|
Search the dblp DataBase
Tim Ebringer:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Tim Ebringer, Yuliang Zheng, Peter Thorne
Parasitic Authentication. [Citation Graph (0, 0)][DBLP] CARDIS, 2000, pp:307-326 [Conf]
- Sachiko Yoshihama, Tim Ebringer, Megumi Nakamura, Seiji Munetoh, Hiroshi Maruyama
WS-Attestation: Efficient and Fine-Grained Remote Attestation on Web Services. [Citation Graph (0, 0)][DBLP] ICWS, 2005, pp:743-750 [Conf]
- Tim Ebringer, Peter Thorne
Engineering an eCash System. [Citation Graph (0, 0)][DBLP] ISW, 1999, pp:32-36 [Conf]
- Tim Ebringer, Peter Thorne, Yuliang Zheng
Parasitic Authentication To Protect Your E-Wallet. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2000, v:33, n:10, pp:54-60 [Journal]
- Tan Phan, Jun Han, Jean-Guy Schneider, Tim Ebringer, Tony Rogers
Policy-Based Service Registration and Discovery. [Citation Graph (0, 0)][DBLP] OTM Conferences (1), 2007, pp:417-426 [Conf]
- Dana Zhang, Kotagiri Ramamohanarao, Tim Ebringer
Role engineering using graph optimisation. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:139-144 [Conf]
Permission Set Mining: Discovering Practical and Useful Roles. [Citation Graph (, )][DBLP]
A Survey of Policy-Based Management Approaches for Service Oriented Systems. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|