The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for authenticity with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1977-1996 (16) 1997-1998 (18) 1999-2000 (27) 2001 (22) 2002 (32) 2003 (38) 2004 (46) 2005 (67) 2006 (92) 2007 (99) 2008 (97) 2009 (70) 2010 (23) 2011 (17) 2012 (19) 2013 (20) 2014 (16) 2015 (16) 2016 (26) 2017 (35) 2018 (32) 2019 (40) 2020 (24) 2021 (46) 2022 (51) 2023 (52) 2024 (18)
Publication types (Num. hits)
article(300) incollection(4) inproceedings(745) phdthesis(10)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 798 occurrences of 452 keywords

Results
Found 1059 publication records. Showing 1059 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
9Ford-Long Wong, Frank Stajano Multi-channel Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9SeongHan Shin, Kazukuni Kobara, Hideki Imai Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Lauri I. W. Pesonen, Jean Bacon Secure event types in content-based, multi-domain publish/subscribe systems. Search on Bibsonomy SEM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Hugh C. Davis, Su White A research-led curriculum in multimedia: learning about convergence. Search on Bibsonomy ITiCSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF research-led teaching, multimedia, student engagement
9Tao Xie 0004, Andrew H. Sung, Xiao Qin 0001 Dynamic Task Scheduling with Security Awareness in Real-Time Systems. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Panayiotis Kotzanikolaou, Emmanouil Magkos, Christos Douligeris, Vassilios Chrissikopoulos Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks. Search on Bibsonomy WOWMOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Fabio Dianda, Filippo Giuntini, Fabio Martinelli, Anna Vaccarelli A Flexible Framework for Access Control Based on Ability Authentication. Search on Bibsonomy SAINT Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9I-Chuan Chang, Bor-Wen Hsu, Chi-Sung Laih A DCT Quantization-Based Image Authentication System for Digital Forensics. Search on Bibsonomy SADFE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9R. J. Hulsebosch, Alfons H. Salden, Mortaza S. Bargh, P. W. G. Ebben, J. Reitsma Context sensitive access control. Search on Bibsonomy SACMAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF context verification, service usage patterns, authentication, access control, context sensitive
9Yan Wang, Ruizhen Liu A Print-Scan Resistable Digital Seal System. Search on Bibsonomy ICIC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9SeongHan Shin, Kazukuni Kobara, Hideki Imai A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size. Search on Bibsonomy ICN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Dennis Kügler Security Concept of the EU-Passport. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Eckehard Hermann, Dieter Kessler XML Signatures in an Enterprise Service Bus Environment. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Enrico Hauer, Jana Dittmann, Martin Steinebach Digital Signatures Based on Invertible Watermarks for Video Authentication. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Sergio Vicente Denser Pamboukian, Hae Yong Kim New Public-Key Authentication Watermarking for JBIG2 Resistant to Parity Attacks. Search on Bibsonomy IWDW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Peng Wang 0009, Dengguo Feng, Wenling Wu On the Security of Tweakable Modes of Operation: TBC and TAE. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF modes of operation, authenticated encryption, symmetric encryption, Blockcipher, tweakable blockcipher
9Chin-Chen Chang 0001, Tzu-Chuen Lu, Jun-Bin Yeh A Bandwidth Efficiency of Lempel-Ziv Scheme for Data Authentication. Search on Bibsonomy KES (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Igor J. Berezhnoy, Eric O. Postma, H. Jaap van den Herik Authentic: Computerized Brushstroke Analysis. Search on Bibsonomy ICME The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Shuiming Ye, Ee-Chien Chang, Qibin Sun Watermarking based Image Authentication using Feature Amplification. Search on Bibsonomy ICME The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Seonho Choi Denial-of-Service Resistant Multicast Authentication Protocol with Prediction Hashing and One-way Key Chain. Search on Bibsonomy ISM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Graham R. Nelson, Graham A. Jullien, Orly Yadid-Pecht CMOS image sensor with watermarking capabilities. Search on Bibsonomy ISCAS (5) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Shuiming Ye, Qibin Sun, Ee-Chien Chang Error resilient content-based image authentication over wireless channel. Search on Bibsonomy ISCAS (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Zhongchao Yu, Chuk-Yang Seng, Tao Jiang 0004, Xue Wu, William A. Arbaugh Robust Routing in Malicious Environment for Ad Hoc Networks. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Thomas Wölfl Public-Key-Infrastructure Based on a Peer-to-Peer Network. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Thomas Groß 0001, Birgit Pfitzmann, Ahmad-Reza Sadeghi Proving a WS-federation passive requestor profile with a browser model. Search on Bibsonomy SWS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF WS-federation passive requestor profile, WSFPI, security proof of protocols, single signon, web browser, web service security, identity federation
9Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang On the Security of Certificateless Signature Schemes from Asiacrypt 2003. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Bilinear Pairing, Attack Model, Certificateless Cryptography, Certificateless Signature
9Xinhua Zhang, Chunyan Jiang, Wanjun Huang, Christoph Meinel A XML format secure protocol - OpenSST. Search on Bibsonomy AICCSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Yongzheng Zhang 0002, Binxing Fang, Yue Chi, Xiao-chun Yun Assessment of Windows System Security Using Vulnerability Relationship Graph. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Chen Xu 0004, Weiqiang Zhang, Francis R. Austin A Digital Watermarking Technique Based on Wavelet Packages. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Wavelet package, hiding, algorithm, digital watermark, watermark detection
9Jan Jürjens Understanding Security Goals Provided by Crypto-Protocol Implementations. Search on Bibsonomy ICSM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Raja Al-Jaljouli Boosting m-Business Using a Truly Secured Protocol for Data Gathering Mobile Agents. Search on Bibsonomy ICMB The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Jing-Shyang Hwu, Rong-Jaye Chen, Yi-Bing Lin Authenticated public-key distribution over WLAN/cellular dual networks. Search on Bibsonomy ITRE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Jan Jürjens Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Pablo Hennings, Marios Savvides, B. V. K. Vijaya Kumar Verification of Biometric Palmprint Patterns Using Optimal Trade-Off Filter Classifiers. Search on Bibsonomy ICIAR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona A secure and flexible authentication system for digital images. Search on Bibsonomy Multim. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Compression tolerance, JPEG, Image authentication
9Yongge Wang Robust key establishment in sensor networks. Search on Bibsonomy SIGMOD Rec. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Henry M. Gladney Trustworthy 100-year digital objects: Evidence after every witness is dead. Search on Bibsonomy ACM Trans. Inf. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Natalya V. Sveshnikova, Dmitry V. Yurin A Priori and A Posteriori Error Estimates in Recovery of 3D Scenes by Factorization Algorithms. Search on Bibsonomy Program. Comput. Softw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Jean-Baptiste Fasquel, Michel Bruynooghe A hybrid opto-electronic method for fast off-line handwritten signature verification. Search on Bibsonomy Int. J. Document Anal. Recognit. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Fast off-line recognition, Fusion of statistical classifiers, Optical correlation, Gabor wavelet
9Tian-Tsong Ng, Shih-Fu Chang A model for image splicing. Search on Bibsonomy ICIP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Dae Hyun Yum, Pil Joong Lee Identity-Based Cryptography in Public Key Management. Search on Bibsonomy EuroPKI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Hao Yang 0004, Songwu Lu Commutative cipher based en-route filtering in wireless sensor networks. Search on Bibsonomy VTC Fall (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Michael A. Keller Gold at the End of the Digital Library Rainbow: Forecasting the Consequences of Truly Effective Digital Libraries. Search on Bibsonomy ICADL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Sadybakasov Ulanbek, Ashutosh Saxena, Atul Negi On Reduction of Bootstrapping Information Using Digital Multisignature. Search on Bibsonomy CIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Nikita Borisov, Ian Goldberg, Eric A. Brewer Off-the-record communication, or, why not to use PGP. Search on Bibsonomy WPES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF private communication, deniability, perfect forward secrecy
9Xiaofeng Chen 0001, Fangguo Zhang, Kwangjo Kim Limited Verifier Signature from Bilinear Pairings. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Alisher Kholmatov, Berrin A. Yanikoglu Biometric Authentication Using Online Signatures. Search on Bibsonomy ISCIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Yi Mu 0001, Willy Susilo, Yan-Xia Lin, Chun Ruan Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption. Search on Bibsonomy ASIAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Mihir Bellare, Phillip Rogaway, David A. Wagner 0001 The EAX Mode of Operation. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF EAX, OMAC, provable security, message authentication, modes of operation, Authenticated encryption, CCM, CBC MAC
9Tadayoshi Kohno, John Viega, Doug Whiting CWC: A High-Performance Conventional Authenticated Encryption Mode. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Renato Renner, Stefan Wolf 0001 The Exact Price for Unconditionally Secure Asymmetric Cryptography. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF quantum key agreement, reductions of information-theoretic primitives, authentication, Information-theoretic security, privacy amplification, information reconciliation
9Dae Hyun Yum, Pil Joong Lee Separable Implicit Certificate Revocation. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF certificate-based encryption, PKI, certificate revocation
9Dae Hyun Yum, Pil Joong Lee Generic Construction of Certificateless Encryption. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Seung-Hyun Seo, Sang-Ho Lee A Secure and Flexible Multi-signcryption Scheme. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Signcryption, multi-signature
9Kee-Won Kim, Eun-Kyung Ryu, Kee-Young Yoo ID-Based Authenticated Multiple-Key Agreement Protocol from Pairings. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Thomas Groß 0001, Birgit Pfitzmann Proving a WS-Federation passive requestor profile. Search on Bibsonomy SWS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF WS-federation passive requestor profile, WSFPI, browser-based, security proof of protocols, single signon, security, web browser, web service security, federated identity management, identity federation
9Johannes Borgström, Sébastien Briais, Uwe Nestmann Symbolic Bisimulation in the Spi Calculus. Search on Bibsonomy CONCUR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Hongmei Deng, Anindo Mukherjee, Dharma P. Agrawal Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal, Dharma P. Agrawal Jigsaw-based Secure Data Transfer over Computer Networks. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Bruno Blanchet Automatic Proof of Strong Secrecy for Security Protocols. Search on Bibsonomy S&P The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Shourya Roy, Sachindra Joshi, Raghu Krishnapuram Automatic categorization of web sites based on source types. Search on Bibsonomy Hypertext The full citation details ... 2004 DBLP  DOI  BibTeX  RDF site interaction, source categorization, web site categorization, classification
9Xin Lü, Dengguo Feng An Arbitrated Quantum Message Signature Scheme. Search on Bibsonomy CIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Christian Haack, Alan Jeffrey Pattern-Matching Spi-Calculus. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Luke Hebbes, Andrew P. Lenaghan A Semi-fragile Steganographic Digital Signature for Images. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Timo Lainema, Sami Nurmi Customization of Industrial Training. Search on Bibsonomy Information and Communication Technologies and Real-Life Learning The full citation details ... 2004 DBLP  DOI  BibTeX  RDF customized learning environments, business training, Industrial Training
9Majed AbuSafiya, Subhasish Mazumdar Accommodating paper in document databases. Search on Bibsonomy ACM Symposium on Document Engineering The full citation details ... 2004 DBLP  DOI  BibTeX  RDF enterprise document model, paper manifestation, RFID, document management, document databases, paper documents
9Venkata N. Padmanabhan, Daniel R. Simon Secure traceroute to detect faulty or malicious routing. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Ross A. J. Everitt, Peter W. McOwan Java-Based Internet Biometric Authentication System. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF keyboard dynamics, Java, Internet, verification, Authentication, biometric, signature
9Anil K. Jain 0001, Umut Uludag Hiding Biometric Data. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Biometrics, watermarking, steganography, fingerprint, data hiding, face, minutiae
9Daigo Tomioka, Shin-ya Nishizaki, Ritsuya Ikeda A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack. Search on Bibsonomy ISSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Ashraf Bhery, Shigeki Hagihara, Naoki Yonezaki A Formal System for Analysis of Cryptographic Encryption and Their Security Properties. Search on Bibsonomy ISSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF unjudgment, symmetric-content-non-malleability, symmetric-content-indistinguishability, symmetric-key-indistinguishablity, symmetric-content-length-indistinguishability, encryption, judgment, deduction systems
9Petr Novák, Milan Rollo, Jirí Hodík, Tomás Vlcek Communication Security in Multi-agent Systems. Search on Bibsonomy CEEMAS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Jean-Paul M. G. Linnartz, Pim Tuyls New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates. Search on Bibsonomy AVBPA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Stavros N. Demetriadis, Evangelos Triantafillou, Andreas S. Pombortsis A phenomenographic study of students' attitudes toward the use of multiple media for learning. Search on Bibsonomy ITiCSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF students' attitudes, learning styles, multimedia learning
9Trevor M. Murphy, Mika Hirai Teaching with technology, setting an example. Search on Bibsonomy SIGUCCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF electronic portfolios, learning modules, web portfolio, multimedia, education, animation, video, pedagogy, audio, technology
9Roberto Gorrieri, Fabio Martinelli Process Algebraic Frameworks for the Specification and Analysis of Cryptographic Protocols. Search on Bibsonomy MFCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Peter Lory A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net. Search on Bibsonomy Business Process Management The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong Shao A flexible and scalable authentication scheme for JPEG2000 image codestreams. Search on Bibsonomy ACM Multimedia The full citation details ... 2003 DBLP  DOI  BibTeX  RDF message digest, authentication, data integrity, digital signature, image compression, JPEG2000, one-way hash function, merkle hash tree
9Sattam S. Al-Riyami, Kenneth G. Paterson Certificateless Public Key Cryptography. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Pim Tuyls, Tom A. M. Kevenaar, Geert Jan Schrijen, Toine Staring, Marten van Dijk Visual Crypto Displays Enabling Secure Communications. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Peter Lory A Coloured Petri Net Trust Model. Search on Bibsonomy DEXA Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Bruno Blanchet Automatic verification of cryptographic protocols: a logic programming approach. Search on Bibsonomy PPDP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF logic programming, cryptographic protocols, automatic verification, horn clauses
9He Huang, Shyhtsun Felix Wu An approach to certificate path discovery in mobile Ad Hoc networks. Search on Bibsonomy SASN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF certificate path discovery, security, MANET, public key infrastructure
9Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Adrian von Bidder, Nathalie Weiler Key Exchange (KX) - A Next Generation Protocol to Synchronise PGP Keyservers. Search on Bibsonomy WETICE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Secure Synchronisation Protocol, E-Mail Security, OpenPGP, Keyserver
9Steven J. Templeton, Karl E. Levitt Detecting Spoofed Packets. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Anwitaman Datta, Manfred Hauswirth, Karl Aberer Beyond "web of trust": Enabling P2P E-commerce. Search on Bibsonomy CEC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti How to unwittingly sign non-repudiable documents with Java applications. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Philip Jonathan Sutanto, Graham Leedham, Vladimir Pervouchine Study of the Consistency of Some Discriminatory Features Used by Document Examiners in the Analysis of Handwritten Letter 'a'. Search on Bibsonomy ICDAR The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Alessandro Zimmer, Luan Ling Lee A Hybrid On/Off Line Handwritten Signature Verification System. Search on Bibsonomy ICDAR The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Kevin Fu, M. Frans Kaashoek, David Mazières Fast and secure distributed read-only file system. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF read-only, security, File systems
9Chai Wah Wu On the design of content-based multimedia authentication systems. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Phillip Rogaway Authenticated-encryption with associated-data. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF OCB, associated-data problem, block-cipher usage, key separation, modes of operation, authenticated-encryption
9Giampaolo Bella, Lawrence C. Paulson, Fabio Massacci The verification of an industrial payment protocol: the SET purchase phase. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF inductive specifications, isabelle proof assistant, formal verification, electronic commerce, security protocols
9Cédric Fournet, Martín Abadi Hiding Names: Private Authentication in the Applied Pi Calculus. Search on Bibsonomy ISSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Jakob Jonsson On the Security of CTR + CBC-MAC. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF AES, modes of operation, authenticated encryption
9Nael B. Abu-Ghazaleh, Dhananjay S. Phatak Verification caching: towards efficient and secure mobile code execution environments. Search on Bibsonomy SAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Ferdinand J. Dafelmair Survivability Strategy for a Security Critical Process. Search on Bibsonomy SAFECOMP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Andrew D. Gordon 0001, Alan Jeffrey Types and Effects for Asymmetric Cryptographic Protocols. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Pekka Nikander, Jari Arkko Delegation of Signalling Rights. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 1059 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license