|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 798 occurrences of 452 keywords
|
|
|
Results
Found 1059 publication records. Showing 1059 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
65 | Lingli Deng, Yeping He, Ziyao Xu |
Combating Index Poisoning in P2P File Sharing. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
index poisoning, authenticity, P2P, bloom filter |
64 | Luiz Octavio Massato Kobayashi, Sérgio Shiguemi Furuie |
Proposal for DICOM Multiframe Medical Image Integrity and Authenticity. |
J. Digit. Imaging |
2009 |
DBLP DOI BibTeX RDF |
Security, image processing, authenticity, integrity, DICOM |
64 | Pairat Thorncharoensri, Willy Susilo, Yi Mu 0001 |
How to Balance Privacy with Authenticity. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
universal designated verifier signature schemes, one time, non-transferability, privacy, authenticity |
64 | Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow |
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
Identity-based signcryption, public ciphertext authenticity, network security, provable security, firewalls, elliptic curve cryptosystems, public key cryptosystems, forward security, semantical security, cryptographic primitives, public verifiability |
53 | Utpal Garain, Biswajit Halder |
On Automatic Authenticity Verification of Printed Security Documents. |
ICVGIP |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph |
Authenticity and Provability - A Formal Framework. |
InfraSec |
2002 |
DBLP DOI BibTeX RDF |
|
50 | Ioannis Poulios |
On the Greatest Challenge in the Management of Living Religious Heritage: Linking the Authenticity of Heritage and the Authenticity of Tourist Experiences to the Authenticity of Religious Tradition. |
TMM_CH (2) |
2018 |
DBLP DOI BibTeX RDF |
|
47 | Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee 0001, Jong In Lim 0001 |
Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
encrypt-then-sign, authenticity, confidentiality, non-repudiation, signcryption, authenticated encryption, public verifiability |
47 | Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 |
Encrypted Message Authentication by Firewalls. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption |
46 | Yuqun Chen, Mehmet Kivanç Mihçak, Darko Kirovski |
Certifying authenticity via fiber-infused paper. |
SIGecom Exch. |
2005 |
DBLP DOI BibTeX RDF |
anti-piracy, certificates of authenticity, counterfeit deterrence, security, economics |
46 | Darko Kirovski |
Toward an automated verification of certificates of authenticity. |
EC |
2004 |
DBLP DOI BibTeX RDF |
asymmetric traveling salesman, certificate of authenticity, point-set compression |
46 | Omer Horvitz, Virgil D. Gligor |
Weak Key Authenticity and the Computational Completeness of Formal Encryption. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
Weak Key Authenticity, Authentication, Cryptography, Encryption, Completeness, Formal Reasoning |
44 | Lingli Deng, Yeping He, Ziyao Xu |
Service Authenticity in P2P File-Sharing. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Jee Hea An, Mihir Bellare |
Does Encryption with Redundancy Provide Authenticity? |
EUROCRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
38 | Kriangsiri Malasri, Lan Wang |
Design and implementation of a secure wireless mote-based medical sensor network. |
UbiComp |
2008 |
DBLP DOI BibTeX RDF |
sensor network, privacy, authenticity, health monitoring |
38 | Niladri B. Puhan, Anthony T. S. Ho |
Secure authentication watermarking for localization against the Holliman-Memon attack. |
Multim. Syst. |
2007 |
DBLP DOI BibTeX RDF |
Fragile authentication, Holliman-Memon attack, Authenticity score, Security, Localization, Digital watermarking |
38 | Einar Mykletun, Maithili Narasimha, Gene Tsudik |
Authentication and integrity in outsourced databases. |
ACM Trans. Storage |
2006 |
DBLP DOI BibTeX RDF |
Outsourced databases, signature aggregation, authentication, integrity, data integrity, storage, data authenticity |
38 | Maithili Narasimha, Gene Tsudik |
DSAC: integrity for outsourced databases with signature aggregation and chaining. |
CIKM |
2005 |
DBLP DOI BibTeX RDF |
integrity and authenticity, signature aggregation, digital signature, schemes, data outsourcing |
38 | Roberto J. Bayardo, Jeffrey S. Sorensen |
Merkle tree authentication of HTTP responses. |
WWW (Special interest tracks and posters) |
2005 |
DBLP DOI BibTeX RDF |
web content distribution, authenticity, merkle hash tree |
38 | Phillip Rogaway, Mihir Bellare, John Black |
OCB: A block-cipher mode of operation for efficient authenticated encryption. |
ACM Trans. Inf. Syst. Secur. |
2003 |
DBLP DOI BibTeX RDF |
block-cipher usage, authenticity, cryptography, integrity, standards, encryption, AES, provable security, modes of operation |
38 | Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz |
OCB: a block-cipher mode of operation for efficient authenticated encryption. |
CCS |
2001 |
DBLP DOI BibTeX RDF |
authenticity, cryptography, integrity, standards, encryption, block ciphers, AES, provable security, modes of operation |
37 | Haipeng Chen 0002, Xuanjing Shen, Yingda Lv |
Blind Identification Method for Authenticity of Infinite Light Source Images. |
FCST |
2010 |
DBLP DOI BibTeX RDF |
light source direction, Hestenes-Powell multiplier method, image authenticity |
37 | Gilberto Filé, Roberto Vigo |
Expressive Power of Definite Clauses for Verifying Authenticity. |
CSF |
2009 |
DBLP DOI BibTeX RDF |
definite clauses, authenticity, security protocols, protocol verification |
37 | Neander Larsen Brisola, Altair Olivo Santin, Lau Cheuk Lung, Heverson Borba Ribeiro, Marcelo H. Vithoft |
A Public Keys Based Architecture for P2P Identification, Content Authenticity and Reputation. |
AINA Workshops |
2009 |
DBLP DOI BibTeX RDF |
Security for P2P, P2P persistent identification, peer and content reputation, content authenticity |
36 | Lingli Deng, Yeping He, Ziyao Xu |
Trusted Reputation Management Service for Peer-to-Peer Collaboration. |
OTM Conferences (2) |
2008 |
DBLP DOI BibTeX RDF |
data integrity, virtual machine, P2P, trusted computing, reputation management |
36 | Yvo Desmedt, Goce Jakimoski |
Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Tian-Tsong Ng, Shih-Fu Chang, Jessie Hsu, Lexing Xie, Mao-Pei Tsui |
Physics-motivated features for distinguishing photographic images and computer graphics. |
ACM Multimedia |
2005 |
DBLP DOI BibTeX RDF |
computer graphics, fractal, steganalysis, differential geometry, image authentication, natural image statistics, image forensics |
35 | Julie Doyle, Herna L. Viktor, Eric Paquet |
Long-term digital preservation: preserving authenticity and usability of 3-D data. |
Int. J. Digit. Libr. |
2009 |
DBLP DOI BibTeX RDF |
Metadata, Framework, Emulation, Long-term preservation |
35 | Gerald DeJean, Darko Kirovski |
RF-DNA: Radio-Frequency Certificates of Authenticity. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Zhi Li 0001, Qibin Sun, Yong Lian |
Unequal authenticity protection (UAP) for rate-distortion-optimized secure streaming of multimedia over wireless networks. |
ISCAS |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Xinwen Zhang, Songqing Chen, Ravi S. Sandhu |
Enhancing Data Authenticity and Integrity in P2P Systems. |
IEEE Internet Comput. |
2005 |
DBLP DOI BibTeX RDF |
security, ad hoc network, peer-to-peer, trust computing |
35 | Andrew D. Gordon 0001, Alan Jeffrey |
Authenticity by Typing for Security Protocols. |
CSFW |
2001 |
DBLP DOI BibTeX RDF |
|
35 | Josef Scharinger |
Application of Signed Kolmogorov Hashes to Provide Integrity and Authenticity in Web-Based Software Distribution. |
EUROCAST |
2001 |
DBLP DOI BibTeX RDF |
|
33 | Leonard Reinecke, Sabine Trepte |
Authenticity and well-being on social network sites: A two-wave longitudinal study on the effects of online authenticity and the positivity bias in SNS communication. |
Comput. Hum. Behav. |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Jian Ren 0001 |
Privacy-Preserving Communication Algorithms and Network Protocols. |
WASA |
2008 |
DBLP DOI BibTeX RDF |
Communication anonymity, sender anonymity, recipient anonymity, location privacy, unconditional security, content authenticity |
29 | Wei Wang 0062, Dongyao Ji |
Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol. |
FORTE |
2008 |
DBLP DOI BibTeX RDF |
AACS, Authenticity, SPIN, LTL, Collusion Attack, Model Checker |
29 | Miguel Ferreira, Ana Alice Baptista, José Carlos Ramalho |
An intelligent decision support system for digital preservation. |
Int. J. Digit. Libr. |
2007 |
DBLP DOI BibTeX RDF |
Preservation metadata, Preservation services, Web services, Service Oriented Architectures (SOA), Authenticity, Decision Support Systems, Migration, Digital preservation |
29 | Aleksej Jerman Blazic |
Long Term Trusted Archive Services. |
ICDS |
2007 |
DBLP DOI BibTeX RDF |
Electronic archive, authenticity, trust, protocol, integrity, validity, authority, document, evidence, record, long-term |
29 | Reagan W. Moore, Richard Marciano |
Building preservation environments. |
JCDL |
2005 |
DBLP DOI BibTeX RDF |
infrastructure independence, persistent archives, authenticity, integrity |
29 | Jorge Dávila, Javier López 0001, Antonio Mana, Juan J. Ortega, José M. Troya |
Development of Secure Internet Applications for Governmental Environments. |
DEXA Workshops |
2000 |
DBLP DOI BibTeX RDF |
secure Internet applications, governmental environments, public administrative procedures, economic benefits, citizen satisfaction, Project Alcance, Spanish R&D Programme, private transport companies, Andalucia regional government, Internet, authenticity, confidentiality, public administration, nonrepudiation |
29 | Petra Wohlmacher, Peter Pharow |
Applications in Health Care using Public-Key Certificates and Attribute Certificates. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures |
29 | George M. Mohay, J. Zellers |
Kernel and Shell-Based Applications Integrity Assurance. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
kernel-based applications integrity assurance, shell-based applications integrity assurance, software authenticity verification, CASS project, Computer Architecture for Secure Systems, UNIX SVR4.2, Mach 3.0 microkernel, portable shell, UNIX-style platforms, security, data integrity, operating system, executables, computer viruses, integrity checking, implementation issues |
29 | Tzonelih Hwang, T. R. N. Rao |
Secret Error-Correcting Codes (SECC). |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
Algebraic-Code Cryptosystem, Block Chaining, Ciphertext-Only Attach, Chosen -Plaintext Attach, Cryptographic Parameter, Data Reliability, Data Secrecy, JEEC, Known-Plaintext Attach, SECC, Work Factor, Cryptography, Data Integrity, Cryptanalysis, Data Security, Cryptosystems, Cryptology, Data Authenticity |
27 | Ashish Kundu, Elisa Bertino |
How to authenticate graphs without leaking. |
EDBT |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Xiaotao Guo, Tian-Ge Zhuang |
A Region-Based Lossless Watermarking Scheme for Enhancing Security of Medical Data. |
J. Digit. Imaging |
2009 |
DBLP DOI BibTeX RDF |
security, integrity, Watermarking, confidentiality, telemedicine, PACS, ROI, image authentication |
27 | Pairat Thorncharoensri, Willy Susilo, Yi Mu 0001 |
Universal Designated Verifier Signatures with Threshold-Signers. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Dusko Pavlovic, Catherine Meadows 0001 |
Deriving Secrecy in Key Establishment Protocols. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Audun Jøsang |
A Subjective Metric of Authentication. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Ziqing Mao, Ninghui Li, Ian M. Molloy |
Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Cross-Site Request Forgery, Web Security, Browser Security |
26 | Daisuke Kikuchi, Naoki Kobayashi 0001 |
Type-Based Automated Verification of Authenticity in Cryptographic Protocols. |
ESOP |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Tom Kean, David McLaren, Carol Marsh |
Verifying the Authenticity of Chip Designs with the DesignTag System. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Zhi Li 0001, Qibin Sun, Yong Lian 0001, Chang Wen Chen |
Joint Source-Channel-Authentication Resource Allocation and Unequal Authenticity Protection for Multimedia Over Wireless Networks. |
IEEE Trans. Multim. |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Marius Wolf, Eric Lee, Jan O. Borchers |
Education, entertainment and authenticity: lessons learned from designing an interactive exhibit about medieval music. |
CHI Extended Abstracts |
2007 |
DBLP DOI BibTeX RDF |
multimedia, education, music, entertainment, interactive exhibits |
26 | Jacek Jonczy |
Evaluating Trust and Authenticity with Caution. |
iTrust |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Reto Kohlas, Jacek Jonczy, Rolf Haenni |
Towards a precise semantics for authenticity and trust. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Darko Kirovski |
A Point-Set Compression Heuristic for Fiber-Based Certificates of Authenticity. |
DCC |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Christian Haack, Alan Jeffrey |
Timed Spi-Calculus with Types for Secrecy and Authenticity. |
CONCUR |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang |
Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Christian Decker 0001, Michael Beigl, Albert Krohn, Philip Robinson, Uwe Kubach |
eSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity. |
Pervasive |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Andy Gordon 0001 |
Authenticity Types for Cryptographic Protocols. |
FASec |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Bruno Blanchet |
From Secrecy to Authenticity in Security Protocols. |
SAS |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Jean-Jacques Bascou |
System Survey: Building an Authenticity Profile. |
ICCCN |
1998 |
DBLP DOI BibTeX RDF |
Security, Authentication, User Profile |
26 | Pak Chung Wong, R. Daniel Bergeron |
Authenticity Analysis of Wavelet Approximations in Visualization. |
IEEE Visualization |
1995 |
DBLP DOI BibTeX RDF |
Wavelet transform, Data compression, Data visualization, Multiresolution visualization |
26 | Fritz Bauspieß, Hans-Joachim Knobloch |
How to Keep Authenticity Alive in a Computer Network. |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
20 | Peter H. Kahn Jr., Jolina H. Ruckert, Takayuki Kanda 0001, Hiroshi Ishiguro, Aimee L. Reichert, Heather E. Gary, Solace Shen |
Psychological intimacy with robots?: using interaction patterns to uncover depth of relation. |
HRI |
2010 |
DBLP DOI BibTeX RDF |
social and moral development, authenticity, human-robot interaction, design methodology, intimacy, interaction patterns |
20 | Abdelhamid Benhocine, Lamri Laouamer, Laurent Nana, Anca Pascu |
A New Approach against Color Attacks of Watermarked Images. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
authenticity, interpolation, watermarking, attacks, image quality, copyright, Stirmark |
20 | Markus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevis, Youn-Kyung Lim |
What Instills Trust? A Qualitative Study of Phishing. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
stimuli, design, authenticity, user interface design, experiment, email, phishing, psychology, web pages, think-aloud |
20 | Yiping Shen, T. C. Lam, Jyh-Charn Liu, Wei Zhao 0001 |
On the Confidential Auditing of Distributed Computing Systems. |
ICDCS |
2004 |
DBLP DOI BibTeX RDF |
commutative cryptography, secure distributed computing, cluster, authenticity, anonymity, Auditing |
20 | Baoshi Zhu, Jiankang Wu, Mohan S. Kankanhalli |
Print signatures for document authentication. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
laser printer, originality, print signature, authenticity |
20 | Paolo Maggi, Riccardo Sisto |
A configurable mobile agent data protection protocol. |
AAMAS |
2003 |
DBLP DOI BibTeX RDF |
mobile agents, data integrity, cryptographic protocols, data authenticity |
20 | Roberto Di Pietro, Antonio Durante, Luigi V. Mancini |
A Reliable Key Authentication Schema for Secure Multicast Communications. |
SRDS |
2003 |
DBLP DOI BibTeX RDF |
Secure multicast communications, logical key hierarchy, re-keying, security, authenticity, confidentiality, key distribution, group key management |
20 | Ahto Buldas, Peeter Laud, Helger Lipmaa |
Accountable certificate management using undeniable attestations. |
CCS |
2000 |
DBLP DOI BibTeX RDF |
accountable certificate management, authenticated search trees, long-term authenticity, public-key infrastructure, non-repudiation, search trees, time-stamping, attesters |
18 | Deepak Vijaywargi, Dave Lewis 0002, Darko Kirovski |
Optical DNA. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Tingjian Ge, Stanley B. Zdonik |
Light-Weight, Runtime Verification of Query Sources. |
ICDE |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Senda Hammouda, Zouheir Trabelsi |
An enhanced secure ARP protocol and LAN switch for preveting ARP based attacks. |
IWCMC |
2009 |
DBLP DOI BibTeX RDF |
ARP cache poisoning attack, ARP protocol, man-in-the-middle attack |
18 | Matthew C. Stamm, K. J. Ray Liu |
Blind forensics of contrast enhancement in digital images. |
ICIP |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Yutaka Kidawara |
Information credibility analysis of web content. |
WICOW |
2008 |
DBLP DOI BibTeX RDF |
nlp, information retrieval, information credibility |
18 | Mingyan Li, Casey K. Fung, Krishna Sampigethaya, Richard Robinson, Radha Poovendran, Rainer Falk, Florian Kohlmayer, Andreas Koepf |
Public key based authentication for secure integration of sensor data and RFID. |
HeterSanet |
2008 |
DBLP DOI BibTeX RDF |
authentication, workflow, RFID, sensor, tag, certificate, public key |
18 | Tong-Lee Lim, Tieyan Li, Yingjiu Li |
A Security and Performance Evaluation of Hash-Based RFID Protocols. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
RFID Security and Privacy, Authentication Protocols |
18 | Joan Arnedo-Moreno, Jordi Herrera-Joancomartí |
Persistent Interoperable Security for JXTA Advertisements. |
CISIS |
2008 |
DBLP DOI BibTeX RDF |
|
18 | William Steptoe, Anthony Steed |
High-Fidelity Avatar Eye-Representation. |
VR |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Barath Raghavan, Saurabh Panjwani, Anton Mityagin |
Analysis of the SPV secure routing protocol: weaknesses and lessons. |
Comput. Commun. Rev. |
2007 |
DBLP DOI BibTeX RDF |
secure path vector, routing, BGP |
18 | Jianguo Zhang, Fenghai Yu, Jianyong Sun, Yuanyuan Yang, Chenwen Liang |
DICOM Image Secure Communications With Internet Protocols IPv6 and IPv4. |
IEEE Trans. Inf. Technol. Biomed. |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Zuhua Shao |
Self-certified Signatures Based on Discrete Logarithms. |
WAIFI |
2007 |
DBLP DOI BibTeX RDF |
Self-certified public key signature, Discrete logarithm, strong unforgeability |
18 | Tri Van Le, Mike Burmester, Breno de Medeiros |
Universally composable and forward-secure RFID authentication and authenticated key exchange. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
RFID authentication and key-exchange protocols, anonymity, forward-security, universal composability |
18 | Chik How Tan |
Insider-secure Hybrid Signcryption SchemeWithout Random Oracles. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Bogdan Groza |
Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Somanath Tripathy |
LISA: LIghtweight Security Algorithm for Wireless Sensor Networks. |
ICDCIT |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Bogdan Groza, Dorina Petrica, Simona Barbu, Mariana Bilanin |
Implementation of an Authentication Protocol for Sending Audio-Video Information in Java. |
SACI |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Meng-Hui Lim, Sanggon Lee, Youngho Park 0005, Hoonjae Lee 0001 |
An Enhanced ID-Based Deniable Authentication Protocol on Pairings. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Ziyao Xu, Yeping He, Lingli Deng |
A Multilevel Reputation System for Peer-to-Peer Networks. |
GCC |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Thomas Neubauer, Edgar R. Weippl, Stefan Biffl |
Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Maithili Narasimha, Gene Tsudik |
Authentication of Outsourced Databases Using Signature Aggregation and Chaining. |
DASFAA |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Pim Tuyls, Lejla Batina |
RFID-Tags for Anti-counterfeiting. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
Physical Unclonable Function (PUF), authentication, RFID, ECC, counterfeiting |
18 | Xiaomei Liu, Li Xiao 0001 |
hiREP: Hierarchical Reputation Management for Peer-to-Peer Systems. |
ICPP |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang |
Certificateless Designated Verifier Signature Schemes. |
AINA (2) |
2006 |
DBLP DOI BibTeX RDF |
Designated Verifier, Gap Bilinear Diffie-Hellman Problem, Certificateless Cryptography |
18 | Qibin Sun, Shih-Fu Chang |
A secure and robust digital signature scheme for JPEG2000 image authentication. |
IEEE Trans. Multim. |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Andrea Oermann, Andreas Lang 0001, Jana Dittmann |
Verifier-tuple for audio-forensic to determine speaker environment. |
MM&Sec |
2005 |
DBLP DOI BibTeX RDF |
concept of content analysis, forensic analysis of digital multimedia |
18 | Anat Bremler-Barr, Hanoch Levy |
Spoofing prevention method. |
INFOCOM |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Reagan W. Moore, Joseph F. JáJá, Robert Chadduck |
Mitigating Risk of Data Loss in Preservation Environments. |
MSST |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1059 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|