate validation, xkms, long term validation |
10 | Apu Kapadia |
A Case (Study) For Usability in Secure Email Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(2), pp. 80-84, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Sebastian Rieger, Bernhard Neumair |
Towards usable and reasonable Identity Management in heterogeneous IT infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Integrated Network Management ![In: Integrated Network Management, IM 2007. 10th IFIP/IEEE International Symposium on Integrated Network Management, Munich, Germany, 21-25 May 2007, pp. 560-574, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Zuhua Shao |
Self-certified Signatures Based on Discrete Logarithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIFI ![In: Arithmetic of Finite Fields, First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007, Proceedings, pp. 252-263, 2007, Springer, 978-3-540-73073-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Self-certified public key signature, Discrete logarithm, strong unforgeability |
10 | Luigi Liquori, Michel Cosnard |
Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TGC ![In: Trustworthy Global Computing, Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers, pp. 90-107, 2007, Springer, 978-3-540-78662-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the First International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2007, October 14-20, 2007, Valencia, Spain, pp. 216-221, 2007, IEEE Computer Society, 0-7695-2989-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Vipul Goyal |
Certificate Revocation Using Fine Grained Certificate Space Partitioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 247-259, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Yvo Desmedt, Tanja Lange 0001, Mike Burmester |
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 104-118, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Tree based GKE, Ad-Hoc Groups, Authentication, Anonymity, Key Distribution, Forward Security, Group Key Exchange |
10 | Ibrahim Mostafa Ibrahim, Sherif Hazem Nour El-Din, Abdel Fatah A. Hegazy |
An Effective and Secure Buyer-Seller Watermarking Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 21-28, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Alessandro Cilardo, Luigi Coppolino, Antonino Mazzeo, Luigi Romano |
Performance Evaluation of Security Services: An Experimental Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDP ![In: 15th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2007), 7-9 February 2007, Naples, Italy, pp. 387-394, 2007, IEEE Computer Society, 0-7695-2784-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security, Web Services, Performance, Ubiquitous Computing, Mobile Devices |
10 | Suk-Bok Lee, Gabriel Pan, Joon-Sang Park, Mario Gerla, Songwu Lu |
Secure incentives for commercial ad dissemination in vehicular networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHoc ![In: Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2007, Montreal, Quebec, Canada, September 9-14, 2007, pp. 150-159, 2007, ACM, 978-1-59593-684-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, cooperation, incentives, vehicular ad hoc networks |
10 | Yi Mu 0001, Willy Susilo, Huafei Zhu |
Compact sequential aggregate signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 249-253, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RSA problem, communication, computer, provably secure, signatures |
10 | Aleksej Jerman Blazic |
Long Term Trusted Archive Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: First International Conference on the Digital Society (ICDS 2007), 2-6 January 2007, Guadeloupe, French Caribbean, pp. 29, 2007, IEEE Computer Society, 978-0-7695-2760-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Electronic archive, authenticity, trust, protocol, integrity, validity, authority, document, evidence, record, long-term |
10 | Qiong Ren, Yi Mu 0001, Willy Susilo |
SEFAP: An Email System for Anti-Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 11-13 July 2007, Melbourne, Australia, pp. 782-787, 2007, IEEE Computer Society, 0-7695-2841-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Malicious Email, Digital Signature, Anti-Phishing |
10 | Juan A. Garay, Jonathan Katz, Chiu-Yuen Koo, Rafail Ostrovsky |
Round Complexity of Authenticated Broadcast with a Dishonest Majority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), October 20-23, 2007, Providence, RI, USA, Proceedings, pp. 658-668, 2007, IEEE Computer Society, 978-0-7695-3010-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
Exploiting X.509 Certificate and Multi-agent System Architecture for Role-Based Access Control and Authentication Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Seventh International Conference on Computer and Information Technology (CIT 2007), October 16-19, 2007, University of Aizu, Fukushima, Japan, pp. 733-738, 2007, IEEE Computer Society, 978-0-7695-2983-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Raphaël Chand, Luigi Liquori, Michel Cosnard |
Improving Resource Discovery in the Arigatoni Overlay Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARCS ![In: Architecture of Computing Systems - ARCS 2007, 20th International Conference, Zurich, Switzerland, March 12-15, 2007, Proceedings, pp. 98-111, 2007, Springer, 978-3-540-71267-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Toshihiko Matsuo |
Proxy Re-encryption Systems for Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings, pp. 247-267, 2007, Springer, 978-3-540-73488-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
proxy re-encryption system, public key encryption, identity-based encryption |
10 | Liyi Zhang, Qihua Liu, Min Xu |
Research and application of EJBCA based on J2EE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E (1) ![In: Integration and Innovation Orient to E-Society, Volume 1, Seventh IFIP International Conference on e-Business, e-Services, and e-Society (I3E2007), October 10-12, Wuhan, China, pp. 337-345, 2007, Springer, 978-0-387-75465-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Valentina Casola, Jesus Luna, Oscar Manso, Nicola Mazzocca, Manel Medina, Massimiliano Rak |
Interoperable Grid PKIs Among Untrusted Domains: An Architectural Proposal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GPC ![In: Advances in Grid and Pervasive Computing, Second International Conference, GPC 2007, Paris, France, May 2-4, 2007, Proceedings, pp. 39-51, 2007, Springer, 978-3-540-72359-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Tatsuaki Okamoto |
Authenticated Key Exchange and Key Encapsulation in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 474-484, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Manabu Hirano, Takeshi Okuda, Suguru Yamaguchi |
Application for a Simple Device Authentication Framework: Device Authentication Middleware Using Novel Smart Card Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2007 International Symposium on Applications and the Internet - Workshops (SAINT 2007 Workshops), 15-19 January 2007, Hiroshima, Japan, pp. 31, 2007, IEEE Computer Society, 0-7695-2757-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Serena Pastore |
Distributed and local security policies for grid web-based resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 3-7 September 2007, Regensburg, Germany, pp. 703-707, 2007, IEEE Computer Society, 0-7695-2932-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Jan Paul Kolter, Rolf Schillinger, Günther Pernul |
A Privacy-Enhanced Attribute-Based Access Control System. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings, pp. 129-143, 2007, Springer, 978-3-540-73533-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Junzuo Lai, Weidong Kou |
Self-Generated-Certificate Public Key Encryption Without Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 476-489, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Self-Generated-Certificate Public Key Cryptography, Self-Certified-Key, Certificateless Public Key Cryptography |
10 | MohammadReza Gholami, Seyyed Mohsen Hashemi, Mohammad Teshnehlab |
A Framework for Secure Message Transmission Using SMS-Based VPN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONFENIS (1) ![In: Research and Practical Issues of Enterprise Information Systems II, Volume 1, IFIP TC 8 WG 8.9 International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS 2007), October 14-16, 2007, Beijing, China, pp. 503-511, 2007, Springer, 978-0-387-75901-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security, Privacy, Trust, E-commerce, E-business, EAI, EDI |
10 | Calvin Chun Yu, Paul Jen-Hwa Hu |
Examining the Impacts of Institutional Framework on E-Government Infrastructures: A Study of Hong Kong Experiences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 93, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Reto Kohlas, Jacek Jonczy, Rolf Haenni |
A New Model for Public-Key Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KiVS ![In: Kommunikation in Verteilten Systemen (KiVS), 15. Fachtagung Kommunikation in Verteilten Systemen, KiVS 2007, Bern, Schweiz, 26. Februar - 2. März 2007, pp. 213-224, 2007, Springer, 978-3-540-69961-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols |
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings, pp. 35-50, 2007, Springer, 978-3-540-75669-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Meng Yu 0001, Wanyu Zang, Barbara Reagor |
Decentralized Trust Management based on the Reputation of Information Sources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2007, London, UK, 15-17 April 2007, pp. 212-217, 2007, IEEE, 1-4244-1076-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Thomas Wölfl, Kai Fischbach |
A Method for the Certification and the Delegation of Trust in Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), June 25-29, 2007, Toronto, Ontario, Canada, pp. 22, 2007, IEEE Computer Society, 0-7695-2881-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Mihir Bellare, Gregory Neven |
Multi-signatures in the plain public-Key model and a general forking lemma. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 390-399, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
forking lemma, cryptography, digital signatures, multi-signatures |
10 | Dae-Young Lee, Hyun-Cheol Jeong |
An Efficient Certificate Management for Mobile Ad-Hoc Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADHOC-NOW ![In: Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, ADHOC-NOW 2006, Ottawa, Canada, August 17-19, 2006, Proceedings, pp. 355-364, 2006, Springer, 3-540-37246-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Jan Camenisch, Dieter Sommer, Roger Zimmermann |
A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 25-37, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Sadie Creese, Michael Goldsmith, Bill Roscoe, Ming Xiao |
Bootstrapping multi-party ad-hoc security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 369-375, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
bootstrapping security, pervasive computing |
10 | Won Jay Song, Moon Kyo Cho, Im Sook Há, Mun Kee Choi |
Healthcare System Architecture, Economic Value, and Policy Models in Large-Scale Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006, Proceedings, pp. 233-246, 2006, Springer, 3-540-45762-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Samia Boucherkha, Mohamed Benmohamed |
A Multi-tier Architecture to Safely Share Digital Medical Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DepCoS-RELCOMEX ![In: 2006 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2006), 24-28 May 2006, Szklarska Poreba, Poland, pp. 319-326, 2006, IEEE Computer Society, 0-7695-2565-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Muhammad Sher, Thomas Magedanz, Walter T. Penzhorn |
Inter-Domains Security Management (IDSM) Model for IP Multimedia Subsystem (IMS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 502-509, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Inter-Domains Security, Trust Relationship, IP Multimedia System (IMS), Keys and Certificate Management |
10 | Zhenxing Luo, NuerMaimaiti Heilili, Dawei Xu, Chen Zhao 0001, Zuoquan Lin |
Web Application Security Gateway with Java Non-blocking IO. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NGITS ![In: Next Generation Information Technologies and Systems, 6th International Workshop, NGITS 2006, Kibbutz Shefayim, Israel, July 4-6, 2006, Proceedings, pp. 96-105, 2006, Springer, 3-540-35472-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Fabio Picconi, Nishkam Ravi, Marco Gruteser, Liviu Iftode |
Probabilistic validation of aggregated data in vehicular ad-hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Vehicular Ad Hoc Networks ![In: Proceedings of the Third International Workshop on Vehicular Ad Hoc Networks, VANET 2006, Los Angeles, CA, USA, September 29, 2007, pp. 76-85, 2006, ACM, 1-59593-540-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
aggregation, vehicular networks, malicious nodes, data validation |
10 | N. V. Narendra Kumar, R. K. Shyamasundar |
Specification and Realization of Access Control in SPKI/SDSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 177-193, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Abderrezak Rachedi, Abderrahim Benslimane |
A Secure Architecture for Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-hoc and Sensor Networks, Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedings, pp. 424-435, 2006, Springer, 3-540-49932-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, Wireless ad hoc networks, clustering algorithm |
10 | Despina Polemi, Spyridon Papastergiou |
A Secure e-Ordering Web Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E ![In: Project E-Society: Building Bricks, 6TH IFIP International Conference on e-Commerce, e-Business, and e-Government (I3E 2006), October 11-13, 2006, Turku, Finland, pp. 352-365, 2006, Springer, 978-0-387-39226-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Liang Li, Jie Tian 0001, Xin Yang 0001 |
A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISI ![In: Intelligence and Security Informatics, International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings, pp. 175-176, 2006, Springer, 3-540-33361-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Christian Damsgaard Jensen, Paul O'Connell |
Trust-Based Route Selection in Dynamic Source Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings, pp. 150-163, 2006, Springer, 3-540-34295-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Didier Benza, Michel Cosnard, Luigi Liquori, Marc Vesin |
Arigatoni: A Simple Programmable Overlay Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
John Vincent Atanasoff Symposium ![In: 2006 IEEE John Vincent Atanasoff International Symposium on Modern Computing (JVA2006), 3-6 October 2006, Sofia, Bulgaria, pp. 82-91, 2006, IEEE Computer Society, 0-7695-2643-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Tiefang Wang, Tao Li 0016, Xun Gong 0006, Jin Yang, Xiaoqin Hu, Diangang Wang, Hui Zhao 0007 |
Family Gene Based Grid Trust Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC (2) ![In: Advances in Natural Computation, Second International Conference, ICNC 2006, Xi'an, China, September 24-28, 2006. Proceedings, Part II, pp. 110-113, 2006, Springer, 3-540-45907-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Slim Trabelsi, Jean-Christophe R. Pazzaglia, Yves Roudier |
Secure Web Service Discovery: Overcoming Challenges of Ubiquitous Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOWS ![In: Fourth IEEE European Conference on Web Services (ECOWS 2006), 4-6 December 2006, Zürich, Switzerland, pp. 35-43, 2006, IEEE Computer Society, 0-7695-2737-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Secure Service discovery, Web Services, Service Oriented Architectures, Ubiquitous Computing, WS-Discovery, Attribute Based Encryption |
10 | Fei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou |
Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 227-235, 2006, Springer, 3-540-38619-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Won Jay Song, Im Sook Há, Mun Kee Choi |
System Architecture and Economic Value-Chain Models for Healthcare Privacy and Security Control in Large-Scale Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 511-520, 2006, Springer, 3-540-38619-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Huaji Shi, Xibin Zhao |
Implementation Issues of Authorization Mechanisms in Grid Computing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSE ![In: The 2006 International Workshop on Service Oriented Software Engineering (IW-SOSE '06), May 27-28, 2006, Shanghai, China, in conjunction with ICSE 2006, pp. 76-80, 2006, IEEE Computer Society, 0-7695-2726-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi |
Trusted-link: web-link enhancement for integrity and trustworthiness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006, pp. 17-24, 2006, ACM, 1-59593-547-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
integrity, web, signature, link, trustworthiness |
10 | Abderrezak Rachedi, Abderrahim Benslimane |
Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSNC ![In: Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29 - November 3, 2006, Papeete, Tahiti, French Polynesia, pp. 72, 2006, IEEE Computer Society, 0-7695-2699-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | GeneBeck Hahn, Taekyoung Kwon 0002, Sinkyu Kim, JooSeok Song |
Cluster-Based Certificate Chain for Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part II, pp. 769-778, 2006, Springer, 3-540-34072-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | M. Francisca Hinarejos, Jordi Forné |
Revocation Scheme for PMI Based Upon the Tracing of Certificates Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part IV, pp. 1098-1106, 2006, Springer, 3-540-34077-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Jongpil Jeong, Min Young Chung, Hyunseung Choo |
Secure User Authentication Mechanism in Digital Home Network Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: Embedded and Ubiquitous Computing, International Conference, EUC 2006, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 345-354, 2006, Springer, 3-540-36679-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Richard O. Sinnott, Jipu Jiang, John P. Watt, Oluwafemi O. Ajayi |
Shibboleth-based Access to and Usage of Grid Resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 7th IEEE/ACM International Conference on Grid Computing (GRID 2006), September 28-29, 2006, Barcelona, Spain, Proceedings, pp. 136-143, 2006, IEEE Computer Society, 1-4244-0344-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 767-777, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi |
Secure E-Commerce Transactions for Multicast Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC/EEE ![In: Eighth IEEE International Conference on E-Commerce Technology (CEC 2006) / Third IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (EEE 2006) and Workshops, 26-29 June 2006, Palo Alto, California, USA, pp. 18, 2006, IEEE Computer Society, 0-7695-2511-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Anantharaman Lakshminarayanan, Aditya Liviandi, Tong-Lee Lim, William Chui |
Can CRLs Provide Bandwidth-Efficient Online Certificate Status? ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2006, The 31st Annual IEEE Conference on Local Computer Networks, Tampa, Florida, USA, 14-16 November 2006, pp. 203-210, 2006, IEEE Computer Society, 1-4244-0418-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Shanshan Song, Kai Hwang 0001, Yu-Kwong Kwok |
Trusted Grid Computing with Security Binding and Trust Integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Grid Comput. ![In: J. Grid Comput. 3(1-2), pp. 53-73, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
NAS and PSA benchmarks, performance evaluation, fuzzy logic, resource allocation, computational Grids, trust models, scalability analysis |
10 | Vishwas Patil, R. K. Shyamasundar |
e-coupons: An Efficient, Secure and Delegable Micro-Payment System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 7(4-5), pp. 371-389, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
PayWord, security, delegation, one-way hash function, micro-payment, TESLA, SPKI/SDSI |
10 | Richard O. Sinnott, A. J. Stell, David W. Chadwick, O. Otenko |
Experiences of Applying Advanced Grid Authorisation Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGC ![In: Advances in Grid Computing - EGC 2005, European Grid Conference, Amsterdam, The Netherlands, February 14-16, 2005, Revised Selected Papers, pp. 265-274, 2005, Springer, 3-540-26918-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Hoon Wei Lim, Matthew J. B. Robshaw |
A Dynamic Key Infrastructure for Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGC ![In: Advances in Grid Computing - EGC 2005, European Grid Conference, Amsterdam, The Netherlands, February 14-16, 2005, Revised Selected Papers, pp. 255-264, 2005, Springer, 3-540-26918-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Yevgeniy Dodis, Dae Hyun Yum |
Time Capsule Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 57-71, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Hoon Wei Lim, Kenneth G. Paterson |
Identity-Based Cryptography for Grid Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Science ![In: First International Conference on e-Science and Grid Technologies (e-Science 2005), 5-8 December 2005, Melbourne, Australia, pp. 395-404, 2005, IEEE Computer Society, 0-7695-2448-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Gianluigi Me, Maurizio Adriano Strangio |
EC-PAY: An Efficient and Secure ECC-Based Wireless Local Payment Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITA (2) ![In: Third International Conference on Information Technology and Applications (ICITA 2005), 4-7 July 2005, Sydney, Australia, pp. 442-447, 2005, IEEE Computer Society, 0-7695-2316-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Jin Park, Jeong-Tae Hwang, Young-Chul Kim 0001 |
FPGA and ASIC Implementation of ECC Processor for Security on Medical Embedded System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITA (2) ![In: Third International Conference on Information Technology and Applications (ICITA 2005), 4-7 July 2005, Sydney, Australia, pp. 547-551, 2005, IEEE Computer Society, 0-7695-2316-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | A. J. Stell, Richard O. Sinnott, John P. Watt |
Comparison of Advanced Authorisation Infrastructures for Grid Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCS ![In: 19th Annual International Symposium on High Performance Computing Systems and Applications (HPCS 2005), 15-18 May 2005, Guelph, Ontario, Canada, pp. 195-201, 2005, IEEE Computer Society, 0-7695-2343-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Alessandro Cilardo, Luigi Coppolino, Antonino Mazzeo, Luigi Romano |
High-Performance and Interoperable Security Services for Mobile Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC ![In: High Performance Computing and Communications, First International Conference, HPCC 2005, Sorrento, Italy, September 21-23, 2005, Proceedings, pp. 1064-1069, 2005, Springer, 3-540-29031-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | H. W. Go, P. Y. Chan 0001, Y. Dong, Ai Fen Sui, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li |
Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference (2) ![In: Proceedings of the 43nd Annual Southeast Regional Conference, 2005, Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2, pp. 75-80, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
performance evaluation, mobile ad hoc network (MANET), flooding, public-key infrastructure, certificate revocation |
10 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, pp. 269-284, 2005, 3-540-26223-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | David Del Vecchio, Marty Humphrey, Jim Basney, Nataraj Nagaratnam |
CredEx: User-Centric Credential Management for Grid and Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2005 IEEE International Conference on Web Services (ICWS 2005), 11-15 July 2005, Orlando, FL, USA, pp. 149-156, 2005, IEEE Computer Society, 0-7695-2409-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Yun-Sam Kim, Eun-Sun Cho |
Preventing Illegal Usage of Mobile Phone Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: 29th Annual International Computer Software and Applications Conference, COMPSAC 2005, Edinburgh, Scotland, UK, July 25-28, 2005. Volume 2, pp. 25-26, 2005, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Norihiro Sakamoto, Jun Nakaya |
Towards the Construction of the Information Infrastructure for Genome Medicine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Human.Society@Internet ![In: Web and Communication Technologies and Internet-Related Social Issues - HSI 2005, 3rd International Conference on Human.Society@Internet, Tokyo, Japan, July 27-29, 2005, Proceedings, pp. 165-178, 2005, Springer, 3-540-27830-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Mario Morelli, David Fernández, Antonio Fernandez Gómez-Skarmeta, Jordi Palet |
An IPv6 Internet Exchange Model: Lessons from Euro6IX Project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January - 4 February 2005, Trento, Italy, pp. 50-53, 2005, IEEE Computer Society, 0-7695-2263-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Seokhee Lee 0002, Hyunsang Kim, Sangjin Lee 0002, Jongin Lim 0001 |
Digital evidence collection process in integrity and memory information gathering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SADFE ![In: First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 7-10 November 2005, Taipei, Taiwan, pp. 236-247, 2005, IEEE Computer Society, 0-7695-2478-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #801 - #900 of 989 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|