Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Delegación")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 42

  • Page / 2
Export

Selection :

  • and

Delegation and motivationANGST, Lukas; BOROWIECKI, Karol Jan.Theory and decision. 2014, Vol 76, Num 3, pp 363-393, issn 0040-5833, 31 p.Article

A Novel Non-repudiable Threshold Proxy Signature Scheme with Known SignersMASHHADI, Samaneh.International journal of network security (Print). 2013, Vol 15, Num 4, pp 274-279, issn 1816-353X, 6 p.Article

Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust managementDONG JIAO; MINGCHU LI; JINPING OU et al.IET information security (Print). 2013, Vol 7, Num 4, pp 343-348, issn 1751-8709, 6 p.Article

Dynamic attribute-based group signature with verifier-local revocation and backward unlinkability in the standard modelSYED TAQI ALI; AMBERKER, B. B.International journal of applied cryptography (Print). 2013, Vol 3, Num 2, pp 148-165, issn 1753-0563, 18 p.Article

On the security of an ID-based anonymous proxy signature scheme and its improved schemeJIANHONG ZHANG; JIAN MAO; YUWEI XU et al.International journal of embedded systems (Print). 2013, Vol 5, Num 3, pp 181-188, issn 1741-1068, 8 p.Conference Paper

The Time Inconsistency of Delegation-Based Time Inconsistency Solutions in Monetary PolicyBILBIIE, Florin O.Journal of optimization theory and applications. 2011, Vol 150, Num 3, pp 657-674, issn 0022-3239, 18 p.Article

When Acquisition Spoils Retention: Direct Selling vs. Delegation Under CRMYAN DONG; YULIANG YAO; CUI, Tony Haitao et al.Management science. 2011, Vol 57, Num 7, pp 1288-1299, issn 0025-1909, 12 p.Article

Competitive Consequences of Using a Category CaptainSUBRAMANIAN, Upender; RAJU, Jagmohan S; DHAR, Sanjay K et al.Management science. 2010, Vol 56, Num 10, pp 1739-1765, issn 0025-1909, 27 p.Article

Concepts and languages for privacy-preserving attribute-based authentication : Identity Protection and ManagementCAMENISCH, Jan; DUBOVITSKAYA, Maria; ENDERLEIN, Robert R et al.Journal of information security and applications. 2014, Vol 19, Num 1, pp 25-44, 20 p.Article

Proxy signatures and buyer-seller watermarking protocols for the protection of multimedia contentESLAMI, Ziba; KAZEMNASABHAJI, Mohammad; MIREHI, Narges et al.Multimedia tools and applications. 2014, Vol 72, Num 3, pp 2723-2740, issn 1380-7501, 18 p.Article

S2DRP: Secure implementations of distributed reprogramming protocol for wireless sensor networksSHIM, Kyung-Ah.Ad hoc networks. 2014, Vol 19, pp 1-8, issn 1570-8705, 8 p.Article

Versatile identity-based signatures for authentication in multi-user settingsXI SUN; ZHENGTAO JIANG; MEIRONG ZHOU et al.International journal of grid and utility computing (Print). 2014, Vol 5, Num 3, pp 156-164, issn 1741-847X, 9 p.Article

Decentralization of contracts with interim side-contractingTHEILEN, Bernd.Theory and decision. 2012, Vol 73, Num 4, pp 561-590, issn 0040-5833, 30 p.Article

Culture Clash: The Costs and Benefits of HomogeneityVAN DEN STEEN, Eric.Management science. 2010, Vol 56, Num 10, pp 1718-1738, issn 0025-1909, 21 p.Article

Integrating human factors in the design of intelligent systems: an example in air traffic controlDEBERNARD, Serge; GUIOST, Benoît; POULAIN, Thierry et al.International journal of intelligent systems technologies and applications (Print). 2009, Vol 7, Num 2, pp 205-226, issn 1740-8865, 22 p.Article

An Efficient, Scalable Key Transport Scheme (ESKTS) for Delay/Disruption Tolerant NetworksMUHAMMAD NASIR MUMTAZ BHUTTA; CRUICKSHANK, Haitham S; ZHILI SUN et al.Wireless networks. 2014, Vol 20, Num 6, pp 1597-1609, issn 1022-0038, 13 p.Article

Data offloading in social mobile networks through VIP delegationBARBERA, Marco Valerio; VIANA, Aline Carneiro; DE AMORIM, Marcelo Dias et al.Ad hoc networks. 2014, Vol 19, pp 92-110, issn 1570-8705, 19 p.Article

Double Delegation-Based Authentication and Key Agreement Protocol for PCSsOU, Hsia-Hung; HWANG, Min-Shiang.Wireless personal communications. 2013, Vol 72, Num 1, pp 437-446, issn 0929-6212, 10 p.Article

A new proxy signature scheme with a semi-trusted third party based on elliptic curve discrete logarithm problemTAHAT, Nedal.International journal of security and networks (Print). 2013, Vol 8, Num 4, pp 207-211, issn 1747-8405, 5 p.Article

Outsourcing shortest distance computing with privacy protectionJUN GAO; XU YU, JEFFREY; RUOMING JIN et al.The VLDB journal. 2013, Vol 22, Num 4, pp 543-559, issn 1066-8888, 17 p.Article

dDelega: Trust Management for Web ServicesTOMAIUOLO, Michele.International journal of information security and privacy. 2013, Vol 7, Num 3, pp 53-67, issn 1930-1650, 15 p.Article

Stackelberg equilibria in managerial delegation gamesBERR, Fabian.European journal of operational research. 2011, Vol 212, Num 2, pp 251-262, issn 0377-2217, 12 p.Article

Service-orientation of airlines: its impact on service-oriented behaviour of flight attendants and customer loyaltyAN, Myungsook; NOH, Yonghwi.International journal of services sciences (Print). 2011, Vol 4, Num 2, pp 174-190, issn 1753-1446, 17 p.Article

Does projection into use improve trust and exploration? An example with a cruise control systemCAHOUR, Béatrice; FORZY, Jean-François.Safety science. 2009, Vol 47, Num 9, pp 1260-1270, issn 0925-7535, 11 p.Article

Splitting on demand in SAT modulo theoriesBARRETT, Clark; NIEUWENHUIS, Robert; OLIVERAS, Albert et al.Lecture notes in computer science. 2006, pp 512-526, issn 0302-9743, isbn 3-540-48281-4, 1Vol, 15 p.Conference Paper

  • Page / 2