Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Proxy")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 983

  • Page / 40
Export

Selection :

  • and

Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi- signature scheme with shared verificationHAIYONG BAO; ZHENFU CAO; SHENGBAO WANG et al.Applied mathematics and computation. 2005, Vol 169, Num 2, pp 1419-1430, issn 0096-3003, 12 p.Article

Segment-based streaming media proxy : Modeling and optimization : Distributed media technologies and applicationsSONGQING CHEN; BO SHEN; WEE, Susie et al.IEEE transactions on multimedia. 2006, Vol 8, Num 2, pp 243-256, issn 1520-9210, 14 p.Article

L7-mobility : A framework for handling mobility at the application levelTOURRILHES, Jean.IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications. 2004, pp 1246-1251, isbn 0-7803-8523-3, 4Vol, 6 p.Conference Paper

Testing the Off-Site Experience, or, How Well Do You Proxy?RIBARIC, Tim J.Computers in libraries. 2009, Vol 29, Num 1, pp 18-21, issn 1041-7915, 4 p.Article

Improved transport layer performance enhancing proxy for wireless networksHUANG, Jeng-Ji; FERNG, Huei-Wen.IEICE transactions on communications. 2006, Vol 89, Num 1, pp 206-209, issn 0916-8516, 4 p.Article

Improvement on Hwang et al.'s generalization of proxy signature schemes based on elliptic curvesHWANG, Shin-Jia; HUANG, Chia-Wei.Applied mathematics and computation. 2005, Vol 170, Num 2, pp 941-947, issn 0096-3003, 7 p.Article

An efficient secure proxy verifiably encrypted signature schemeJIANHONG ZHANG; CHENGLIAN LIU; YIXIAN YANG et al.Journal of network and computer applications. 2010, Vol 33, Num 1, pp 29-34, issn 1084-8045, 6 p.Article

Rogue public key registration attack and the importance of 'proof of possession' in the PKI environmentLEE, Younho; PARK, Yongsu; KIM, Heeyoul et al.IEICE transactions on information and systems. 2006, Vol 89, Num 8, pp 2452-2455, issn 0916-8532, 4 p.Article

Adaptive border sampling for hardware texture-based volume visualizationLAMAR, Eric.Proceedings of SPIE, the International Society for Optical Engineering. 2006, pp 606005.1-606005.8, issn 0277-786X, isbn 0-8194-6100-8, 1VolConference Paper

Proxy blind multi-signature scheme without a secure channelRONGXING LU; ZHENFU CAO; YUAN ZHOU et al.Applied mathematics and computation. 2005, Vol 164, Num 1, pp 179-187, issn 0096-3003, 9 p.Article

Evaluation of the convergence between self-reporters and proxies in a disability questionnaire by means of behaviour coding methodBENITEZ BAENA, Isabel; PADILLA GARCIA, Jose Luis; ONGENA, Yfke et al.Quality & quantity. 2012, Vol 46, Num 4, pp 1311-1322, issn 0033-5177, 12 p.Article

Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random OraclesLU, Steve; OSTROVSKY, Rafail; SAHAI, Amit et al.Journal of cryptology. 2013, Vol 26, Num 2, pp 340-373, issn 0933-2790, 34 p.Article

An efficient and provably secure proxy signature schemeJIANHONG ZHANG; XUE LIU; SHENGNAN GAO et al.Proceedings of SPIE, the International Society for Optical Engineering. 2010, Vol 7820, issn 0277-786X, isbn 978-0-8194-8329-4 0-8194-8329-X, 2Vol, 782031.1-782031.8, 2Conference Paper

A network address translation approach to the inbound session problem in private networksHSIEH, Ming-Deng; CHANG, Hung-Chun; TSENG, Chien-Chao et al.IEICE transactions on information and systems. 2007, Vol 90, Num 2, pp 482-489, issn 0916-8532, 8 p.Article

Capability-based egress network access control by using DNS server : Information technologySUZUKI, Shinichi; SHINJO, Yasushi; HIROTSU, Toshio et al.Journal of network and computer applications. 2007, Vol 30, Num 4, pp 1275-1282, issn 1084-8045, 8 p.Conference Paper

Design of proxy signature in the digital signature algorithm (DSA)CHEN, I.-Te; CHANG, Ming-Hsin; YEH, Yi-Shiung et al.Journal of information science and engineering. 2006, Vol 22, Num 4, pp 965-973, issn 1016-2364, 9 p.Article

The use of satellite for multimedia communicationsFITCH, M.BT technology journal. 2003, Vol 21, Num 3, pp 90-101, issn 1358-3948, 12 p.Article

Sîndrome de Munchausen por poderes = MUNCHAUSEN SYNDROME BY PROXYGONI GONZALEZ, T; MARTINEZ RODA, M. J; DE LA CERDA OJEDA, F et al.Anales de pediatria (2003. Ed. impresa). 2008, Vol 68, Num 6, pp 609-611, issn 1695-4033, 3 p.Article

ID-based designated-verifier proxy signaturesCAO, T; LIN, D; XUE, R et al.IEE proceedings. Communications. 2005, Vol 152, Num 6, pp 989-994, issn 1350-2425, 6 p.Article

A coherence-replacement protocol for web proxy cache systemsAGUILAR, J; LEISS, E. L.International journal of computers & applications. 2006, Vol 28, Num 1, pp 12-18, issn 1206-212X, 7 p.Article

Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signersQI XIE.Applied mathematics and computation. 2005, Vol 168, Num 2, pp 776-782, issn 0096-3003, 7 p.Article

Cryptanalysis of A proxy-protected proxy signature scheme based on elliptic curve cryptosystemSHUHONG WANG; GUILIN WANG; FENG BAO et al.IEEE Vehicular Technology Conference. 2004, pp 3240-3243, isbn 0-7803-8521-7, 4 p.Conference Paper

Heavy tail distribution in E-Mail networkYIHJIA TSAI; LIN, Ching-Chang; HSIAO, Ping-Nan et al.SoftCOM 2002 : international conference on software, telecommunications and computer networksSoftCOM 2002 : international conference on software, telecommunications and computer networks. 2002, pp 167-170, isbn 953-6114-52-6, 4 p.Conference Paper

A new proxy signature scheme with revocationLU, Eric Jui-Lin; HWANG, Min-Shiang; HUANG, Cheng-Jian et al.Applied mathematics and computation. 2005, Vol 161, Num 3, pp 799-806, issn 0096-3003, 8 p.Article

Public key encryption schemes supporting equality test with authorisation of different granularityQIANG TANG.International journal of applied cryptography (Print). 2012, Vol 2, Num 4, pp 304-321, issn 1753-0563, 18 p.Article

  • Page / 40