The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Walid Bagga: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Walid Bagga, Refik Molva, Stefano Crosta
    Policy-based encryption schemes from bilinear pairings. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:368- [Conf]
  2. Walid Bagga, Refik Molva
    Policy-Based Cryptography and Applications. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:72-87 [Conf]
  3. Walid Bagga, Refik Molva
    Collusion-Free Policy-Based Encryption. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:233-245 [Conf]
  4. Michael Backes, Günter Karjoth, Walid Bagga, Matthias Schunter
    Efficient comparison of enterprise privacy policies. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:375-382 [Conf]
  5. Walid Bagga, Stefano Crosta, Refik Molva
    Proof-Carrying Proxy Certificates. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:321-335 [Conf]
  6. Laurent Bussard, Walid Bagga
    Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:223-238 [Conf]
  7. Walid Bagga, Stefano Crosta, Pietro Michiardi, Refik Molva
    Establishment of Ad-Hoc Communities through Policy-Based Cryptography. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:171, n:1, pp:107-120 [Journal]

Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002