The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Compartmented with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-2005 (15) 2006-2016 (16) 2017-2023 (12)
Publication types (Num. hits)
article(21) inproceedings(22)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 43 occurrences of 35 keywords

Results
Found 43 publication records. Showing 43 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
117Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini Secret Sharing in Multilevel and Compartmented Groups. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Hierarchical and Compartmented Access Structures, Ideal Schemes, Secret Sharing, Perfect Security
88Tamir Tassa, Nira Dyn Multipartite Secret Sharing by Bivariate Interpolation. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Multipartite access structures, Compartmented access structures, Hierarchical threshold access structures, Secret sharing, Bivariate interpolation, Monotone span programs
88Tamir Tassa, Nira Dyn Multipartite Secret Sharing by Bivariate Interpolation. Search on Bibsonomy ICALP (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multipartite access structures, compartmented access structures, hierarchical threshold access structures, Secret sharing, bivariate interpolation, monotone span programs
75P. C. Clark, M. C. Meissner, K. O. Vance Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF secure compartmented data access, untrusted network, COTS-based architecture, secure network computing architecture, application-level firewalls, DoD applications, software architecture, access control, electronic commerce, computer networks, authorisation, telecommunication security, electronic business, military computing, military applications, sensitive information, commercial-off-the-shelf products, sensitive data
75Jeffrey L. Berger, Jeffrey Picciotto, John P. L. Woodward, Paul T. Cummings Compartmented Mode Workstation: Prototype Highlights. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF data overclassification prevention, MITRE compartmented mode workstation, highly classified intelligence data, binary compatible, trusted window management system, sensitivity levels, information labels, accurate data labeling, multiple sensitivity levels, software engineering, objects, security of data, workstations, security requirements, markings, security labels
47Qun Zhong Providing Secure Environments for Untrusted Network Applications. Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF secure environments, untrusted network applications, VirtualVault, Trusted Sendmail Proxy, network application program bugs, unsafe environment, World Wide Web servers, mailservers, compartmented-mode workstation, applications wrapping, application service transfer, Internet, electronic commerce, case studies, security of data, security breaches
47C. Cant, Simon R. Wiseman Simple Assured Bastion Hosts. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF assured firewalls, compartmented mode workstation, ITSEC E3 assurance, evaluation effort reuse, bastion host architecture, unevaluated proxies, information exporting, trusted path export sanction, evaluated release checker, authorisation
41Ross J. Anderson Privacy Technology Lessons from Healthcare. Search on Bibsonomy S&P The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
29Sachin Kumar Extending boolean operations-based secret image sharing to compartmented access structure. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
29Alexandru Ionita Optimizing Attribute-based Encryption for Circuits using Compartmented Access Structures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
29Alexandru Ionita Optimizing Attribute-Based Encryption for Circuits Using Compartmented Access Structures. Search on Bibsonomy SECRYPT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
29Ferucio Laurentiu Tiplea, Constantin Catalin Dragan Asymptotically ideal Chinese remainder theorem -based secret sharing schemes for multilevel and compartmented access structures. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
29Guoai Xu, Jiangtao Yuan, Guosheng Xu 0001, Zhongkai Dang An Efficient Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
29Jiangtao Yuan, Guoai Xu, Guosheng Xu 0001 An Ideal Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
29Qi Chen, Chunming Tang 0003, Zhiqiang Lin Compartmented Secret Sharing Schemes and Locally Repairable Codes. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
29Ferucio Laurentiu Tiplea, Alexandru Ionita, Anca-Maria Nica Practically Efficient Attribute-Based Encryption for Compartmented and Multilevel Access Structures. Search on Bibsonomy ICETE (Selected Papers) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
29Ferucio Laurentiu Tiplea, Alexandru Ionita, Anca-Maria Nica Practically Efficient Attribute-based Encryption for Compartmented Access Structures. Search on Bibsonomy ICETE (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
29Qi Chen, Chunming Tang 0003, Zhiqiang Lin Efficient explicit constructions of compartmented secret sharing schemes. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
29Ferucio Laurentiu Tiplea, Constantin Catalin Dragan Asymptotically Ideal CRT-based Secret Sharing Schemes for Multilevel and Compartmented Access Structures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
29Xianfang Wang, Can Xiang, Fang-Wei Fu 0001 Secret sharing schemes for compartmented access structures. Search on Bibsonomy Cryptogr. Commun. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
29P. Mohamed Fathimal, P. Arockia Jansi Rani Threshold Secret Sharing Scheme for Compartmented Access Structures. Search on Bibsonomy Int. J. Inf. Secur. Priv. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29Sabyasachi Dutta, Tamal Bhore, Avishek Adhikari Efficient Construction of Visual Cryptographic Scheme for Compartmented Access Structures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
29Graham Enos, Yuliang Zheng 0001 An ID-based signcryption scheme with compartmented secret sharing for unsigncryption. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
29Appala Naidu Tentu, Prabal Paul, V. Ch. Venkaiah Computationally perfect compartmented secret sharing schemes based on MDS codes. Search on Bibsonomy Int. J. Trust. Manag. Comput. Commun. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
29Ali Aydin Selçuk, Ramazan Yilmaz Joint Compartmented Threshold Access Structures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
29Graham Enos, Yuliang Zheng 0001 An ID-Based Signcryption Scheme with Compartmented Secret Sharing for Unsigncryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
29Yuyin Yu, Mingsheng Wang A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure. Search on Bibsonomy ICICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
29Yuyin Yu, Mingsheng Wang A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
29Antonis Economou, Spyridoula Kanta Optimal balking strategies and pricing for the single server Markovian queue with compartmented waiting space. Search on Bibsonomy Queueing Syst. Theory Appl. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) 60K25, 90B22
29Sorin Iftene, Stefan Ciobaca, Manuela Grindei Compartmented Threshold RSA Based on the Chinese Remainder Theorem. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
29Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Sorin Iftene Compartmented Secret Sharing Based on the Chinese Remainder Theorem. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
29Tse Huong Choo Vaulted VPN: Compartmented Virtual Private Networks on Trusted Operating SystemsTse-Huong Choo, Hewlett-Packard Laboratories. Search on Bibsonomy USENIX Security Symposium The full citation details ... 1999 DBLP  BibTeX  RDF
29C. Armstrong, R. Venkatraman Common Ada bindings to compartmented mode workstations. Search on Bibsonomy WADAS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
26C. L. Robinson, Simon R. Wiseman A Consideration of the Modes of Operation for Secure Systems. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Security Mode of Operation, Dedicated, System High, Compartmented, System Model, Z Notation, Multi-Level
21Marianne Hirschbichler, Colin Boyd, Wageeh W. Boles A Multiple-Control Fuzzy Vault. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Marianne Hirschbichler, Colin Boyd, Wageeh W. Boles A Scheme for Enhancing Security Using Multiple Fingerprints and the Fuzzy Vault. Search on Bibsonomy DICTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Oriol Farràs, Jaume Martí-Farré, Carles Padró Ideal Multipartite Secret Sharing Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Ideal access structures, Multipartite secret sharing, Multipartite matroids, Discrete polymatroids, Secret sharing, Ideal secret sharing schemes
21Richard A. Smith Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and Vulnerabilities. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21John Marchesini, Sean W. Smith, Omen Wild, Joshua Stabiner, Alex Barsamian Open-Source Applications of TCPA Hardware. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith Design and Implementation of Virtual Private Services. Search on Bibsonomy WETICE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Barbara Masucci, Douglas R. Stinson Metering Schemes for General Access Structures. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Distributed Audit, Security, Cryptography, Entropy, Metering
21Ernest F. Brickell Some Ideal Secret Sharing Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #43 of 43 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license