The SCEAS System
Navigation Menu

Search the dblp DataBase


Thomas Hardjono: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Thomas Hardjono, Jennifer Seberry
    Replicating the Kuperee authentication server for increased security and reliability. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:14-26 [Conf]
  2. Thomas Hardjono, Jennifer Seberry
    Information Security in Mobile Databases. [Citation Graph (0, 0)][DBLP]
    Australasian Database Conference, 1995, pp:0-0 [Conf]
  3. Thomas Hardjono
    Record Encryption in Distributed Databases. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:386-395 [Conf]
  4. Thomas Hardjono, Yuliang Zheng
    A Practical Digital Multisignature Scheme Based on Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:122-132 [Conf]
  5. Yuliang Zheng, Thomas Hardjono, Josef Pieprzyk
    Sibling Intractable Function Families and Their Applications (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:124-138 [Conf]
  6. Thomas Hardjono, Brad Cain
    PIM -SM Security: Interdomain Issues and Solutions. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:191-208 [Conf]
  7. Thomas Hardjono, Jennifer Seberry
    Authentication via Multi-Service Tickets in the Kuperee Server. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:143-160 [Conf]
  8. Thomas Hardjono, Naganand Doraswamy, Brad Cain
    An Architecture for Conference-Support Using Secured Multicast. [Citation Graph (0, 0)][DBLP]
    HPN, 1998, pp:79-93 [Conf]
  9. Thomas Hardjono, Tadashi Ohta
    Fixed-Path Proxy-Logins with Assured Termination. [Citation Graph (0, 0)][DBLP]
    ICCI, 1993, pp:111-115 [Conf]
  10. Thomas Hardjono, Brad Cain
    Secure and Scalable Inter-Domain Group Key Management for N-to-N Multicast. [Citation Graph (0, 0)][DBLP]
    ICPADS, 1998, pp:478-0 [Conf]
  11. Lakshminath R. Dondeti, Brian Haberman, Haldon J. Sandick, Thomas Hardjono, Haixiang He
    MBA: A Tool for Multicast Billing and Accounting. [Citation Graph (0, 0)][DBLP]
    ISCC, 2001, pp:172-177 [Conf]
  12. Thomas Hardjono
    Router-Assistance for Receiver Access Control in PIM-SM. [Citation Graph (0, 0)][DBLP]
    ISCC, 2000, pp:687-692 [Conf]
  13. Thomas Hardjono, Brad Cain
    A Secure Group Membership Verification Protocol for IP Multicast. [Citation Graph (0, 0)][DBLP]
    ISCC, 1999, pp:9-15 [Conf]
  14. Thomas Hardjono
    Key Management Framework for IP Multicast Infrastructure Security. [Citation Graph (0, 0)][DBLP]
    IS&N, 1999, pp:385-398 [Conf]
  15. Brad Cain, Thomas Hardjono
    Collection servers: an architecture for multicast receiver reporting. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia (2), 1999, pp:107-109 [Conf]
  16. Thomas Hardjono
    RP-Based Multicast Receiver Access Control in PIM-SM. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2000, pp:120-131 [Conf]
  17. Thomas Hardjono, Hugh Harney
    Group Security Policy Management for IP Multicast and Group Security. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2002, pp:1123-1128 [Conf]
  18. Thomas Hardjono, Mark Baugher, Hugh Harney
    Group Security Association (GSA) Management in IP Multicast. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:213-228 [Conf]
  19. Vijay Varadharajan, Thomas Hardjono
    Security model for distributed object framework and its applicability to CORBA. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:452-463 [Conf]
  20. Thomas Hardjono, Yuliang Zheng, Jennifer Seberry
    Kuperee: An Approach to Authentication using Public Keys. [Citation Graph (0, 0)][DBLP]
    ULPAA, 1994, pp:65-76 [Conf]
  21. Thomas Hardjono, Jennifer Seberry
    Search Key Substitution in the Encipherment of B-Trees. [Citation Graph (0, 5)][DBLP]
    VLDB, 1990, pp:50-58 [Conf]
  22. Thomas Hardjono, Mark Baugher, Hugh Harney
    Group Key Management for IP Multicast: Model & Architecture. [Citation Graph (0, 0)][DBLP]
    WETICE, 2001, pp:223-228 [Conf]
  23. Yuliang Zheng, Thomas Hardjono, Jennifer Seberry
    Reusing Shares in Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1994, v:37, n:3, pp:199-205 [Journal]
  24. Thomas Hardjono, Tadashi Ohta
    Secure end-to-end delegations in distributed systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:3, pp:230-238 [Journal]
  25. Thomas Hardjono, Jennifer Seberry
    Applications of smartcards for anonymous and verifiable databases. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:5, pp:465-472 [Journal]
  26. Thomas Hardjono, Yuliang Zheng, Jennifer Seberry
    Database authentication revisited. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:7, pp:573-580 [Journal]
  27. Azad Jiwa, Thomas Hardjono, Jennifer Seberry
    Beacons for Authentication in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1996, v:4, n:1, pp:81-96 [Journal]

Search in 0.294secs, Finished in 0.296secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002