|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 859 occurrences of 387 keywords
|
|
|
Results
Found 989 publication records. Showing 989 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
10 | Wei Zhou 0006, Christoph Meinel, Vinesh H. Raja |
A Framework for Supporting Distributed Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 27-30 June 2005, Murcia, Cartagena, Spain, pp. 442-447, 2005, IEEE Computer Society, 0-7695-2373-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Tierui Chen, Bin B. Zhu, Shipeng Li 0001, Xueqi Cheng |
ThresPassport - A Distributed Single Sign-On Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (2) ![In: Advances in Intelligent Computing, International Conference on Intelligent Computing, ICIC 2005, Hefei, China, August 23-26, 2005, Proceedings, Part II, pp. 771-780, 2005, Springer, 3-540-28227-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Yan Wang, Ruizhen Liu |
A Print-Scan Resistable Digital Seal System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (2) ![In: Advances in Intelligent Computing, International Conference on Intelligent Computing, ICIC 2005, Hefei, China, August 23-26, 2005, Proceedings, Part II, pp. 761-770, 2005, Springer, 3-540-28227-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Liang Cai, Xiaohu Yang 0001, Chun Chen |
Architecture of a Server-Aided Signature Service (SASS) for Mobile Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN (2) ![In: Networking - ICN 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part II, pp. 819-826, 2005, Springer, 3-540-25338-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN (2) ![In: Networking - ICN 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part II, pp. 944-952, 2005, Springer, 3-540-25338-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Heng Pan, JingFeng Li, Yuefei Zhu, DaWei Wei |
A Practical Scheme of Merging Multiple Public Key Infrastructures in E-commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCNMC ![In: Networking and Mobile Computing, Third International Conference, ICCNMC 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings, pp. 1287-1294, 2005, Springer, 3-540-28102-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Zhi Li 0013, Yu-Kwong Kwok |
A New Multipath Routing Approach to Enhancing TCP Security in Ad Hoc Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: 34th International Conference on Parallel Processing Workshops (ICPP 2005 Workshops), 14-17 June 2005, Oslo, Norway, pp. 372-379, 2005, IEEE Computer Society, 0-7695-2381-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
interception rates, ad hoc networks, TCP, multipath routing, wireless security |
10 | Thibault Candebat, Cameron Ross Dunne, David T. Gray |
Pseudonym management using mediated identity-based cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 1-10, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
SEM architecture, location-based services, identity-based encryption, pseudonymity |
10 | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino |
Establishing and protecting digital identity in federation systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 11-19, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
identity management, federation, single sign-on, identity theft, zero knowledge proof |
10 | Christian Schläger, Günther Pernul |
Authentication and Authorisation Infrastructures in b2c e-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies: 6th International Conference, EC-Web 2005, Copenhagen, Denmark, August 23-26, 2005, Proceedings, pp. 306-315, 2005, Springer, 3-540-28467-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | George C. Hadjichristofi, William Joseph Adams, Nathaniel J. Davis IV |
A Framework for Key Management in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (2) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 2, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 568-573, 2005, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Jian Leng, DongQin Xie |
A Novel Approach to Kernel Construction of China Bridge CA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 12-14 December, 2005, Changsha, Hunan, China, pp. 258-268, 2005, IEEE Computer Society, 0-7695-2492-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Laith A. Al-Sulaiman, Hussein M. Abdel-Wahab |
Cooperative caching techniques for increasing the availability of MANET certificate authority services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), January 3-6, 2005, Cairo, Egypt, pp. 88, 2005, IEEE Computer Society, 0-7803-8735-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Haibo Tian, Xi Sun, Yumin Wang |
A Virtual Bridge Certificate Authority Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 500-507, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Ernö Jeges, Zoltán Hornák, Csaba Körmöczi |
Encoding Private Key in Fingerprint. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 430-435, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang |
Trusted Computing-Based Security Architecture For 4G Mobile Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2005), 5-8 December 2005, Dalian, China, pp. 251-255, 2005, IEEE Computer Society, 0-7695-2405-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano |
Certificate revocation system implementation based on the Merkle hash tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 2(2), pp. 110-124, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Public-key infrastructure, Certificate revocation, Merkle hash tree |
10 | Bu-Sung Lee, Wing-Keong Woo, Chai Kiat Yeo, Teck Meng Lim, Bee-Hwa Lim, Yuxiong He, Jie Song 0005 |
Secure communications between bandwidth brokers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(1), pp. 43-57, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Simple Inter-domain Bandwidth Broker Signaling, Public Key Infrastructure, Bandwidth Broker |
10 | Joan Ametller, Sergi Robles, Jose A. Ortega-Ruiz |
An Implementation of Self-Protected Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECBS ![In: 11th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2004), 24-27 May 2004, Brno, Czech Republic, pp. 544-549, 2004, IEEE Computer Society, 0-7695-2125-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Shouhuai Xu, Moti Yung |
k-anonymous secret handshakes with reusable credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 158-167, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
privacy-preserving authentication, reusable credentials, anonymity, unlinkability, secret handshake, credential systems |
10 | Seung Yi, Robin Kravets |
Composite Key Management for Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiQuitous ![In: 1st Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2004), Networking and Services, 22-25 August 2004, Cambridge, MA, USA, pp. 52-61, 2004, IEEE Computer Society, 0-7695-2208-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Yasir Ali, Sean W. Smith |
Flexible and Scalable Public Key Security for SSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 43-56, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Elisavet Konstantinou, Yannis C. Stamatiou, Christos D. Zaroliagis |
On the Use of Weber Polynomials in Elliptic Curve Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 335-349, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Ruizhong Wei, Jiang Wu 0001 |
Product Construction of Key Distribution Schemes for Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers, pp. 280-293, 2004, Springer, 3-540-24327-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Sung-Keun Song, Hee Yong Youn, Kang Shin Lee |
A New Digital Signature and Certificate Architecture with Shortest Certification Path. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication, Third International IFIP-TC6 Networking Conference, Athens, Greece, May 9-14, 2004, Proceedings, pp. 1-12, 2004, Springer, 3-540-21959-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Boguslaw Banaszak, Katarzyna Rodziewicz |
Trust and Security. Digital Citizen Cards in Poland. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGOV ![In: Electronic Government: Third International Conference, EGOV 2004, Zaragoza, Spain, August 30 - September 3, 2004, Proceedings, pp. 342-346, 2004, Springer, 3-540-22916-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Young-Gab Kim, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik |
A MAC-Based Service Bundle Authentication Mechanism in the OSGi Service Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Database Systems for Advances Applications, 9th International Conference, DASFAA 2004, Jeju Island, Korea, March 17-19, 2004, Proceedings, pp. 137-145, 2004, Springer, 3-540-21047-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Lukasz Kawulok, Krzysztof Zielinski, Michal Jaeschke |
Trusted Group Membership Service for JXTA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science ![In: Computational Science - ICCS 2004, 4th International Conference, Kraków, Poland, June 6-9, 2004, Proceedings, Part III, pp. 218-225, 2004, Springer, 3-540-22116-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Malek Bechlaghem, Vincent Rijmen |
Proving Key Usage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, pp. 65-72, 2004, Springer, 3-540-24015-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Franco Arcieri, Fabio Fioravanti, Enrico Nardelli, Maurizio Talamo |
A Specification for Security Services on Computational Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GSEM ![In: Grid Services Engineering and Management, First International Conference, GSEM 2004, Erfurt, Germany, September 27-30, 2004, Proceedings, pp. 119-135, 2004, Springer, 3-540-23301-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Otto Kolsi, Teemupekka Virtanen |
MIDP 2.0 Security Enhancements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, J2ME, MIDP |
10 | Eui-nam Huh |
A New Architecture Design for Differentiated Resource Sharing on Grid Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 370-377, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Sung-Keun Song, Hee Yong Youn, Chang-Won Park |
A Two-Public Key Scheme Omitting Collision Problem in Digital Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part IV, pp. 627-636, 2004, Springer, 3-540-22060-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Shaomin Zhang, Baoyi Wang |
Managing Access in Extended Enterprise Networks Web Service-Based. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing - GCC 2004: Third International Conference, Wuhan, China, October 21-24, 2004. Proceedings, pp. 963-966, 2004, Springer, 3-540-23564-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Hongmei Deng, Anindo Mukherjee, Dharma P. Agrawal |
Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 107-111, 2004, IEEE Computer Society, 0-7695-2108-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Bing Wu, Matthew J. Dovey, Muan Hong Ng, Kaihsu Tai, Stuart E. Murdock, Paul Jeffreys, Simon J. Cox, Jonathan W. Essex, Mark S. P. Sansom |
A Web / Grid Portal Implementation of BioSimGrid: A Biomolecular Simulation Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (2) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 50-, 2004, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann 0001 |
Hindering Eavesdropping via IPv6 Opportunistic Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, pp. 309-321, 2004, Springer, 3-540-22987-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Asad Amir Pirzada, Chris McDonald |
Secure Pervasive Computing without a Trusted Third Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPS ![In: The IEEE/ACS International Conference on Pervasive Services (ICPS'04), July 19-23, 2004, American University of Beirut (AUB), Lebanon, pp. 240, 2004, IEEE Computer Society, 0-7803-8577-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Young-Gab Kim, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik |
A Service Bundle Authentication Mechanism in the OSGi Service Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 420-425, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Satoshi Koga, Kouichi Sakurai |
A Merging Method of Certification Authorities Without Using Cross-Certifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 174-177, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Semir Daskapan, Ana Cristina Costa, Willem G. Vree, Amr Ali Eldin |
Virtual Trust in Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings, pp. 30-39, 2004, Springer, 3-540-22919-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Florina Almenárez, Daniel Díaz Sánchez, Andrés Marín López |
Secure Ad-Hoc mBusiness: EnhancingWindowsCE Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings, pp. 90-99, 2004, Springer, 3-540-22919-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Robbert van Renesse, Kenneth P. Birman, Werner Vogels |
Astrolabe: A robust and scalable technology for distributed system monitoring, management, and data mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 21(2), pp. 164-206, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
scalability, Aggregation, gossip, failure detection, publish-subscribe, membership, epidemic protocols |
10 | Isabelle Attali, Denis Caromel, Arnaud Contes |
Hierarchical and Declarative Security for Grid Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HiPC ![In: High Performance Computing - HiPC 2003, 10th International Conference, Hyderabad, India, December 17-20, 2003, Proceedings, pp. 363-372, 2003, Springer, 3-540-20626-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Mike Burmester, Alec Yasinsac |
Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 274-282, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Omar Batarfi |
Certificate Validation in Untrusted Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops ![In: On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, OTM Confederated International Workshops, HCI-SWWA, IPW, JTRES, WORM, WMS, and WRSM 2003, Catania, Sicily, Italy, November 3-7, 2003, Proceedings, pp. 1057-1068, 2003, Springer, 3-540-20494-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Chu Yee Liau, Xuan Zhou 0001, Stéphane Bressan, Kian-Lee Tan |
Efficient Distributed Reputation Scheme for Peer-to-Peer Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Human.Society@Internet 2003 ![In: Web Communication Technologies and Internet-Related Social Issues - HSI 2003, Second International Conference on Human Society@Internet, Seoul, Korea, June 18-20, 2003, Proceedings, pp. 54-63, 2003, Springer, 3-540-40456-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Aram Khalili, Jonathan Katz, William A. Arbaugh |
Toward Secure Key Distribution in Truly Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003 - Orlando, FL, USA, Proceedings, pp. 342-346, 2003, IEEE Computer Society, 0-7695-1873-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Namje Park, Kiyoung Moon, Sungwon Sohn |
Certificate validation service using XKMS for computational grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
XML Security ![In: Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, pp. 112-120, 2003, ACM, 1-58113-777-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
XKMS, certificate validation, security, XML, grid, key management, XML security, GSI |
10 | Mehmet Ercan Kuruoglu, Ibrahim Sogukpinar |
Low Cost and Trusted Electronic Purse System Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2003, 18th International Symposium, Antalya, Turkey, November 3-5, 2003, Proceedings, pp. 131-138, 2003, Springer, 3-540-20409-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano, David Jodra |
Evaluation of Revocation Systems with a JAVA Test-bed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic, pp. 450-454, 2003, IEEE Computer Society, 0-7695-1993-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Tuomas Aura |
Cryptographically Generated Addresses (CGA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings, pp. 29-43, 2003, Springer, 3-540-20176-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Craig Gentry |
Certificate-Based Encryption and the Certificate Revocation Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, pp. 272-293, 2003, Springer, 3-540-14039-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Jeeyeon Kim, Hyunjo Kwon, Haeryong Park, Seungjoo Kim, Dongho Won |
An Improvement of VeriSign's Key Roaming Service Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWE ![In: Web Engineering, International Conference, ICWE 2003, Oviedo, Spain, July 14-18, 2003, Proceedings, pp. 281-288, 2003, Springer, 3-540-40522-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Shaomin Zhang, Baoyi Wang, Lihua Zhou |
Constructing Secure Web Service Based on XML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (1) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part I, pp. 1051-1054, 2003, Springer, 3-540-21988-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Fawaz Amin Alvi, Shakeel A. Khoja, Zohra Jabeen |
Developing a Framework to Implement Security in Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (1) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part I, pp. 657-660, 2003, Springer, 3-540-21988-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Namje Park, Kiyoung Moon, Sungwon Sohn, Cheehang Park |
Certificate Validation Scheme of Open Grid Service Usage XKMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (1) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part I, pp. 849-858, 2003, Springer, 3-540-21988-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll |
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings, pp. 181-200, 2003, Springer, 3-540-20300-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Trevor Perrin |
Public key distribution through "cryptoIDs". ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the New Security Paradigms Workshop 2003, August 18-21, 2002, Ascona, Switzerland, pp. 87-102, 2003, ACM, 1-58113-880-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
cryptoIDs, key management, fingerprints, key distribution, public key infrastructure |
10 | Danilo Bruschi, A. Ornaghi, Emilia Rosti |
S-ARP: a Secure Address Resolution Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA, pp. 66-74, 2003, IEEE Computer Society, 0-7695-2041-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Hock Kim Tan, Luc Moreau 0001 |
Certificates for mobile code security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain, pp. 76-81, 2002, ACM, 1-58113-445-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
mobile agent certificates, mobile agent security framework, mobile agent security |
10 | Marco Casassa Mont, Richard Brown 0001 |
Active Digital Credentials: Dynamic Provision of Up-to-Date Identity Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfraSec ![In: Infrastructure Security, International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002, Proceedings, pp. 59-72, 2002, Springer, 3-540-44309-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis |
Using SSL/TLS in authentication and key agreement procedures of future mobile networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MWCN ![In: Proceedings of The Fourth IEEE Conference on Mobile and Wireless Communications Networks, MWCN 2002, September 9-11, 2002, Stockholm, Sweden, pp. 152-156, 2002, IEEE. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Eugenio Faldella, Marco Prandini |
A flexible scheme for on-line public-key certificate status updating and verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 1-4 July 2002, Taormina, Italy, pp. 891-898, 2002, IEEE Computer Society, 0-7695-1671-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
10 | R. K. Shyamasundar, Siddharth B. Deshmukh |
MicroBill: An Efficient Secure System for Subscription Based Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computing Science - ASIAN 2002, Internet Computing and Modeling, Grid Computing, Peer-to-Peer Computing, and Cluster Computing, 7th Asian Computing Science Conference, Hanoi, Vietnam, December 4-6, 2002, Proceedings, pp. 220-232, 2002, Springer, 3-540-00195-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Jose L. Muñoz, Jordi Forné, Juan C. Castro |
Evaluation of Certificate Revocation Policies: OCSP vs. Overissued-CRL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2-6 September 2002, Aix-en-Provence, France, pp. 511-518, 2002, IEEE Computer Society, 0-7695-1668-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Bernd Blobel |
Architecture of Secure Portable and Interoperable Electronic Health Records. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (2) ![In: Computational Science - ICCS 2002, International Conference, Amsterdam, The Netherlands, April 21-24, 2002. Proceedings, Part II, pp. 982-994, 2002, Springer, 3-540-43593-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Dietrich Fahrenholtz, Winfried Lamersdorf |
Transactional Security for a Distributed Reputation Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies, Third International Conference, EC-Web 2002, Aix-en-Provence, France, September 2-6, 2002, Proceedings, pp. 214-223, 2002, Springer, 3-540-44137-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Jaeil Lee, Taekyoung Kwon 0002, Sanghoon Song, JooSeok Song |
A Model for Embedding and Authorizing Digital Signatures in Printed Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 465-477, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Practical Aspects, Computer Security, Distribute Systems Security |
10 | Eric Freudenthal, Tracy Pesin, Lawrence Port, Edward Keenan, Vijay Karamcheti |
dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), Vienna, Austria, July 2-5, 2002, pp. 411-420, 2002, IEEE Computer Society, 0-7695-1585-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Byoungcheon Lee, Kwangjo Kim |
Self-certified Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002, pp. 199-214, 2002, Springer, 3-540-00263-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
self-certified signature, self-certified key, multi-certification signature, privilege management infrastructure, digital signature, public key infrastructure |
10 | K. C. Reddy, Divya Nalla |
Identity Based Authenticated Group Key Agreement Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002, pp. 215-233, 2002, Springer, 3-540-00263-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
key trees, one-way function trees, cryptography, elliptic curves, Key Agreement, group Key Agreement, Diffie-Hellman, Key Agreement Protocols, ID-based, Identity based, Weil pairing |
10 | Won Jay Song, Byung-Ha Ahn, Won Hee Kim |
Healthcare Information Systems Using Digital Signature and Synchronized Smart Cards via the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC ![In: 2002 International Symposium on Information Technology (ITCC 2002), 8-10 April 2002, Las Vegas, NV, USA, pp. 177-182, 2002, IEEE Computer Society, 0-7695-1506-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Markus Jakobsson, Ari Juels, Phong Q. Nguyen |
Proprietary Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings, pp. 164-181, 2002, Springer, 3-540-43224-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
collateral key, digital rights, fair encryption, proprietary key, certificates |
10 | Eric Freudenthal, Lawrence Port, Tracy Pesin, Edward Keenan |
Switchboard: Secure, Monitored Connections for Client-Server Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 22nd International Conference on Distributed Computing Systems, Workshops (ICDCSW '02) July 2-5, 2002, Vienna, Austria, Proceedings, pp. 660-665, 2002, IEEE Computer Society, 0-7695-1588-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Tuomas Aura, Michael Roe, Jari Arkko |
Security of Internet Location Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 18th Annual Computer Security Applications Conference (ACSAC 2002), 9-13 December 2002, Las Vegas, NV, USA, pp. 78-87, 2002, IEEE Computer Society, 0-7695-1828-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Herbert Leitold, Arno Hollosi, Reinhard Posch |
Security Architecture of the Austrian Citizen Card Concept. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 18th Annual Computer Security Applications Conference (ACSAC 2002), 9-13 December 2002, Las Vegas, NV, USA, pp. 391-400, 2002, IEEE Computer Society, 0-7695-1828-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Michael Steiner 0001, Peter Buhler, Thomas Eirich, Michael Waidner |
Secure password-based cipher suite for TLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 4(2), pp. 134-157, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
transport layer security, weak secret, password, key agreement, dictionary attack, Authenticated key exchange, perfect forward secrecy, secure channel |
10 | Hirotaka Komaki, Yuji Watanabe, Goichiro Hanaoka, Hideki Imai |
Efficient Asymmetric Self-Enforcement Scheme with Public Traceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings, pp. 225-239, 2001, Springer, 3-540-41658-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Along Lin |
A Knowledge-Based Approach to Internet Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings, pp. 292-304, 2001, Springer, 3-540-42300-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Yoshiaki Isobe, Yoichi Seto, Masanori Kataoka |
Development of Personal Authentication System using Fingerprint with Digital Signature Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 34th Annual Hawaii International Conference on System Sciences (HICSS-34), January 3-6, 2001, Maui, Hawaii, USA, 2001, IEEE Computer Society, 0-7695-0981-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Biometrics, Smart card, Public Key Infrastructure, Fingerprints verification, Personal authentication |
10 | James M. Hayes |
Restricting Access with Certificate Attributes in Multiple Root Environments-A Recipe for Certificate Masquerading. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA, pp. 386-390, 2001, IEEE Computer Society, 0-7695-1405-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Wu Wen |
A Delayed Commitment Scheme to Enhance Public Key Certificate Based Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 4-16 June 2000, Gaithersburg, MD, USA, pp. 181-182, 2000, IEEE Computer Society, 0-7695-0798-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
10 | Masayuki Numao |
A Secure Key Registration System based on Proactive Secret-Sharing Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISADS ![In: The Fourth International Symposium on Autonomous Decentralized Systems, ISADS 1999, Tokyo, Japan, March 20-23, 1999, pp. 230-237, 1999, IEEE Computer Society, 0-7695-0137-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
10 | William E. Johnston, Dennis Gannon, Bill Nitzberg |
Grids as Production Computing Environments: The Engineering Aspects of NASA's Information Power Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPDC ![In: Proceedings of the Eighth IEEE International Symposium on High Performance Distributed Computing, HPDC'99, Redondo Beach, California, USA, August 3-6, 1999., pp. 197-204, 1999, IEEE Computer Society, 0-7695-0287-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
10 | James M. Hayes |
Secure In-Band Update of Trusted Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 8th Workshop on Enabling Technologies (WETICE '99), Infrastructure for Collaborative Enterprises, 16-18 June 1999, Stanford, CA, USA, Proceedings, pp. 168-173, 1999, IEEE Computer Society, 0-7695-0365-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
10 | Vipin Samar |
Single Sign-On Using Cookies for Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 8th Workshop on Enabling Technologies (WETICE '99), Infrastructure for Collaborative Enterprises, 16-18 June 1999, Stanford, CA, USA, Proceedings, pp. 158-163, 1999, IEEE Computer Society, 0-7695-0365-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
10 | Carlisle Adams, Steve Lloyd |
Profiles and protocols for the Internet Public-Key Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 29-31 October 1997, Tunis, Tunisia, Proceedings, pp. 220-224, 1997, IEEE Computer Society, 0-8186-8153-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Internet Public-Key Infrastructure, X.509 authentication framework, IETF PKIX working group, CRL profile, operational protocols, certificate management protocols, certificate policy, time stamp protocols, notrary protocols, Internet, protocols, standardization, certification, X.509 certificate |
10 | Frank J. van der Linden, Jürgen K. Müller |
Creating Architectures with Building Blocks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 12(6), pp. 51-60, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
Displaying result #901 - #989 of 989 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10] |
|