Trust and authorization in pervasive B2E scenarios L Bussard, Y Roudier, R Kilian-Kehr, S Crosta International Conference on Information Security, 295-309, 2003 | 22 | 2003 |
Policy-based encryption schemes from bilinear pairings W Bagga, R Molva, S Crosta Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006 | 19 | 2006 |
Automatic clustering of wireless network nodes toward selected mesh access points P Thubert, P Wetterwald, VJ Ribiere, SA Crosta US Patent 8,259,635, 2012 | 17 | 2012 |
Establishment of ad-hoc communities through policy-based cryptography W Bagga, S Crosta, P Michiardi, R Molva Electronic Notes in Theoretical Computer Science 171 (1), 107-120, 2007 | 5 | 2007 |
Proof-carrying proxy certificates W Bagga, S Crosta, R Molva International Conference on Security and Cryptography for Networks, 321-335, 2006 | 5 | 2006 |
Modelling and Securing European Justice Workflows S Crosta, JC Pazzaglia, H Schöttle ISSE 2005—Securing Electronic Business Processes: Highlights of the …, 2005 | 4 | 2005 |
Policy-Based Encryption Schemes from Bilinear Pairings (Fast Abstract) W Bagga ASIACCS 6, 21-24, 0 | 2 | |
An application of policy-based signature: Proofcarrying proxy certificates W Bagga, S Crosta, R Molva Institut Eurecom, Research Report RR-06-169, 2006 | 1 | 2006 |
A Secure Public Sector Workflow Management System M Rits, A Schaad, S Crosta, JC Pazzaglia na, 2005 | 1 | 2005 |
Can we take this off-line? how to deal with credentials in federations without global connectivity L Bussard, J Claessens, S Crosta, Y Roudier, A Zugenmaier pdf]. Technical Report RR-04-105, 2004 | 1 | 2004 |
MADSig: Enhancing Digital Signature to Capture Secure Document Processing Requirements JC Pazzaglia, S Crosta ISSE 2006—Securing Electronic Busines Processes, 241-248, 2006 | | 2006 |
A Secure Public Sector Workflow Management System S Crosta, F Montagut, JC Pazzaglia, Y Reznichenko, M Rits, A Schaad | | |
Can we take this off-line? L Bussard, J Claessens, S Crosta, Y Roudier, A Zugenmaier | | |