Conferences in DBLP
Hannes Federrath Privacy Enhanced Technologies: Methods - Markets - Misuse. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:1-9 [Conf ] Petros Belsis , Stefanos Gritzalis , Apostolos Malatras , Christos Skourlas , Ioannis Chalaris Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:10-19 [Conf ] Klaus Plößl , Hannes Federrath , Thomas Nowey Protection Mechanisms Against Phishing Attacks. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:20-29 [Conf ] Jordi Castellà-Roca , Francesc Sebé , Josep Domingo-Ferrer Dropout-Tolerant TTP-Free Mental Poker. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:30-40 [Conf ] Bumjoo Park , Kiejin Park , Sungsoo Kim A Self-healing Mechanism for an Intrusion Tolerance System. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:41-49 [Conf ] Jianshu Weng , Chunyan Miao , Angela Goh Protecting Online Rating Systems from Unfair Ratings. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:50-59 [Conf ] Magdalena Payeras-Capellà , Josep Lluís Ferrer-Gomila , Llorenç Huguet i Rotger Anonymous Payment in a Fair E-Commerce Protocol with Verifiable TTP. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:60-69 [Conf ] Rong Du , Ernest Foo , Juan González Nieto , Colin Boyd Designing Secure E-Tendering Systems. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:70-79 [Conf ] Stephan Groß , Sabine Lein , Sandra Steinbrecher A Multilateral Secure Payment System for Wireless LAN Hotspots. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:80-89 [Conf ] Junghyun Nam , Seungjoo Kim , Dongho Won Secure Group Communications over Combined Wired and Wireless Networks. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:90-99 [Conf ] Oliver Jorns , Oliver Jung , Julia Gross , Sandford Bessler A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:100-109 [Conf ] Heiko Rossnagel , Denis Royer Making Money with Mobile Qualified Electronic Signatures. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:110-118 [Conf ] Jose L. Muñoz , Jordi Forné , Oscar Esparza , Manel Rey Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT). [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:119-127 [Conf ] Hyun-A Park , Jin Wook Byun , Dong Hoon Lee Secure Index Search for Groups. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:128-140 [Conf ] Nikolaos Oikonomidis , Sergiu Tcaciuc , Christoph Ruland Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:141-150 [Conf ] Ching Lin , Vijay Varadharajan , Yan Wang Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:151-160 [Conf ] Elizabeth Chang , Patricia Thomson , Tharam S. Dillon , Farookh Khadeer Hussain The Fuzzy and Dynamic Nature of Trust. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:161-174 [Conf ] Lea Viljanen Towards an Ontology of Trust. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:175-184 [Conf ] Jianhong Zhang , Jiancheng Zou , Yumin Wang An Improved Group Signature Scheme. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:185-194 [Conf ] Eun Young Choi , Hyun-Jeong Kim , Dong Hoon Lee Efficient Member Revocation in Group Signature Schemes. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:195-205 [Conf ] Marek Klonowski , Miroslaw Kutylowski , Anna Lauks , Filip Zagórski Conditional Digital Signatures. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:206-215 [Conf ] Seung-Hyun Seo , Kyung-Ah Shim , Sang-Ho Lee A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:216-225 [Conf ] Marco Casassa Mont , Robert Thyne , Pete Bramhall Privacy Enforcement for IT Governance in Enterprises: Doing It for Real. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:226-235 [Conf ] Marco Casassa Mont , Siani Pearson An Adaptive Privacy Management System for Data Repositories. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:236-245 [Conf ] Ayça Azgin Hintoglu , Yücel Saygin , Salima Benbernou , Mohand-Said Hacid Privacy Preserving Data Mining Services on the Web. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:246-255 [Conf ] Sylvia Mercado Kierkegaard Reading Your Keystroke: Whose Mail Is It? [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:256-265 [Conf ] Huafei Zhu , Feng Bao A Novel Construction of Two-Party Private Bidding Protocols from Yao's Millionaires Problem. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:266-273 [Conf ] JungHoon Ha , Jianying Zhou , Sang-Jae Moon An Improved Double Auction Protocol Against False Bids. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:274-287 [Conf ] Glenn Bewsell , Rodger Jamieson , Adrian Gardiner , Deborah Bunker An Investigation of Dispute Resolution Mechanisms on Power and Trust: A Domain Study of Online Trust in e-Auctions. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:288-298 [Conf ] Yongwha Chung , Daesung Moon , Taehae Kim , Sung Bum Pan A Secure Fingerprint Authentication System on an Untrusted Computing Environment. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:299-310 [Conf ] Eun-Jun Yoon , Woo-Hun Kim , Kee-Young Yoo Security Enhancement for Password Authentication Schemes with Smart Cards. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:311-320 [Conf ] Luigi Catuogno , Roberto Gassirà , Michele Masullo , Ivan Visconti Securing Operating System Services Based on Smart Cards. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:321-330 [Conf ]