|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 411 occurrences of 203 keywords
|
|
|
Results
Found 597 publication records. Showing 597 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
149 | Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek |
Concurrently-secure credential ownership proofs. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
identity-based cryptography, signature schemes, identification schemes, credential systems, designated-verifier signatures |
96 | Joseph K. Liu, Duncan S. Wong |
A Restricted Multi-show Credential System and Its Application on E-Voting. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
96 | Daniel Kouril, Jim Basney |
A credential renewal service for long-running jobs. |
GRID |
2005 |
DBLP DOI BibTeX RDF |
|
93 | Hai Jin 0001, Chuanjiang Yi |
CMM: Credential migration management system based on trusted computing in CGSP. |
Frontiers Comput. Sci. China |
2007 |
DBLP DOI BibTeX RDF |
credential migration, ChinaGrid, Daonity, grid computing, trusted computing |
89 | Mingchu Li, Hongyan Yao, Jianbo Ma |
Recovery Mechanism of Online Certification Chain in Grid Computing. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
Certifucate Chain, Double signature, Grid security, Proxy certificate |
85 | Xiangxi Li, Yu Zhang, Yuxin Deng |
Verifying Anonymous Credential Systems in Applied Pi Calculus. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
|
85 | Ninghui Li, William H. Winsborough, John C. Mitchell |
Distributed credential chain discovery in trust management: extended abstract. |
CCS |
2001 |
DBLP DOI BibTeX RDF |
|
75 | Jan Camenisch, Anna Lysyanskaya |
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. |
EUROCRYPT |
2001 |
DBLP DOI BibTeX RDF |
pseudonym system, circular encryption, key-oblivious encryption, Privacy protection, blind signatures, e-cash, credential system |
74 | Norio Akagi, Yoshifumi Manabe, Tatsuaki Okamoto |
An Efficient Anonymous Credential System. |
Financial Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
71 | Shouhuai Xu, Moti Yung |
Expecting the Unexpected: Towards Robust Credential Infrastructure. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Credential infrastructures, key compromise, hit-and-run attack, hit-and-stick attack, digital signatures, PKI, insider attack |
71 | Sye Loong Keoh, Emil Lupu |
Towards flexible credential verification in mobile ad-hoc networks. |
POMC |
2002 |
DBLP DOI BibTeX RDF |
credential verification, security, authentication, trust |
64 | Ching Yu Ng, Willy Susilo, Yi Mu 0001 |
Designated group credentials. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
designated, signature, bilinear pairings, credential |
64 | Tobias Straub, Thilo-Alexander Ginkel, Johannes Buchmann 0001 |
A Multipurpose Delegation Proxy for WWW Credentials. |
EuroPKI |
2005 |
DBLP DOI BibTeX RDF |
Credential Delegation, WWW Authentication, Usability, X.509 Certificate, Man-In-The-Middle |
63 | David Del Vecchio, Marty Humphrey, Jim Basney, Nataraj Nagaratnam |
CredEx: User-Centric Credential Management for Grid and Web Services. |
ICWS |
2005 |
DBLP DOI BibTeX RDF |
|
63 | Markus Lorch, Jim Basney, Dennis G. Kafura |
A hardware-secured credential repository for Grid PKIs. |
CCGRID |
2004 |
DBLP DOI BibTeX RDF |
|
59 | Jan Camenisch, Els Van Herreweghen |
Design and implementation of the idemix anonymous credential system. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
privacy, cryptographic protocols, anonymous credential systems |
56 | Jan Camenisch, Markulf Kohlweiss, Claudio Soriente |
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
revocation, anonymous credentials, dynamic accumulators |
53 | Jianxin Li 0002, Dacheng Zhang, Jinpeng Huai, Jie Xu 0007 |
Context-aware trust negotiation in peer-to-peer service collaborations. |
Peer-to-Peer Netw. Appl. |
2009 |
DBLP DOI BibTeX RDF |
Peer-to-peer access control, Security policy, Privacy preservation, Credential, Trust establishment |
53 | Ke Zeng |
Access with Fast Batch Verifiable Anonymous Credentials. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
fine-grained revocation, pairing, batch verification, anonymous credential |
53 | Michael T. Goodrich, Michael Shin, Roberto Tamassia, William H. Winsborough |
Authenticated Dictionaries for Fresh Attribute Credentials. |
iTrust |
2003 |
DBLP DOI BibTeX RDF |
third-party data publication, authentication of cached data, trust management, dynamic data structures, certificate revocation, digital credential, authenticated dictionary |
52 | Corinne S. Irwin, Dennis C. Taylor |
Identity, credential, and access management at NASA, from Zachman to attributes. |
IDtrust |
2009 |
DBLP DOI BibTeX RDF |
attribute-based access control (ABAC), level of assurance (LoA), logical access control system (LACS) |
52 | Jacek Jonczy, Rolf Haenni |
Implementing Credential Networks. |
iTrust |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Yanjiang Yang, Feng Bao 0001, Robert H. Deng |
Security Analysis and Fix of an Anonymous Credential System. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Xian Zhu, Shaobin Wang, Fan Hong, Junguo Liao |
Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Xiangli Qu, Xuejun Yang, Guang Xiang, Haifang Zhou |
Credential Trustworthiness-Based Trust Evaluation in Grid. |
GCC Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Ivan Damgård |
Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
48 | Jatinder Singh, David M. Eyers, Jean Bacon |
Credential management in event-driven healthcare systems. |
Middleware (Companion) |
2008 |
DBLP DOI BibTeX RDF |
confidentaility, credential management, data control, eventbased middleware, privacy, healthcare, publish/subscribe |
48 | Joachim Biskup, Sandra Wortmann |
Towards a credential-based implementation of compound access control policies. |
SACMAT |
2004 |
DBLP DOI BibTeX RDF |
certificate chain discovery, policy algebra, access control, public key infrastructure, credential, spki/sdsi |
45 | Walid Bagga, Refik Molva, Stefano Crosta |
Policy-based encryption schemes from bilinear pairings. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Sudip Chakraborty, Indrajit Ray |
TrustBAC: integrating trust relationships into the RBAC model for access control in open systems. |
SACMAT |
2006 |
DBLP DOI BibTeX RDF |
access control, trust, RBAC |
45 | Jiangtao Li 0001, Ninghui Li, William H. Winsborough |
Automated trust negotiation using cryptographic credentials. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
privacy, access control, automated trust negotiation, digital credentials |
45 | Kent E. Seamons, Marianne Winslett, Ting Yu 0001, Lina Yu, Ryan Jarvis |
Protecting Privacy during On-Line Trust Negotiation. |
Privacy Enhancing Technologies |
2002 |
DBLP DOI BibTeX RDF |
|
41 | Patrik Bichsel, Jan Camenisch, Thomas Groß 0001, Victor Shoup |
Anonymous credentials on a standard java card. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
privacy-enhancing systems, smart card, java card, anonymous credential systems |
41 | Seon-Ho Park, Young-Ju Han, Tai-Myoung Chung |
Context-Aware Security Management System for Pervasive Computing Environment. |
CONTEXT |
2007 |
DBLP DOI BibTeX RDF |
context role based access control, partial credential, authentication, context aware, pervasive computing |
41 | Luiz M. R. Gadelha Jr., Bruno Schulze |
On the management of grid credentials. |
MGC |
2007 |
DBLP DOI BibTeX RDF |
credential management, grid computing, public key infrastructure, grid security |
41 | Shouhuai Xu, Moti Yung |
k-anonymous secret handshakes with reusable credentials. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
privacy-preserving authentication, reusable credentials, anonymity, unlinkability, secret handshake, credential systems |
41 | Andreas Pashalidis, Chris J. Mitchell |
Limits to Anonymity When Using Credentials. |
Security Protocols Workshop |
2004 |
DBLP DOI BibTeX RDF |
pseudonym systems, privacy, timing attacks, unlinkability, anonymous credential systems |
41 | Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf 0001 |
Pseudonym Systems. |
Selected Areas in Cryptography |
1999 |
DBLP DOI BibTeX RDF |
nyms, credential transfer, Anonymity, credentials, pseudonyms, unlinkability |
40 | Daisuke Mashima, Mustaque Ahamad |
Using identity credential usage logs to detect anomalous service accesses. |
Digital Identity Management |
2009 |
DBLP DOI BibTeX RDF |
identity theft and misuse detection, online access log monitoring, risk scoring |
40 | Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini |
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Christian Tchepnda, Hassnaa Moustafa, Houda Labiod, Gilles Bourdon |
Performance Analysis of a Layer-2 Multi-Hop Authentication and Credential Delivery Scheme for Vehicular Networks. |
VTC Spring |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Jemal H. Abawajy |
An Online Credential Management Service for InterGrid Computing. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Federica Paci, David Bauer, Elisa Bertino, Douglas M. Blough, Anna Cinzia Squicciarini |
Minimal credential disclosure in trust negotiations. |
Digital Identity Management |
2008 |
DBLP DOI BibTeX RDF |
identity attributes, micro-claims, minimal disclosure |
40 | Zhensong Liao, Hai Jin 0001, Deqing Zou |
A Hidden Credential Based Oblivious Automated Trust Negotiation Model. |
ICEBE |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala |
An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies. |
ICISS |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Giuseppe Persiano, Ivan Visconti |
An Efficient and Usable Multi-show Non-transferable Anonymous Credential System. |
Financial Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
40 | David M. Eyers, Ken Moody |
Credential negotiation with limited disclosure via iterative range refinement in an unordered space. |
DEXA Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
37 | Sheng Xiao, Weibo Gong |
Mobility Can Help: Protect User Identity with Dynamic Credential. |
Mobile Data Management |
2010 |
DBLP DOI BibTeX RDF |
Dynamic Secret, Dynamic Credential, Informatio Loss, Mobility |
36 | Aryan Mahindra, Chandan CV, Priyanshi Katiyar, Anshuman Sharma, Sheshank Shankar, Rohan Sukumaran, Saurish Srivastava, Armaan Bhojwani, Rohan Iyer, Ishaan Singh, Ramesh Raskar |
comparing card-based vaccine credential systems with app-based vaccine credential systems. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
36 | Jorn Lapon |
Anonymous Credential Systems: From Theory Towards Practice (Anonieme credential systemen: van de theorie naar de praktijk). (PDF / PS) |
|
2012 |
RDF |
|
36 | Kari Kostiainen, N. Asokan |
Credential life cycle management in open credential platforms (short paper). |
STC@CCS |
2011 |
DBLP DOI BibTeX RDF |
|
36 | Kari Kostiainen, N. Asokan, Alexandra Afanasyeva |
Towards User-Friendly Credential Transfer on Open Credential Platforms. |
ACNS |
2011 |
DBLP DOI BibTeX RDF |
|
36 | Christopher Kunz, Jan Wiebelitz, Stefan Piger, Christian Grimm |
A Concept for Grid Credential Lifecycle Management and Heuristic Credential Abuse Detection. |
ISPDC |
2009 |
DBLP DOI BibTeX RDF |
abuse detection, Grid, PKI, auditing, X.509, proxy certificate |
36 | Christopher Kunz, Jan Wiebelitz, Stefan Piger, Christian Grimm |
A Concept for Grid Credential Lifecycle Management and Heuristic Credential Abuse Detection. |
ICNS |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Joni Hahkala, John White, Ákos Frohner |
Proxy Restrictions for Grid Usage. |
GPC |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Patrick P. Tsang, Sean W. Smith |
PPAA: Peer-to-Peer Anonymous Authentication. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
privacy, VANets, reputation systems, credentials, anonymous authentication, secret handshakes |
33 | Chwan-Hwa John Wu, Tong Liu |
Simulation for intrusion-resilient, DDoS-resistant authentication system (IDAS). |
SpringSim |
2008 |
DBLP DOI BibTeX RDF |
computer network defense, authentication, network security, discrete event simulation, DDoS, intrusion |
33 | Federica Paci, Mourad Ouzzani, Massimo Mecella |
Verification of Access Control Requirements in Web Services Choreography. |
IEEE SCC (1) |
2008 |
DBLP DOI BibTeX RDF |
web services, verification, access control, choreography |
33 | Fred Dushin, Eric Newcomer |
Handling Multiple Credentials in a Heterogeneous SOA Environment. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Steven Gevers, Kristof Verslype, Bart De Decker |
Enhancing privacy in identity management systems. |
WPES |
2007 |
DBLP DOI BibTeX RDF |
microsoft cardspace, private credentials, security, privacy, identity managment systems |
33 | Seon-Ho Park, Joon-Sic Cho, Young-Ju Han, Tai-Myoung Chung |
Design and Implementation of Context-Aware Security Management System for Ubiquitous Computing Environment. |
ISPA Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Ian T. Foster, Veronika Nefedova, Mehran Ahsant, Rachana Ananthakrishnan, Lee Liming, Ravi K. Madduri, Olle Mulmo, Laura Pearlman, Frank Siebenlist |
Streamlining Grid Operations: Definition and Deployment of a Portal-based User Registration Service. |
J. Grid Comput. |
2006 |
DBLP DOI BibTeX RDF |
portal security, user registration, Grid, certificate, credentials, public key, Grid security, certificate authority |
33 | Jan Camenisch |
Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Jan Camenisch, Thomas Gross 0001, Dieter Sommer |
Enhancing privacy of federated identity management protocols: anonymous credentials in WS-security. |
WPES |
2006 |
DBLP DOI BibTeX RDF |
XML signature standard, verifiable random function, security, privacy, WS-security, federated identity management |
33 | Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Elena Ferrari, Indrakshi Ray |
Trust Negotiations with Customizable Anonymity. |
IAT Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Jonathan Martin, Jim Basney, Marty Humphrey |
Extending Existing Campus Trust Relationships to the Grid Through the Integration of Pubcookie and MyProxy. |
International Conference on Computational Science (1) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Chris J. Mitchell |
Limits to Anonymity When Using Credentials (Transcript of Discussion). |
Security Protocols Workshop |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Yuko Tamura, Atsuko Miyaji |
Anonymity-Enhanced Pseudonym System. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
33 | William H. Winsborough, Jay Jacobs |
Automated Trust Negotiation in Attribute-based Access Control. |
DISCEX (2) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | John H. Hine, Walt Yao, Jean Bacon, Ken Moody |
An Architecture for Distributed OASIS Services. |
Middleware |
2000 |
DBLP DOI BibTeX RDF |
|
30 | David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen |
Adding support to XACML for multi-domain user to user dynamic delegation of authority. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
Delegation of authority, Credential validation service, RBAC, XACML |
30 | David W. Chadwick, Kaniz Fatema |
An advanced policy based authorisation infrastructure. |
Digital Identity Management |
2009 |
DBLP DOI BibTeX RDF |
application independent pep, credential validation service, master pdp, obligations service, pdp, pep, sticky policy |
30 | Jan Camenisch, Thomas Groß 0001 |
Efficient attributes for anonymous credentials. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
efficient attribute encoding, privacy, cryptographic protocols, anonymous credential systems |
30 | David Bauer, Douglas M. Blough, David Cash |
Minimal information disclosure with efficiently verifiable credentials. |
Digital Identity Management |
2008 |
DBLP DOI BibTeX RDF |
hash-tree, identity assertion, privacy, PKI, identity management, credential, merkle tree |
30 | Lan Zhou, Willy Susilo, Yi Mu 0001 |
Three-Round Secret Handshakes Based on ElGamal and DSA. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
Oblivious Signature Based Envelope, Hidden Credential, Privacy, Key Exchange, DSA, ElGamal, Secret Handshake |
30 | Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Secure Role Activation and Authorization in the Enterprise Environment. |
EuroPKI |
2005 |
DBLP DOI BibTeX RDF |
Role Activation, Role Based Access Control, Proxy Signature, Digital Credential |
30 | Jan Camenisch, Anna Lysyanskaya |
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
anonymity, group signatures, certificate revocation, credential systems, identity escrow, Dynamic accumulators |
29 | Mehran Ahsant, Esteban Talavera Gonzalez, Jim Basney |
Security Credential Mapping in Grids. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Man Ho Au, Patrick P. Tsang, Willy Susilo, Yi Mu 0001 |
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Philipp Kärger, Daniel Olmedilla, Wolf-Tilo Balke |
Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust Negotiations. |
Secure Data Management |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Aggelos Kiayias, Shouhuai Xu, Moti Yung |
Privacy Preserving Data Mining within Anonymous Credential Systems. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Liesje Demuynck, Bart De Decker, Wouter Joosen |
A Credential-Based System for the Anonymous Delegation of Rights. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Gu Su Kim, Kwangsun Ko, Ung-Mo Kim, Young Ik Eom |
Implementation of OSD Security Framework and Credential Cache. |
GPC |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Jolyon Clulow, Tyler Moore 0001 |
Suicide for the common good: a new strategy for credential revocation in self-organizing systems. |
ACM SIGOPS Oper. Syst. Rev. |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Nick Bartlow, Bojan Cukic |
Evaluating the Reliability of Credential Hardening through Keystroke Dynamics. |
ISSRE |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Konstantina Stoupa, Zisis Simeoforidis, Athena Vakali |
Credential-Based Policies Management in an Access Control Framework Protecting XML Resources. |
ISCIS |
2006 |
DBLP DOI BibTeX RDF |
|
29 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
An Authentication and Key Exchange Protocol for Secure Credential Services. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Sultan Almuhammadi, Nien T. Sui |
Safe Credential-Based Trust Protocols: A Framework. |
Web Intelligence |
2006 |
DBLP DOI BibTeX RDF |
Trust protocols, semantic web, agents, zero-knowledge proofs |
29 | Ziqing Mao, Ninghui Li, William H. Winsborough |
Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper). |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Babu Sundaram, Barbara M. Chapman |
Addressing credential revocation in grid environments. |
GRID |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Óscar Cánovas Reverte, Gabriel López 0001, Antonio Fernandez Gómez-Skarmeta |
A Credential Conversion Service for SAML-based Scenarios. |
EuroPKI |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Pino Persiano, Ivan Visconti |
An Anonymous Credential System and a Privacy-Aware PKI. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Eric R. Verheul |
Self-Blindable Credential Certificates from the Weil Pairing. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Jiangtao Li 0001, Ninghui Li, XiaoFeng Wang 0001, Ting Yu 0001 |
Denial of service attacks and defenses in decentralized trust management. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
Access control, Game theory, Denial of service, Trust management, Trust negotiation |
22 | Scott E. Coull, Matthew Green 0001, Susan Hohenberger |
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
22 | David W. Chadwick |
FileSpace: an alternative to CardSpace that supports multiple token authorisation and portability between devices. |
IDtrust |
2009 |
DBLP DOI BibTeX RDF |
information cards, authorisation, federated identity management, X.509 certificates, CardSpace |
22 | Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia |
Private Information: To Reveal or not to Reveal. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
authorization, policies, secure multi-party computation |
22 | Qiang Zhang, Xiaowei Wang, Zhenghu Gong |
A Role-Based Automated Trust Negotiation and Authentication Design in Mobile Ad Hoc Networks. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | M. Vipin, A. V. Sarad, Sankar Kuppan |
A Multi Way Tree for Token Based Authentication. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Dongwan Shin, Rodrigo Lopes |
Enabling Interoperable and Selective Data Sharing among Social Networking Sites. |
CollaborateCom |
2008 |
DBLP DOI BibTeX RDF |
selective data sharing, Privacy, social networking, interoperability, authenticated dictionary |
Displaying result #1 - #100 of 597 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ >>] |
|