Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
9 | Ford-Long Wong, Frank Stajano |
Multi-channel Protocols. |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
9 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Lauri I. W. Pesonen, Jean Bacon |
Secure event types in content-based, multi-domain publish/subscribe systems. |
SEM |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Hugh C. Davis, Su White |
A research-led curriculum in multimedia: learning about convergence. |
ITiCSE |
2005 |
DBLP DOI BibTeX RDF |
research-led teaching, multimedia, student engagement |
9 | Tao Xie 0004, Andrew H. Sung, Xiao Qin 0001 |
Dynamic Task Scheduling with Security Awareness in Real-Time Systems. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Panayiotis Kotzanikolaou, Emmanouil Magkos, Christos Douligeris, Vassilios Chrissikopoulos |
Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks. |
WOWMOM |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Fabio Dianda, Filippo Giuntini, Fabio Martinelli, Anna Vaccarelli |
A Flexible Framework for Access Control Based on Ability Authentication. |
SAINT Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
9 | I-Chuan Chang, Bor-Wen Hsu, Chi-Sung Laih |
A DCT Quantization-Based Image Authentication System for Digital Forensics. |
SADFE |
2005 |
DBLP DOI BibTeX RDF |
|
9 | R. J. Hulsebosch, Alfons H. Salden, Mortaza S. Bargh, P. W. G. Ebben, J. Reitsma |
Context sensitive access control. |
SACMAT |
2005 |
DBLP DOI BibTeX RDF |
context verification, service usage patterns, authentication, access control, context sensitive |
9 | Yan Wang, Ruizhen Liu |
A Print-Scan Resistable Digital Seal System. |
ICIC (2) |
2005 |
DBLP DOI BibTeX RDF |
|
9 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size. |
ICN (2) |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Dennis Kügler |
Security Concept of the EU-Passport. |
SPC |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Eckehard Hermann, Dieter Kessler |
XML Signatures in an Enterprise Service Bus Environment. |
Communications and Multimedia Security |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Enrico Hauer, Jana Dittmann, Martin Steinebach |
Digital Signatures Based on Invertible Watermarks for Video Authentication. |
Communications and Multimedia Security |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Sergio Vicente Denser Pamboukian, Hae Yong Kim |
New Public-Key Authentication Watermarking for JBIG2 Resistant to Parity Attacks. |
IWDW |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Peng Wang 0009, Dengguo Feng, Wenling Wu |
On the Security of Tweakable Modes of Operation: TBC and TAE. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
modes of operation, authenticated encryption, symmetric encryption, Blockcipher, tweakable blockcipher |
9 | Chin-Chen Chang 0001, Tzu-Chuen Lu, Jun-Bin Yeh |
A Bandwidth Efficiency of Lempel-Ziv Scheme for Data Authentication. |
KES (4) |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Igor J. Berezhnoy, Eric O. Postma, H. Jaap van den Herik |
Authentic: Computerized Brushstroke Analysis. |
ICME |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Shuiming Ye, Ee-Chien Chang, Qibin Sun |
Watermarking based Image Authentication using Feature Amplification. |
ICME |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Seonho Choi |
Denial-of-Service Resistant Multicast Authentication Protocol with Prediction Hashing and One-way Key Chain. |
ISM |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Graham R. Nelson, Graham A. Jullien, Orly Yadid-Pecht |
CMOS image sensor with watermarking capabilities. |
ISCAS (5) |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Shuiming Ye, Qibin Sun, Ee-Chien Chang |
Error resilient content-based image authentication over wireless channel. |
ISCAS (3) |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Zhongchao Yu, Chuk-Yang Seng, Tao Jiang 0004, Xue Wu, William A. Arbaugh |
Robust Routing in Malicious Environment for Ad Hoc Networks. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Thomas Wölfl |
Public-Key-Infrastructure Based on a Peer-to-Peer Network. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Thomas Groß 0001, Birgit Pfitzmann, Ahmad-Reza Sadeghi |
Proving a WS-federation passive requestor profile with a browser model. |
SWS |
2005 |
DBLP DOI BibTeX RDF |
WS-federation passive requestor profile, WSFPI, security proof of protocols, single signon, web browser, web service security, identity federation |
9 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang |
On the Security of Certificateless Signature Schemes from Asiacrypt 2003. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
Bilinear Pairing, Attack Model, Certificateless Cryptography, Certificateless Signature |
9 | Xinhua Zhang, Chunyan Jiang, Wanjun Huang, Christoph Meinel |
A XML format secure protocol - OpenSST. |
AICCSA |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Yongzheng Zhang 0002, Binxing Fang, Yue Chi, Xiao-chun Yun |
Assessment of Windows System Security Using Vulnerability Relationship Graph. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Chen Xu 0004, Weiqiang Zhang, Francis R. Austin |
A Digital Watermarking Technique Based on Wavelet Packages. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
Wavelet package, hiding, algorithm, digital watermark, watermark detection |
9 | Jan Jürjens |
Understanding Security Goals Provided by Crypto-Protocol Implementations. |
ICSM |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Raja Al-Jaljouli |
Boosting m-Business Using a Truly Secured Protocol for Data Gathering Mobile Agents. |
ICMB |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Jing-Shyang Hwu, Rong-Jaye Chen, Yi-Bing Lin |
Authenticated public-key distribution over WLAN/cellular dual networks. |
ITRE |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Jan Jürjens |
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Pablo Hennings, Marios Savvides, B. V. K. Vijaya Kumar |
Verification of Biometric Palmprint Patterns Using Optimal Trade-Off Filter Classifiers. |
ICIAR |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona |
A secure and flexible authentication system for digital images. |
Multim. Syst. |
2004 |
DBLP DOI BibTeX RDF |
Compression tolerance, JPEG, Image authentication |
9 | Yongge Wang |
Robust key establishment in sensor networks. |
SIGMOD Rec. |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Henry M. Gladney |
Trustworthy 100-year digital objects: Evidence after every witness is dead. |
ACM Trans. Inf. Syst. |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Natalya V. Sveshnikova, Dmitry V. Yurin |
A Priori and A Posteriori Error Estimates in Recovery of 3D Scenes by Factorization Algorithms. |
Program. Comput. Softw. |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Jean-Baptiste Fasquel, Michel Bruynooghe |
A hybrid opto-electronic method for fast off-line handwritten signature verification. |
Int. J. Document Anal. Recognit. |
2004 |
DBLP DOI BibTeX RDF |
Fast off-line recognition, Fusion of statistical classifiers, Optical correlation, Gabor wavelet |
9 | Tian-Tsong Ng, Shih-Fu Chang |
A model for image splicing. |
ICIP |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Dae Hyun Yum, Pil Joong Lee |
Identity-Based Cryptography in Public Key Management. |
EuroPKI |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Hao Yang 0004, Songwu Lu |
Commutative cipher based en-route filtering in wireless sensor networks. |
VTC Fall (2) |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Michael A. Keller |
Gold at the End of the Digital Library Rainbow: Forecasting the Consequences of Truly Effective Digital Libraries. |
ICADL |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Sadybakasov Ulanbek, Ashutosh Saxena, Atul Negi |
On Reduction of Bootstrapping Information Using Digital Multisignature. |
CIT |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Nikita Borisov, Ian Goldberg, Eric A. Brewer |
Off-the-record communication, or, why not to use PGP. |
WPES |
2004 |
DBLP DOI BibTeX RDF |
private communication, deniability, perfect forward secrecy |
9 | Xiaofeng Chen 0001, Fangguo Zhang, Kwangjo Kim |
Limited Verifier Signature from Bilinear Pairings. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Alisher Kholmatov, Berrin A. Yanikoglu |
Biometric Authentication Using Online Signatures. |
ISCIS |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Yi Mu 0001, Willy Susilo, Yan-Xia Lin, Chun Ruan |
Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption. |
ASIAN |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Mihir Bellare, Phillip Rogaway, David A. Wagner 0001 |
The EAX Mode of Operation. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
EAX, OMAC, provable security, message authentication, modes of operation, Authenticated encryption, CCM, CBC MAC |
9 | Tadayoshi Kohno, John Viega, Doug Whiting |
CWC: A High-Performance Conventional Authenticated Encryption Mode. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Renato Renner, Stefan Wolf 0001 |
The Exact Price for Unconditionally Secure Asymmetric Cryptography. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
quantum key agreement, reductions of information-theoretic primitives, authentication, Information-theoretic security, privacy amplification, information reconciliation |
9 | Dae Hyun Yum, Pil Joong Lee |
Separable Implicit Certificate Revocation. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
certificate-based encryption, PKI, certificate revocation |
9 | Dae Hyun Yum, Pil Joong Lee |
Generic Construction of Certificateless Encryption. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Seung-Hyun Seo, Sang-Ho Lee |
A Secure and Flexible Multi-signcryption Scheme. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
Signcryption, multi-signature |
9 | Kee-Won Kim, Eun-Kyung Ryu, Kee-Young Yoo |
ID-Based Authenticated Multiple-Key Agreement Protocol from Pairings. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Thomas Groß 0001, Birgit Pfitzmann |
Proving a WS-Federation passive requestor profile. |
SWS |
2004 |
DBLP DOI BibTeX RDF |
WS-federation passive requestor profile, WSFPI, browser-based, security proof of protocols, single signon, security, web browser, web service security, federated identity management, identity federation |
9 | Johannes Borgström, Sébastien Briais, Uwe Nestmann |
Symbolic Bisimulation in the Spi Calculus. |
CONCUR |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Hongmei Deng, Anindo Mukherjee, Dharma P. Agrawal |
Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal, Dharma P. Agrawal |
Jigsaw-based Secure Data Transfer over Computer Networks. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Bruno Blanchet |
Automatic Proof of Strong Secrecy for Security Protocols. |
S&P |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Shourya Roy, Sachindra Joshi, Raghu Krishnapuram |
Automatic categorization of web sites based on source types. |
Hypertext |
2004 |
DBLP DOI BibTeX RDF |
site interaction, source categorization, web site categorization, classification |
9 | Xin Lü, Dengguo Feng |
An Arbitrated Quantum Message Signature Scheme. |
CIS |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Christian Haack, Alan Jeffrey |
Pattern-Matching Spi-Calculus. |
Formal Aspects in Security and Trust |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Luke Hebbes, Andrew P. Lenaghan |
A Semi-fragile Steganographic Digital Signature for Images. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Timo Lainema, Sami Nurmi |
Customization of Industrial Training. |
Information and Communication Technologies and Real-Life Learning |
2004 |
DBLP DOI BibTeX RDF |
customized learning environments, business training, Industrial Training |
9 | Majed AbuSafiya, Subhasish Mazumdar |
Accommodating paper in document databases. |
ACM Symposium on Document Engineering |
2004 |
DBLP DOI BibTeX RDF |
enterprise document model, paper manifestation, RFID, document management, document databases, paper documents |
9 | Venkata N. Padmanabhan, Daniel R. Simon |
Secure traceroute to detect faulty or malicious routing. |
Comput. Commun. Rev. |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Ross A. J. Everitt, Peter W. McOwan |
Java-Based Internet Biometric Authentication System. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2003 |
DBLP DOI BibTeX RDF |
keyboard dynamics, Java, Internet, verification, Authentication, biometric, signature |
9 | Anil K. Jain 0001, Umut Uludag |
Hiding Biometric Data. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2003 |
DBLP DOI BibTeX RDF |
Biometrics, watermarking, steganography, fingerprint, data hiding, face, minutiae |
9 | Daigo Tomioka, Shin-ya Nishizaki, Ritsuya Ikeda |
A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack. |
ISSS |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Ashraf Bhery, Shigeki Hagihara, Naoki Yonezaki |
A Formal System for Analysis of Cryptographic Encryption and Their Security Properties. |
ISSS |
2003 |
DBLP DOI BibTeX RDF |
unjudgment, symmetric-content-non-malleability, symmetric-content-indistinguishability, symmetric-key-indistinguishablity, symmetric-content-length-indistinguishability, encryption, judgment, deduction systems |
9 | Petr Novák, Milan Rollo, Jirí Hodík, Tomás Vlcek |
Communication Security in Multi-agent Systems. |
CEEMAS |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Jean-Paul M. G. Linnartz, Pim Tuyls |
New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates. |
AVBPA |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Stavros N. Demetriadis, Evangelos Triantafillou, Andreas S. Pombortsis |
A phenomenographic study of students' attitudes toward the use of multiple media for learning. |
ITiCSE |
2003 |
DBLP DOI BibTeX RDF |
students' attitudes, learning styles, multimedia learning |
9 | Trevor M. Murphy, Mika Hirai |
Teaching with technology, setting an example. |
SIGUCCS |
2003 |
DBLP DOI BibTeX RDF |
electronic portfolios, learning modules, web portfolio, multimedia, education, animation, video, pedagogy, audio, technology |
9 | Roberto Gorrieri, Fabio Martinelli |
Process Algebraic Frameworks for the Specification and Analysis of Cryptographic Protocols. |
MFCS |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Peter Lory |
A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net. |
Business Process Management |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong Shao |
A flexible and scalable authentication scheme for JPEG2000 image codestreams. |
ACM Multimedia |
2003 |
DBLP DOI BibTeX RDF |
message digest, authentication, data integrity, digital signature, image compression, JPEG2000, one-way hash function, merkle hash tree |
9 | Sattam S. Al-Riyami, Kenneth G. Paterson |
Certificateless Public Key Cryptography. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Pim Tuyls, Tom A. M. Kevenaar, Geert Jan Schrijen, Toine Staring, Marten van Dijk |
Visual Crypto Displays Enabling Secure Communications. |
SPC |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Peter Lory |
A Coloured Petri Net Trust Model. |
DEXA Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Bruno Blanchet |
Automatic verification of cryptographic protocols: a logic programming approach. |
PPDP |
2003 |
DBLP DOI BibTeX RDF |
logic programming, cryptographic protocols, automatic verification, horn clauses |
9 | He Huang, Shyhtsun Felix Wu |
An approach to certificate path discovery in mobile Ad Hoc networks. |
SASN |
2003 |
DBLP DOI BibTeX RDF |
certificate path discovery, security, MANET, public key infrastructure |
9 | Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia |
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. |
ICDCS Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Adrian von Bidder, Nathalie Weiler |
Key Exchange (KX) - A Next Generation Protocol to Synchronise PGP Keyservers. |
WETICE |
2003 |
DBLP DOI BibTeX RDF |
Secure Synchronisation Protocol, E-Mail Security, OpenPGP, Keyserver |
9 | Steven J. Templeton, Karl E. Levitt |
Detecting Spoofed Packets. |
DISCEX (1) |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Anwitaman Datta, Manfred Hauswirth, Karl Aberer |
Beyond "web of trust": Enabling P2P E-commerce. |
CEC |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti |
How to unwittingly sign non-repudiable documents with Java applications. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Philip Jonathan Sutanto, Graham Leedham, Vladimir Pervouchine |
Study of the Consistency of Some Discriminatory Features Used by Document Examiners in the Analysis of Handwritten Letter 'a'. |
ICDAR |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Alessandro Zimmer, Luan Ling Lee |
A Hybrid On/Off Line Handwritten Signature Verification System. |
ICDAR |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Kevin Fu, M. Frans Kaashoek, David Mazières |
Fast and secure distributed read-only file system. |
ACM Trans. Comput. Syst. |
2002 |
DBLP DOI BibTeX RDF |
read-only, security, File systems |
9 | Chai Wah Wu |
On the design of content-based multimedia authentication systems. |
IEEE Trans. Multim. |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Phillip Rogaway |
Authenticated-encryption with associated-data. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
OCB, associated-data problem, block-cipher usage, key separation, modes of operation, authenticated-encryption |
9 | Giampaolo Bella, Lawrence C. Paulson, Fabio Massacci |
The verification of an industrial payment protocol: the SET purchase phase. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
inductive specifications, isabelle proof assistant, formal verification, electronic commerce, security protocols |
9 | Cédric Fournet, Martín Abadi |
Hiding Names: Private Authentication in the Applied Pi Calculus. |
ISSS |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Jakob Jonsson |
On the Security of CTR + CBC-MAC. |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
AES, modes of operation, authenticated encryption |
9 | Nael B. Abu-Ghazaleh, Dhananjay S. Phatak |
Verification caching: towards efficient and secure mobile code execution environments. |
SAC |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Ferdinand J. Dafelmair |
Survivability Strategy for a Security Critical Process. |
SAFECOMP |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Andrew D. Gordon 0001, Alan Jeffrey |
Types and Effects for Asymmetric Cryptographic Protocols. |
CSFW |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Pekka Nikander, Jari Arkko |
Delegation of Signalling Rights. |
Security Protocols Workshop |
2002 |
DBLP DOI BibTeX RDF |
|