Generalized certificate revocation
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Evaluating certificate status information mechanisms
Proceedings of the 7th ACM conference on Computer and communications security
Accountable certificate management using undeniable attestations
Proceedings of the 7th ACM conference on Computer and communications security
Digital certificates: a survey of revocation methods
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
Reducing certificate revocation cost using NPKI
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Hash to the Rescue: Space Minimization for PKI Directories
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Review and Revocation of Access Privileges Distributed with PKI Certificates
Revised Papers from the 8th International Workshop on Security Protocols
Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys
FC '99 Proceedings of the Third International Conference on Financial Cryptography
A Response to ''Can We Eliminate Certificate Revocation Lists?''
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Authentication for Mobile Agents
Mobile Agents and Security
SiBIR: Signer-Base Intrusion-Resilient Signatures
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
A novel approach to certificate revocation management
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Public Key Infrastructures that Satisfy Security Goals
IEEE Internet Computing
Origin authentication in interdomain routing
Proceedings of the 10th ACM conference on Computer and communications security
Tradeoffs in certificate revocation schemes
ACM SIGCOMM Computer Communication Review
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure
ACM Transactions on Information and System Security (TISSEC)
An approach to certificate path discovery in mobile Ad Hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
CHRONOS: an authenticated dictionary based on skip lists for timestamping systems
Proceedings of the 2005 workshop on Secure web services
Publicly verifiable ownership protection for relational databases
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Linked authenticated dictionaries for certificate status verification
Enhanced methods in computer security, biometric and artificial intelligence systems
Dynamic authenticated index structures for outsourced databases
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs)
Proceedings of the 43rd annual Southeast regional conference - Volume 2
Equipping smart devices with public key signatures
ACM Transactions on Internet Technology (TOIT)
Origin authentication in interdomain routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Optimal trade-off for Merkle tree traversal
Theoretical Computer Science
Design and implementation of a secure wide-area object middleware
Computer Networks: The International Journal of Computer and Telecommunications Networking
Certificate revocation and certificate update
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
TARP: Ticket-based address resolution protocol
Computer Networks: The International Journal of Computer and Telecommunications Networking
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Optimized Certificates --- A New Proposal for Efficient Electronic Document Signature Validation
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Identity-based encryption with efficient revocation
Proceedings of the 15th ACM conference on Computer and communications security
Beacon certificate push revocation
Proceedings of the 2nd ACM workshop on Computer security architectures
H-OCSP: A protocol to reduce the processing burden in online certificate status validation
Electronic Commerce Research
Adaptive-ID Secure Revocable Identity-Based Encryption
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Certificate revocation release policies
Journal of Computer Security
Conjunctive Broadcast and Attribute-Based Encryption
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Reasoning about attribute authenticity in a web environment
AAAI'07 Proceedings of the 22nd national conference on Artificial intelligence - Volume 2
Evaluation of certificate validation mechanisms
Computer Communications
Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
Certificate-based encryption and the certificate revocation problem
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
On the cost of persistence and authentication in skip lists
WEA'07 Proceedings of the 6th international conference on Experimental algorithms
Certificate revocation using fine grained certificate space partitioning
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Super-efficient aggregating history-independent persistent authenticated dictionaries
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Revising centralized certificate validation standards for mobile and wireless communications
Computer Standards & Interfaces
Instant certificate revocation and publication using WebDAV
Journal of Computer Security - The 2007 European PKI Workshop: Theory and Practice (EuroPKI'07)
Readers behaving badly: reader revocation in PKI-based RFID systems
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Authenticated Dictionaries: Real-World Costs and Trade-Offs
ACM Transactions on Information and System Security (TISSEC)
Usability of display-equipped RFID tags for security purposes
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Efficient constructions for one-way hash chains
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information
Computer Communications
Towards a framework for evaluating certificate status information mechanisms
Computer Communications
iBigTable: practical data integrity for bigtable in public cloud
Proceedings of the third ACM conference on Data and application security and privacy
Can Jannie verify? Usability of display-equipped RFID tags for security purposes
Journal of Computer Security - Research in Computer Security and Privacy: Emerging Trends
Hi-index | 0.00 |