|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 34 occurrences of 29 keywords
|
|
|
Results
Found 60 publication records. Showing 60 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
77 | Song Y. Yan, Carsten Maple, Glyn James |
A New Scheme for Deniable/Repudiable Authentication. |
CASC |
2007 |
DBLP DOI BibTeX RDF |
Deniable/repudiable authentication, quadratic residuosity problem, intractability |
67 | Paul Robinson, Nick Cook, Santosh K. Shrivastava |
Implementing Fair Non-repudiable Interactions with Web Services. |
EDOC |
2005 |
DBLP DOI BibTeX RDF |
Inter-enterprise collaboration and virtual enterprises, Middleware standards and systems, Security, Web services, Non-repudiation, Fair exchange, Enterprise computing |
67 | Nick Cook, Paul Robinson, Santosh K. Shrivastava |
Component Middleware to Support Non-repudiable Service Interactions. |
DSN |
2004 |
DBLP DOI BibTeX RDF |
FT Architecture/Middleware Software Engineering, Service Composition, Non-repudiation, System Security |
51 | Willy Susilo, Yi Mu 0001 |
Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. |
EuroPKI |
2006 |
DBLP DOI BibTeX RDF |
repudiable, authentication, email, phishing, separable, ID-based, deniable |
51 | Daniel W. Manchala |
Trust Metrics, Models and Protocols for Electronic Commerce Transactions. |
ICDCS |
1998 |
DBLP DOI BibTeX RDF |
trust protocols, trusted authority, fuzzy-verification, trusted advertisement, non-repudiable context, trust models, Trust metrics |
47 | Nick Cook, Paul Robinson, Santosh K. Shrivastava |
The Rigorous Implementation of a Fair Exchange Protocol for Non-repudiable Web Service Interactions - a case study. |
ICDE Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Nick Cook, Santosh K. Shrivastava, Stuart M. Wheater |
Middleware Support for Non-repudiable Transactional Information Sharing between Enterprises. |
DAIS |
2003 |
DBLP DOI BibTeX RDF |
inter-enterprise interaction, security, middleware, transactions |
40 | Alapan Arnab, Andrew Hutchison |
Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Yuqing Ding, Zhongcheng Wu, Yongchun Miao, Liyang Xie, Manyu Ding |
Genuine On-Chain and Off-Chain Collaboration: Achieving Secure and Non-Repudiable File Sharing in Blockchain Applications. |
IEEE Trans. Netw. Serv. Manag. |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Ziqiang Wen, Xiaomei Dong, Chongyang Yang, Ning Zhang |
Short Repudiable Ring Signature: Constant Size and Less Overhead. |
WISA |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Kosei Akama, Seki Makino, Masaaki Sato, Keisuke Uehara |
Poster: Non-repudiable Secure Logging System for the Web. |
SACMAT |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Hao Lin, Mingqiang Wang |
Repudiable ring signature: Stronger security and logarithmic-size. |
Comput. Stand. Interfaces |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Yue Zheng, Si Wang, Chip-Hong Chang |
A DNN Fingerprint for Non-Repudiable Model Ownership Identification and Piracy Detection. |
IEEE Trans. Inf. Forensics Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Mattia Antonini, Miguel Pincheira, Massimo Vecchio, Fabio Antonelli |
A TinyML approach to non-repudiable anomaly detection in extreme industrial environments. |
MetroInd4.0& IoT |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Fei Chen 0003, Jiahao Wang, Changkun Jiang, Tao Xiang 0001, Yuanyuan Yang 0001 |
Blockchain Based Non-repudiable IoT Data Trading: Simpler, Faster, and Cheaper. |
INFOCOM |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Elliot Fairweather, Rudolf Wittner, Martin Chapman, Petr Holub, Vasa Curcin |
Non-repudiable Provenance for Clinical Decision Support Systems. |
IPAW |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Elliot Fairweather, Rudolf Wittner, Martin Chapman, Petr Holub, Vasa Curcin |
Non-repudiable provenance for clinical decision support systems. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
26 | Hao Lin, Mingqiang Wang |
Repudiable Ring Signature: Stronger Security and Logarithmic-Size. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
26 | |
Repudiable Ring Signatures: Stronger Definitions and Logarithmic-Size. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
26 | Emanuel Palm, Olov Schelén, Ulf Bodin, Richard Hedman |
The Exchange Network: An Architecture for the Negotiation of Non-Repudiable Token Exchanges. |
INDIN |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Dinuni K. Fernando, Siddharth Kulshrestha, Jerome Dinal Herath, Nitin Mahadik, Yanzhe Ma, Changxin Bai, Ping Yang 0002, Guanhua Yan, Shiyong Lu |
SciBlock: A Blockchain-Based Tamper-Proof Non-Repudiable Storage for Scientific Workflow Provenance. |
CIC |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Feng Wang 0020, Li Xu 0002, Huaqun Wang, Zhide Chen |
Identity-based non-repudiable dynamic provable data possession in cloud storage. |
Comput. Electr. Eng. |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Minseok Lee, Doo-Ho Choi, Taek-Young Youn |
Non-Repudiable Dynamic PDP with Stronger Security based on Stateful Rank Based Skip List. |
ICTC |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Jiangtao Li 0003, Lei Zhang 0009 |
Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol. |
Inf. Sci. |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Tsu-Yang Wu, Yuh-Min Tseng, Sen-Shan Huang, Yi-Chen Lai |
Non-Repudiable Provable Data Possession Scheme With Designated Verifier in Cloud Storage Systems. |
IEEE Access |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Karthik Nandakumar, Nalini K. Ratha, Sharath Pankanti, Shelby Darnell |
Secure one-time biometrie tokens for non-repudiable multi-party transactions. |
WIFS |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Nikilesh Balakrishnan, Lucian Carata, Thomas Bytheway, Ripduman Sohan, Andy Hopper |
Non-repudiable disk I/O in untrusted kernels. |
APSys |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Hongyuan Wang, Liehuang Zhu, Chang Xu 0004, Yijia Lilong |
A universal method for realizing non-repudiable provable data possession in cloud storage. |
Secur. Commun. Networks |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Qing-Qing Xie, Liangmin Wang 0001, Hong Zhong 0001 |
Non-repudiable Query Answer Authentication Scheme over Anonymous Cloud Data. |
CBD |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Joona Kannisto, Takeshi Takahashi 0001, Jarmo Harju, Seppo Heikkinen, Marko Helenius, Shin'ichiro Matsuo, Bilhanan Silverajan |
A non-repudiable negotiation protocol for security service level agreements. |
Int. J. Commun. Syst. |
2015 |
DBLP DOI BibTeX RDF |
|
26 | |
Non-Repudiable Provable Data Possession in Cloud Storage. |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
26 | Shouguo Chen, Anmin Fu, Ningyuan Qin |
异构无线网络中基于自更新哈希链的不可否认性计费协议 (Non-repudiable Billing Protocol Based on Self-updating Hash Chain for Heterogeneous Wireless Networks). |
计算机科学 |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Zhen Mo, Yian Zhou, Shigang Chen, Cheng-Zhong Xu 0001 |
Enabling Non-repudiable Data Possession Verification in Cloud Storage Systems. |
IEEE CLOUD |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Kissan G. Gauns Dessai, Venkatesh V. Kamat |
Fair and Non-repudiable Protocol for Exchange of E-examination Question Paper and Answer-Scripts. |
T4E |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Lei Pan 0002, Shaun Bangay |
Generating Repudiable, Memorizable, and Privacy Preserving Security Questions Using the Propp Theory of Narrative. |
CyberC |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Samaneh Mashhadi |
A Novel Non-repudiable Threshold Proxy Signature Scheme with Known Signers. |
Int. J. Netw. Secur. |
2013 |
DBLP BibTeX RDF |
|
26 | Alois Paulin, Tatjana Welzer |
A universal system for fair non-repudiable certified e-mail without a trusted third party. |
Comput. Secur. |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Samaneh Mashhadi |
Analysis of frame attack on Hsu et al.'s non-repudiable threshold multi-proxy multi-signature scheme with shared verification. |
Sci. Iran. |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Kassidy P. Clark, Martijn Warnier, Frances M. T. Brazier |
Automated Non-repudiable Cloud Resource Allocation. |
CLOSER (Selected Papers) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Raphael C.-W. Phan |
Non-repudiable authentication and billing architecture for wireless mesh networks. |
Wirel. Networks |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Stephen W. Neville, Michael Horie |
Controlling spam and spear phishing via peered network overlays and non-repudiable traceback. |
eCrime Researchers Summit |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Mohammad Hasan Samadani, Mehdi Shajari |
Mobile Partial Identity Management: The Non-repudiable Minimal Mobile Identity Model. |
FGIT |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Gang Li, Yanling Li, Chuanda Qi |
Analysis on a Non-repudiable Threshold Proxy Signature Scheme with Known Signers. |
ISNN (2) |
2009 |
DBLP DOI BibTeX RDF |
Tulti-signature, Threshold proxy signature, Digital signature, Proxy signature |
26 | Antonio Grillo, Alessandro Lentini, Gianluigi Me, Giuliano Rulli |
Trusted SMS - A Novel Framework for Non-repudiable SMS-based Processes. |
HEALTHINF (1) |
2008 |
DBLP BibTeX RDF |
|
26 | Nick Cook, Paul Robinson, Santosh K. Shrivastava |
Design and Implementation of Web Services Middleware to Support Fair Non-Repudiable Interactions. |
Int. J. Cooperative Inf. Syst. |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Nicholas Cook |
Middleware support for non-repudiable business-to-business interactions. |
|
2006 |
RDF |
|
26 | Paul Fletcher Robinson |
Design and implementation of extensible middleware for non-repudiable interactions. |
|
2006 |
RDF |
|
26 | Jordi Castellà-Roca, Josep Domingo-Ferrer |
A Non-Repudiable Bitstring Commitment Scheme Based on a Public-Key Cryptosystem. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
Bit commitment, Mental poker |
26 | Chwei-Shyong Tsai, Shiang-Feng Tzeng, Min-Shiang Hwang |
Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers. |
Informatica |
2003 |
DBLP BibTeX RDF |
|
26 | Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti |
How to unwittingly sign non-repudiable documents with Java applications. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan, C. V. Jawahar |
Efficient Biometric Verification in Encrypted Domain. |
ICB |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Antonio Grillo, Alessandro Lentini, Gianluigi Me, Giuseppe F. Italiano |
Transaction Oriented Text Messaging with Trusted-SMS. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Min-Shiang Hwang, Shiang-Feng Tzeng, Chun-Ta Li |
A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period. |
ICCSA (3) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Christine Laurendeau, Michel Barbeau |
Secure Anonymous Broadcasting in Vehicular Networks. |
LCN |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk |
Deniable authentication and key exchange. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
authentication, key exchange, deniability |
20 | KyungKeun Lee, JoongHyo Oh, Sang-Jae Moon |
How to Generate Universally Verifiable Signatures in Ad-Hoc Networks. |
MADNES |
2005 |
DBLP DOI BibTeX RDF |
Ad-hoc networks, Digital signature, Bilinear map, Diffie-Hellman problem |
20 | Mikko Honkala, Petri Vuorimaa |
Secure Web Forms with Client-Side Signatures. |
ICWE |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Patrick R. Eaton, Hakim Weatherspoon, John Kubiatowicz |
Efficiently Binding Data to Owners in Distributed Content-Addressable Storage Systems. |
IEEE Security in Storage Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
20 | István Zsolt Berta, Levente Buttyán, István Vajda |
Mitigating the Untrusted Terminal Problem Using Conditional Signatures. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
untrusted terminal, conditional signature, smart card, message authentication, electronic signature |
20 | Els Van Herreweghen |
Non-repudiation in SET: Open Issues. |
Financial Cryptography |
2000 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #60 of 60 (100 per page; Change: )
|
|