Search the dblp DataBase
Bruno Crispo :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Pietro Mazzoleni , Bruno Crispo , Swaminathan Sivasubramanian , Elisa Bertino Efficient Integration of Fine-grained Access Control in Large-scale Grid Services. [Citation Graph (0, 0)][DBLP ] IEEE SCC, 2005, pp:77-86 [Conf ] Bruno Crispo , Bogdan C. Popescu , Andrew S. Tanenbaum Symmetric Key Authentication Services Revisited. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:248-261 [Conf ] Kemal Bicakci , Bruno Crispo , Andrew S. Tanenbaum Counting Abuses Using Flexible Off-line Credentials. [Citation Graph (0, 0)][DBLP ] ACISP, 2005, pp:548-559 [Conf ] Melanie R. Rieback , Bruno Crispo , Andrew S. Tanenbaum RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. [Citation Graph (0, 0)][DBLP ] ACISP, 2005, pp:184-194 [Conf ] Francesco Bergadano , Bruno Crispo , Giancarlo Ruffo Proactive Password Checking with Decision Trees. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1997, pp:67-77 [Conf ] Elisa Bertino , Bruno Crispo , Pietro Mazzoleni Supporting Multi-Dimensional Trustworthiness for Grid Workflows. [Citation Graph (0, 0)][DBLP ] DELOS Workshop: Digital Library Architectures, 2004, pp:195-204 [Conf ] Bogdan C. Popescu , Bruno Crispo , Andrew S. Tanenbaum , Frank Kamperman A DRM security architecture for home networks. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2004, pp:1-10 [Conf ] Elisa Bertino , Pietro Mazzoleni , Bruno Crispo , Swaminathan Sivasubramanian , Elena Ferrari Towards Supporting Fine-Grained Access Control for Grid Resources. [Citation Graph (0, 0)][DBLP ] FTDCS, 2004, pp:59-65 [Conf ] Bogdan C. Popescu , Bruno Crispo , Andrew S. Tanenbaum Secure Data Replication over Untrusted Hosts. [Citation Graph (0, 0)][DBLP ] HotOS, 2003, pp:121-126 [Conf ] Bruno Crispo , Giancarlo Ruffo Reasoning about Accountability within Delegation. [Citation Graph (0, 0)][DBLP ] ICICS, 2001, pp:251-260 [Conf ] Francesco Bergadano , Davide Cavagnino , Bruno Crispo Individual Single Source Authentication on the MBone. [Citation Graph (0, 0)][DBLP ] IEEE International Conference on Multimedia and Expo (I), 2000, pp:541-544 [Conf ] Bruno Crispo , Swaminathan Sivasubramanian , Pietro Mazzoleni , Elisa Bertino P-Hera: Scalable fine-grained access control for P2P infrastructures. [Citation Graph (0, 0)][DBLP ] ICPADS (1), 2005, pp:585-591 [Conf ] Bogdan C. Popescu , Maarten van Steen , Bruno Crispo , Andrew S. Tanenbaum , Jan Sacha , Ihor Kuz Securely Replicated Web Documents. [Citation Graph (0, 0)][DBLP ] IPDPS, 2005, pp:- [Conf ] Bruno Crispo Delegation Protocols for Electronic Commerce. [Citation Graph (0, 0)][DBLP ] ISCC, 2001, pp:674-679 [Conf ] Chandana Gamage , Kemal Bicakci , Bruno Crispo , Andrew S. Tanenbaum Security for the Mythical Air-Dropped Sensor Network. [Citation Graph (0, 0)][DBLP ] ISCC, 2006, pp:41-47 [Conf ] Bogdan C. Popescu , Bruno Crispo , Andrew S. Tanenbaum A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System. [Citation Graph (0, 0)][DBLP ] ISCC, 2003, pp:225-231 [Conf ] Melanie R. Rieback , Georgi Gaydadjiev , Bruno Crispo , Rutger F. H. Hofman , Andrew S. Tanenbaum A Platform for RFID Security and Privacy Administration (Awarded Best Paper!). [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:89-102 [Conf ] Bogdan C. Popescu , Bruno Crispo , Andrew S. Tanenbaum Support for multi-level security policies in DRM architectures. [Citation Graph (0, 0)][DBLP ] NSPW, 2004, pp:3-9 [Conf ] Melanie R. Rieback , Bruno Crispo , Andrew S. Tanenbaum Is Your Cat Infected with a Computer Virus?. [Citation Graph (0, 0)][DBLP ] PerCom, 2006, pp:169-179 [Conf ] Kemal Bicakci , Bruno Crispo , Andrew S. Tanenbaum How to incorporate revocation status information into the trust metrics for public-key certification. [Citation Graph (0, 0)][DBLP ] SAC, 2005, pp:1594-1598 [Conf ] Elisa Bertino , Bruno Crispo , James Joshi , Wengliang (Kevin) Du , Ravi S. Sandhu Security for grid-based computing systems issues and challenges. [Citation Graph (0, 0)][DBLP ] SACMAT, 2004, pp:125- [Conf ] Pietro Mazzoleni , Elisa Bertino , Bruno Crispo XACML policy integration algorithms: not to be confused with XACML policy combination algorithms! [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:219-227 [Conf ] Francesco Bergadano , Davide Cavagnino , Bruno Crispo Chained Stream Authentication. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2000, pp:144-157 [Conf ] Francesco Bergadano , Davide Cavagnino , Bruno Crispo Issues in Multicast Security. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1999, pp:119-139 [Conf ] Bruce Christianson , Bruno Crispo , James A. Malcolm Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:182-183 [Conf ] Bruno Crispo How to Build Evidence in a Public-Key Infrastructure for Multi-domain Environments. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:53-65 [Conf ] Bruno Crispo Delegation of Responsibility (Position Paper). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1998, pp:118-124 [Conf ] Bruno Crispo Delegation of Responsibility (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1998, pp:125-130 [Conf ] Bruno Crispo , T. Mark A. Lomas A Certification Scheme for Electronic Commerce. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1996, pp:19-32 [Conf ] Bogdan C. Popescu , Bruno Crispo , Andrew S. Tanenbaum Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2004, pp:213-220 [Conf ] Bogdan C. Popescu , Bruno Crispo , Andrew S. Tanenbaum , Maas Zeeman Enforcing Security Policies for Distributed Objects Applications. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:119-130 [Conf ] Srijith Krishnan Nair , Bogdan C. Popescu , Chandana Gamage , Bruno Crispo , Andrew S. Tanenbaum Enabling DRM-Preserving Digital Content Redistribution. [Citation Graph (0, 0)][DBLP ] CEC, 2005, pp:151-158 [Conf ] Francesco Bergadano , Davide Cavagnino , Bruno Crispo Individual Authentication in Multiparty Communications. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:8, pp:719-735 [Journal ] Andrew S. Tanenbaum , Chandana Gamage , Bruno Crispo Taking Sensor Networks from the Lab to the Jungle. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2006, v:39, n:8, pp:98-100 [Journal ] Francesco Bergadano , Bruno Crispo , T. Mark A. Lomas Strong Authentication and Privacy with Standard Browsers. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1997, v:5, n:3, pp:191-212 [Journal ] Ross J. Anderson , Francesco Bergadano , Bruno Crispo , Jong-Hyeon Lee , Charalampos Manifavas , Roger M. Needham A New Family of Authentication Protocols. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1998, v:32, n:4, pp:9-20 [Journal ] Francesco Bergadano , Bruno Crispo , Giancarlo Ruffo High Dictionary Compression for Proactive Password Checking. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 1998, v:1, n:1, pp:3-25 [Journal ] Bogdan C. Popescu , Bruno Crispo , Andrew S. Tanenbaum , Arno Bakker Design and implementation of a secure wide-area object middleware. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2484-2513 [Journal ] Bruno Crispo , Peter Landrock , Václav Matyás Jr. WWW security and trusted third party services. [Citation Graph (0, 0)][DBLP ] Future Generation Comp. Syst., 2000, v:16, n:4, pp:331-341 [Journal ] A Secure and Scalable Grid-Based Content Management System. [Citation Graph (, )][DBLP ] Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices. [Citation Graph (, )][DBLP ] Using Description Logics in Relation Based Access Control. [Citation Graph (, )][DBLP ] Enforcing DRM policies across applications. [Citation Graph (, )][DBLP ] Floodgate: A Micropayment Incentivized P2P Content Delivery Network. [Citation Graph (, )][DBLP ] P-CDN: Extending access control capabilities of P2P systems to provide CDN services. [Citation Graph (, )][DBLP ] ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems. [Citation Graph (, )][DBLP ] Bait Your Hook: A Novel Detection Technique for Keyloggers. [Citation Graph (, )][DBLP ] A service-based context management framework for cross-enterprise collaboration. [Citation Graph (, )][DBLP ] A Hybrid PKI-IBC Based Ephemerizer System. [Citation Graph (, )][DBLP ] Towards a Theory of White-Box Security. [Citation Graph (, )][DBLP ] Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags. [Citation Graph (, )][DBLP ] Towards a Secure Application-Semantic Aware Policy Enforcement Architecture. [Citation Graph (, )][DBLP ] Secure web service federation management using tpm virtualisation. [Citation Graph (, )][DBLP ] Performance evaluation of XACML PDP implementations. [Citation Graph (, )][DBLP ] An efficient weak secrecy scheme for network coding data dissemination in VANET. [Citation Graph (, )][DBLP ] Turning Teenagers into Stores. [Citation Graph (, )][DBLP ] A Virtual Machine Based Information Flow Control System for Policy Enforcement. [Citation Graph (, )][DBLP ] Search in 0.015secs, Finished in 0.017secs