The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Aleksandra Nenadic: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Aleksandra Nenadic, Ning Zhang, Qi Shi, Carole A. Goble
    DSA-Based Verifiable and Recoverable Encryption of Signatures and Its Application in Certified E-Goods Delivery. [Citation Graph (0, 0)][DBLP]
    EEE, 2005, pp:94-99 [Conf]
  2. Aleksandra Nenadic, Ning Zhang
    Non-Repudiation and Fairness in Electronic Data Exchange. [Citation Graph (0, 0)][DBLP]
    ICEIS (4), 2003, pp:55-62 [Conf]
  3. Aleksandra Nenadic, Ning Zhang, Qi Shi, Carole A. Goble
    Certified E-Mail Delivery with DSA Receipts. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  4. Aleksandra Nenadic, Ning Zhang, Stephen Barton
    A secure and fair DSA-based signature exchange protocol. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:412-417 [Conf]
  5. Aleksandra Nenadic, Ning Zhang, Stephen Barton
    A Security Protocol for Certified E-Goods Delivery. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:22-0 [Conf]
  6. Aleksandra Nenadic, Ning Zhang, Stephen Barton
    Fair certified e-mail delivery. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:391-396 [Conf]
  7. Ning Zhang, L. Yao, Jay Chin, Aleksandra Nenadic, A. McNab, Alan L. Rector, Carole A. Goble, Qi Shi
    Plugging a Scalable Authentication Framework into Shibboleth. [Citation Graph (0, 0)][DBLP]
    WETICE, 2005, pp:271-276 [Conf]
  8. Aleksandra Nenadic, Ning Zhang, Qi Shi
    RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:5, pp:757-777 [Journal]
  9. Aleksandra Nenadic, Ning Zhang, Barry M. G. Cheetham, Carole A. Goble
    RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature Encryption. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:1, pp:175-192 [Journal]
  10. Aleksandra Nenadic, Ning Zhang, Jay Chin, Carole A. Goble
    FAME: Adding Multi-Level Authentication to Shibboleth. [Citation Graph (0, 0)][DBLP]
    e-Science, 2006, pp:157- [Conf]

  11. Towards Context Constrained Authorisation for Pervasive Grid Computing. [Citation Graph (, )][DBLP]


  12. Taverna, Reloaded. [Citation Graph (, )][DBLP]


  13. Levels of Authentication Assurance: an Investigation. [Citation Graph (, )][DBLP]


  14. Achieving fine-grained access control in virtual organizations. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002