Asynchronous Large-Scale Certification Based on Certificate Verification Trees (English)
Free access
- New search for: Domingo-Ferrer, Josep
- New search for: Alba, Marc
- New search for: Sebé, Francesc
- New search for: Domingo-Ferrer, Josep
- New search for: Alba, Marc
- New search for: Sebé, Francesc
In:
Communications and Multimedia Security Issues of the New Century
5
;
185-196
;
2001
- Article/Chapter (Book) / Electronic Resource
-
Title:Asynchronous Large-Scale Certification Based on Certificate Verification Trees
-
Contributors:
-
Published in:IFIP — The International Federation for Information Processing ; 64, 5 ; 185-196
-
Publisher:
- New search for: Springer US
-
Place of publication:Boston, MA
-
Publication date:2001-01-01
-
Size:12 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
What You See Is What You SignScheibelhofer, Karl et al. | 2001
- 15
-
XML Electronic SignaturesDI Karlinger, Gregor et al. | 2001
- 25
-
An Integrated Secure Web Architecture For Protected Mobile Code DistributionJalali-Sohi, Mehrdad / Foka, Rigobert / Hachez, Gaël / Beitlich, Alexander et al. | 2001
- 39
-
Secure and Anonymous Multicast FrameworkWeiler, Nathalie / Plattner, Bernhard et al. | 2001
- 53
-
Vulnerabilities and Security Limitations of Current IP Telephony SystemsAckermann, Ralf / Schumacher, Markus / Roedig, Utz / Steinmetz, Ralf et al. | 2001
- 69
-
Quantization Watermarking in the JPEG2000 Coding PipelineMeerwald, Peter et al. | 2001
- 81
-
Theoretic Performance Analysis of a Watermarking System Based on Bernoulli Chaotic SequencesTsekeridou, S. / Solachidis, V. / Nikolaidis, N. / Nikolaidis, A. / Tefas, A. / Pitas, I. et al. | 2001
- 93
-
Scalable Detection of Perceptual Watermarks in JPEG2000 ImagesSimitopoulos, D. / Boulgouris, N. V. / Leontaris, A. / Strintzis, M. G. et al. | 2001
- 105
-
Collecting Randomness from the NetBencsath, B. / Vajda, I. et al. | 2001
- 117
-
Encryption System Based On Neural NetworkChan, Choi-Kuen / Chan, Chi-Kwong / Lee, Lap-Piu / Cheng, L. M. et al. | 2001
- 123
-
A Modified Chaotic Cryptographic MethodWong, Wai-kit / Lee, Lap-piu / Wong, Kwok-wo et al. | 2001
- 127
-
An Elliptic Curve Random Number GeneratorLee, Lap-piu / Wong, Kwok-wo et al. | 2001
- 137
-
Conditional and User Specific Access to Services and Resources using Annotation WatermarksDittmann, Jana / Wohlmacher, Petra / Ackermann, Ralf et al. | 2001
- 149
-
Large Scale Distributed Watermarking of Multicast Media Through EncryptionParviainen, Roland / Parnes, Peter et al. | 2001
- 159
-
Copyright Protection Protocols Based on Asymmetric WatermarkingCraver, Scott / Katzenbeisser, Stefan et al. | 2001
- 173
-
Software Security Assessment through Specification Mutations and Fault InjectionKaksonen, Rauli / Laakso, Marko / Takanen, Ari et al. | 2001
- 185
-
Asynchronous Large-Scale Certification Based on Certificate Verification TreesDomingo-Ferrer, Josep / Alba, Marc / Sebé, Francesc et al. | 2001
- 197
-
ACLA: A Framework for Access Control List (ACL) Analysis and OptimizationQian, Jiang / Hinrichs, Susan / Nahrstedt, Klara et al. | 2001
- 213
-
Transparent Access to Encrypted Data Using Operating System Network Stack ExtensionsRademer, Ero / Wolthusen, Stephen D. et al. | 2001
- 229
-
Optimization of Watermarking Performances Using Error Correcting Codes and RepetitionZinger, S. / Jin, Z. / Maître, H. / Sankur, B. et al. | 2001
- 241
-
Using Raw Speech as a Watermark, Does it Work?Nintanavongsa, P. / Amornraksa, T. et al. | 2001
- 255
-
Transferability in Coin Systems with ObserversFremdt, Christine / Neumann, Heike et al. | 2001
- 267
-
Secure IlearningGraf, Frank et al. | 2001
- 283
-
Tree-Based Multicast Key AgreementSchwenk, Jörg / Martin, Tobias / Schaffelhofer, Ralf et al. | 2001
- 297
-
Security for the core network of third generation mobile systemsHorn, Günter / Kröselberg, Dirk / Pütz, Stefan / Schmitz, Roland et al. | 2001
- 313
-
Secure Internet PhoneHorster, Patrick / Schaffer, Martin / Schartner, Peter / Sommer, Dieter et al. | 2001
- 327
-
Secure Meeting Scheduling with AgentaHerlea, Thomas / Claessens, Joris / Cock, Danny / Preneel, Bart / Vandewalle, Joos et al. | 2001
- 339
-
Virtual Hidden NetworkShin, Natori et al. | 2001
- 351
-
Gaussian Pixel Weighting Marks in Amplitude Modulation of Color Image Watermarking with 8 Neighborhood RetrievalPuertpan, R. / Nintanavongsa, P. / Amornraksa, T. et al. | 2001
- 363
-
A Prepositioned Secret Sharing Scheme for Message Authentication in Broadcast NetworksEskicioglu, Ahmet M. et al. | 2001
- 375
-
Secure Service Centered Networking for Nomadic UsageHollick, Matthias et al. | 2001
- 383
-
A PC Cryptographic Coprocessor Based on TI Signal Processor and Smart Card SystemMarkovic, Milan / Savic, Zoran / Obrenovic, Željko / Nikolic, Aca et al. | 2001
- 395
-
Fingerprints for Copyright ProtectionEncheva, Sylvia et al. | 2001
- 405
-
A Secure Authentication Infrastructure for Mobile Communication Services over the InternetTour, Irénée Dupré / Bochmann, Gregor / Chouinard, Jean-Yves et al. | 2001
- 417
-
Blind Compressed-Domain Watermarking for MPEG-Encoded VideosWu, Chih-Liang / Lie, Wen-Nung / Wang, Ta-Chun et al. | 2001
- E1
-
Erratum to: Communications and Multimedia Security Issues of the New CenturySteinmetz, Ralf / Dittman, Jana / Steinebach, Martin et al. | 2001