The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase FD-compromises (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1979-1995 (20) 1996-1997 (16) 1998-2000 (21) 2001 (15) 2002 (15) 2003 (31) 2004 (32) 2005 (40) 2006 (41) 2007 (35) 2008 (45) 2009 (30) 2010-2014 (16) 2015-2019 (15) 2020-2023 (15)
Publication types (Num. hits)
article(90) incollection(2) inproceedings(294) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 369 occurrences of 324 keywords

Results
Found 387 publication records. Showing 387 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
64Yi Tang 0001, Jiming Liu 0001, Xiaolong Jin Agent Compromises in Distributed Problem Solving. Search on Bibsonomy IDEAL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Agent Compromises, Distributed GCP Solving, Graph Coloring Problem, Distributed Constraint Satisfaction Problem
59Tzong-An Su, Gultekin Özsoyoglu Controlling FD and MVD Inferences in Multilevel Relational Database Systems. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF FD inferences, attribute classification, MVD inferences, multilevel relational database, record classification, FD-compromises, minimum information loss, MVD-compromises, conflict-free MVDs, computational complexity, relational databases, database theory, inference mechanisms, functional dependencies, NP-complete problem, exact algorithm, necessary and sufficient conditions, multivalued dependencies
45Sandra Ring, David Esler, Eric Cole Self-healing mechanisms for kernel system compromises. Search on Bibsonomy WOSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF fault tolerance, operating systems, kernel, self-healing systems
35Hui Song, Sencun Zhu, Wensheng Zhang 0001, Guohong Cao Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sensor networks, key management, pairwise key, Least privilege, key revocation
35Thomas Claveirole, Marcelo Dias de Amorim, Michel Abdalla, Yannis Viniotis Resisting against aggregator compromises in sensor networks. Search on Bibsonomy CoNEXT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Kwang Mong Sim Equilibria, prudent Compromises, and the "Waiting" game. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part B The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Thomas A. Phelps, Paul B. Watry A No-Compromises Architecture for Digital Document Preservation. Search on Bibsonomy ECDL The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Wensheng Zhang 0001, Hui Song, Sencun Zhu, Guohong Cao Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privilege, wireless sensor networks, mobile sinks
35Kari Smolander The Birth of An E-Business System Architecture: Conflicts, Compromises, and Gaps in Methods. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
35Francesco Buccafurri, Georg Gottlob Multiagent Compromises, Joint Fixpoints, and Stable Models. Search on Bibsonomy Computational Logic: Logic Programming and Beyond The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
32Richard Lippmann, Seth E. Webster, Douglas Stetson The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Internet, network, Intrusion detection, DoS, attack, signature, worm, scan, vulnerability, probe, patch, exploit, false alarm
29Jesus Molina, Xavier Chorin, Michel Cukier Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SSH compromises, filesystem data, host intrusion detection systems, intrusion detection systems evaluation
24Xiangyu Qi, Yi Zeng 0005, Tinghao Xie, Pin-Yu Chen, Ruoxi Jia 0001, Prateek Mittal, Peter Henderson 0002 Fine-tuning Aligned Language Models Compromises Safety, Even When Users Do Not Intend To! Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Emanuele Palumbo, Imant Daunhawer, Julia E. Vogt MMVAE+: Enhancing the Generative Quality of Multimodal VAEs without Compromises. Search on Bibsonomy ICLR The full citation details ... 2023 DBLP  BibTeX  RDF
24Matheus A. Cezarotto, Pamela N. Martinez, Barbara Chamberlin Redesigning for Accessibility: Design Decisions and Compromises in Educational Game Design. Search on Bibsonomy Int. J. Serious Games The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Abimelec Mercado Rivera, Mayra S. Artiles, Juan M. Cruz, Holly M. Matusovich, Stephanie G. Adams Choosing Where to Pursue a PhD: Ideals Sought and Compromises Made by Traditionally Minoritized Students. Search on Bibsonomy FIE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Igor Puleko, Oleksandra Svintsytska, Victor Chumakevych, Vadym Ptashnyk, Yuliia Polishchuk The Scalar Metric of Classification Algorithm Choice in Machine Learning Problems Based on the Scheme of Nonlinear Compromises. Search on Bibsonomy COLINS The full citation details ... 2022 DBLP  BibTeX  RDF
24Frederick Barr-Smith, Tim Blazytko, Richard Baker 0008, Ivan Martinovic Exorcist: Automated Differential Analysis to Detect Compromises in Closed-Source Software Supply Chains. Search on Bibsonomy SCORED@CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Tara Srirangarajan, Leili Mortazavi, Tiago Bortolini, Jorge Moll, Brian Knutson Multi-band FMRI compromises detection of mesolimbic reward responses. Search on Bibsonomy NeuroImage The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Valerii Semenets, Vagan Y. Terziyan, Svitlana Gryshko, Mariia Golovianko Assessment and Decision-Making in Universities: Analytics of the Administration-Staff Compromises. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
24Indra Hardian Mulyadi, Patrique Fiedler, Roland Eichardt, Jens Haueisen, Eko Supriyanto Pareto optimization for electrodes placement: compromises between electrophysiological and practical aspects. Search on Bibsonomy Medical Biol. Eng. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Dilyana Valkova Budakova, Veselka Petrova-Dimitrova, Lyudmil Georgiev Dakovski Smart Broker Agent Learning How to Reach Appropriate Goal by Making Appropriate Compromises. Search on Bibsonomy ICAART (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Dominic Furniss, Bryony Dean Franklin, Ann Blandford The devil is in the detail: How a closed-loop documentation system for IV infusion administration contributes to and compromises patient safety. Search on Bibsonomy Health Informatics J. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Francesco Locatello, Ben Poole, Gunnar Rätsch, Bernhard Schölkopf, Olivier Bachem, Michael Tschannen Weakly-Supervised Disentanglement Without Compromises. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
24Andres Erbsen, Jade Philipoom, Jason Gross, Robert Sloan, Adam Chlipala Simple High-Level Code For Cryptographic Arithmetic: With Proofs, Without Compromises. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Prashant Ganesh, Kyle Volle, Andrew R. Willis, Kevin M. Brink Three Flavors of RGB-D Visual Odometry: Analysis of cost function compromises and covariance estimation accuracy. Search on Bibsonomy PLANS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Francesco Locatello, Ben Poole, Gunnar Rätsch, Bernhard Schölkopf, Olivier Bachem, Michael Tschannen Weakly-Supervised Disentanglement Without Compromises. Search on Bibsonomy ICML The full citation details ... 2020 DBLP  BibTeX  RDF
24Jens Gudmundsson Compromises and Rewards: stable and non-manipulable probabilistic matching. Search on Bibsonomy Int. J. Game Theory The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Yunsen Lei, Craig A. Shue Detecting Root-Level Endpoint Sensor Compromises with Correlated Activity. Search on Bibsonomy SecureComm (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Andres Erbsen, Jade Philipoom, Jason Gross, Robert Sloan, Adam Chlipala Simple High-Level Code for Cryptographic Arithmetic - With Proofs, Without Compromises. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Fan Yang, Youyou Lu, Youmin Chen, Haiyu Mao, Jiwu Shu No Compromises: Secure NVM with Crash Consistency, Write-Efficiency and High-Performance. Search on Bibsonomy DAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Oliver Michel, John Sonchack, Eric Keller, Jonathan M. Smith Packet-Level Analytics in Software without Compromises. Search on Bibsonomy HotCloud The full citation details ... 2018 DBLP  BibTeX  RDF
24Mayank Verma, Ponnurangam Kumarguru, Shuva Brata Deb, Anuradha Gupta Analysing Indicator of Compromises for Ransomware: Leveraging IOCs with Machine Learning Techniques. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Devendra Shelar, Saurabh Amin Security Assessment of Electricity Distribution Networks Under DER Node Compromises. Search on Bibsonomy IEEE Trans. Control. Netw. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Abdelbari Ben Yagouta, Rahma Gantassi, Bechir Ben Gouissem Compromises between energy consumption and quality of service metrics in wireless sensor networks with mobile sink and cluster based routing protocols. Search on Bibsonomy IINTEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Wai-Kit Sze, Abhinav Srivastava, R. Sekar 0001 Hardening OpenStack Cloud Platforms against Compute Node Compromises. Search on Bibsonomy AsiaCCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Maurice Clerc Total Memory Optimiser: Proof of Concept and Compromises. Search on Bibsonomy ICSIBO The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Laurent Gourvès, Jérôme Monnot, Lydia Tlilane Worst case compromises in matroids with applications to the allocation of indivisible goods. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Devendra Shelar, Jairo Giraldo, Saurabh Amin A distributed strategy for electricity distribution network control in the face of DER compromises. Search on Bibsonomy CDC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Christian Rossow IoTPOT: Analysing the Rise of IoT Compromises. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
24Stefan Marr, Chris Seaton, Stéphane Ducasse Zero-overhead metaprogramming: reflection and metaobject protocols fast and without compromises. Search on Bibsonomy PLDI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Aleksandar Dragojevic, Dushyanth Narayanan, Edmund B. Nightingale, Matthew Renzelmann, Alex Shamis, Anirudh Badam, Miguel Castro 0001 No compromises: distributed transactions with consistency, availability, and performance. Search on Bibsonomy SOSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Terry Costantino Issues of Participation: A Framework for Choices and Compromises. Search on Bibsonomy Int. J. Sociotechnology Knowl. Dev. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
24Dimitra Zografistou, Giorgos Flouris, Theodore Patkos, Dimitris Plexousakis, Martin Baláz, Martin Homola, Alexander Simko A Dialogical Model for Collaborative Decision Making Based on Compromises. Search on Bibsonomy EUMAS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
24Michael Köhler-Bußmeier Defining Multi-Party Compromises using Unfoldings of Workflow Nets. Search on Bibsonomy Fundam. Informaticae The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Viola S. Störmer, Shu-Chen Li, Hauke R. Heekeren, Ulman Lindenberger Normal Aging Delays and Compromises Early Multifocal Visual Attention during Object Tracking. Search on Bibsonomy J. Cogn. Neurosci. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Saurabh Gupta, Sutanu Chakraborti Flexible and dynamic compromises for effective recommendations. Search on Bibsonomy CIKM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Aron Laszka, Benjamin Johnson 0001, Jens Grossklags Mitigating Covert Compromises - A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks. Search on Bibsonomy WINE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24David J. Day, Zhengxu Zhao Protecting against address space layout randomisation (ASLR) compromises and return-to-libc attacks using network intrusion detection systems. Search on Bibsonomy Int. J. Autom. Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Joel Weis, Jim Alves-Foss Securing Database as a Service: Issues and Compromises. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Sarfraz Azam, Rizwana Manzoor, Mata ur Rehman Secure Solution to Data Transfer from Sensor Node to Sink against Aggregator Compromises. Search on Bibsonomy FIT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24William Walker Mobile telephony security compromises. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Kari Smolander, Matti Rossi Conflicts, Compromises, and Political Decisions. Search on Bibsonomy Principle Advancements in Database Management Technologies The full citation details ... 2010 DBLP  BibTeX  RDF
24Weidong Huang 0001, Peter Eades, Seok-Hee Hong 0001, Chun-Cheng Lin Improving Force-Directed Graph Drawings by Making Compromises Between Aesthetics. Search on Bibsonomy VL/HCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Benoît Guédas Proposition de compromis pour le calcul de solutions préférées à l'aide d'un algorithme évolutionnaire multiobjectif en optimisation multidisciplinaire. (Proposition of compromises for the computation of preferred solutions with a multiobjective evolutionary algorithm in multidisciplinary design optimisation). Search on Bibsonomy 2010   RDF
24Kari Smolander, Matti Rossi Conflicts, Compromises, and Political Decisions: Methodological Challenges of Enterprise-Wide E-Business Architecture Creation. Search on Bibsonomy Int. J. Enterp. Inf. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Kari Smolander, Matti Rossi Conflicts, Compromises, and Political Decisions. Search on Bibsonomy Database Technologies: Concepts, Methodologies, Tools, and Applications The full citation details ... 2009 DBLP  BibTeX  RDF
24Donggang Liu Protecting Neighbor Discovery Against Node Compromises in Sensor Networks. Search on Bibsonomy ICDCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Thomas Claveirole, Marcelo Dias de Amorim, Michel Abdalla, Yannis Viniotis Securing wireless sensor networks against aggregator compromises. Search on Bibsonomy IEEE Commun. Mag. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Kari Smolander, Matti Rossi Conflicts, Compromises and Political Decisions: Methodological Challenges of Enterprise-Wide E-Business Architecture. Search on Bibsonomy J. Database Manag. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Manas Tungare, Manuel A. Pérez-Quiñones It's Not What You Have, But How You Use It: Compromises in Mobile Device Use Search on Bibsonomy CoRR The full citation details ... 2008 DBLP  BibTeX  RDF
24David W. Kravitz, Thomas S. Messerges Hybrid Peer-to-Peer/Network-Based Rights Transfer in the Presence of Unknown Compromises. Search on Bibsonomy CCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Daniel Ramsbrock, Robin Berthier, Michel Cukier Profiling Attacker Behavior Following SSH Compromises. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Thomas Claveirole, Marcelo Dias de Amorim, Michel Abdalla, Yannis Viniotis Share and Disperse: How to Resist Against Aggregator Compromises in Sensor Networks Search on Bibsonomy CoRR The full citation details ... 2006 DBLP  BibTeX  RDF
24Hao Hua, Christopher Mineo, Kory Schoenfliess, Ambarish M. Sule, Samson Melamed, Ravi Jenkal, W. Rhett Davis Exploring compromises among timing, power and temperature in three-dimensional integrated circuits. Search on Bibsonomy DAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF trade off, design flow, temperature dependency, 3DIC
24Malcolm Hughes Reach to Teach ICT: Issues and Compromises. Search on Bibsonomy Educ. Inf. Technol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24E. Eugene Schultz Personal information compromises: It is time for the U.S. Government to wake up. Search on Bibsonomy Comput. Secur. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Richard L. Baskerville, Robert Sainsbury Securing Against the Possibility of an Improbable Event: Concepts for Managing Predictable Threats and Normal Compromises. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
24Wolf Bubenik, Ivo Hanke, Nadia Juhnke XML-Based Authoring: from Concepts via Compromises to Applications. Search on Bibsonomy ELPUB The full citation details ... 2005 DBLP  BibTeX  RDF
24Ricardo S. Sánchez Peña, Miquel Àngel Cugueró, Albert Masip, Joseba Quevedo, Vicenç Puig Acoustic noise suppression: compromises in identification and control. Search on Bibsonomy ICINCO The full citation details ... 2005 DBLP  BibTeX  RDF
24Kwang Mong Sim Negotiation Agents that Make Prudent Compromises and are Slightly Flexible in Reaching Consensus. Search on Bibsonomy Comput. Intell. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Najib Saylani A Proposal for an Automated Approach to Real Time Profiling of IT Security Compromises. Search on Bibsonomy Security and Management The full citation details ... 2004 DBLP  BibTeX  RDF
24Roch Lefebvre, Philippe Gournay, Redwan Salami A study of design compromises for speech coders in packet networks. Search on Bibsonomy ICASSP (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Hector G. Ceballos, Ramón F. Brena Finding Compromises Between Local and Global Ontology Querying in Multiagent Systems. Search on Bibsonomy CoopIS/DOA/ODBASE (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Carlos E. Castro, Mauricio Cabrera-Ríos, Blaine Lilly, José M. Castro, Clark A. Mount-Campbell Identifying the Best Compromises between Multiple Performance Measures in Injection molding (im) using Data envelopment Analysis (DEA). Search on Bibsonomy Trans. SDPS The full citation details ... 2003 DBLP  BibTeX  RDF
24Ali Arsanjani, Brent Hailpern, Joanne Martin, Peri L. Tarr Web Services: Promises and Compromises. Search on Bibsonomy ACM Queue The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Francesco Buccafurri Multiagent Compromises and Joint Fixpoint Semantics. Search on Bibsonomy APPIA-GULP-PRODE The full citation details ... 2003 DBLP  BibTeX  RDF
24Liang Zhao Interactive television in distance education: benefits and compromises. Search on Bibsonomy ISTAS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Helmut Horacek Tailoring inference-rich descriptions through making compromises between conflicting cooperation principles. Search on Bibsonomy Int. J. Hum. Comput. Stud. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Gregory E. Kersten, Sunil J. Noronha Rational agents, contract curves, and inefficient compromises. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part A The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
24Ute Morgenstern Nine Uneasy Compromises in Biomedical Simulation. Search on Bibsonomy EUROSIM The full citation details ... 1995 DBLP  BibTeX  RDF
24Bernard Grabot, Laurent Geneste, Arnaud Dupeux Multi-heuristic scheduling: three approaches to tune compromises. Search on Bibsonomy J. Intell. Manuf. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
24Helmut Horacek Content Selection and Organization as a Process Involving Compromises. Search on Bibsonomy INLG The full citation details ... 1994 DBLP  BibTeX  RDF
24Harlan D. Webre Compromises and complexities associated with removal of MIS from the logical access authorization loop. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
24Gregory E. Kersten A procedure for negotiating efficient and non-efficient compromises. Search on Bibsonomy Decis. Support Syst. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
24Yannick Descotte, Jean-Claude Latombe Making Compromises Among Antagonist Constraints in a Planner. Search on Bibsonomy Artif. Intell. The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
24Milan Berka Stable compromises in a certain arbitration game. Search on Bibsonomy Kybernetika The full citation details ... 1980 DBLP  BibTeX  RDF
21Caroline Jarrett, Helen Petrie, Kathryn Summers Design to read: designing for people who do not read easily. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2010 DBLP  DOI  BibTeX  RDF accessibility, universal design, readability, internationalization, legibility
21Wensheng Zhang 0001, Nalin Subramanian, Guiling Wang 0001 Lightweight and Compromise-Resilient Message Authentication in Sensor Networks. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Qi Dong 0001, Donggang Liu Using Auxiliary Sensors for Pairwise Key Establishment in WSN. Search on Bibsonomy Networking The full citation details ... 2007 DBLP  DOI  BibTeX  RDF sensor networks, Key management, pairwise keys
21Alwyn Goodloe, Carl A. Gunter Reasoning about Concurrency for Security Tunnels. Search on Bibsonomy CSF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Jin Li 0002, Fangguo Zhang, Yanming Wang A Strong Identity Based Key-Insulated Cryptosystem. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Key-insulated cryptosystem, Bilinear pairings, ID-based
21Stephen Fried Innovative technologies III - Topologies for improved InfiniBand latency. Search on Bibsonomy SC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Mikhail J. Atallah, Keith B. Frikken, Michael T. Goodrich, Roberto Tamassia Secure Biometric Authentication for Weak Computational Devices. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, biometrics, smart cards, cryptographic hash functions
21Eerke A. Boiten, John Derrick Formal Program Development with Approximations. Search on Bibsonomy ZB The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Richard John Anthony Emergence: A Paradigm for Robust and Scalable Distributed Applications. Search on Bibsonomy ICAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Self-Stabilisation, Election Algorithm, Fault Tolerance, Distributed Systems, Scalability, Emergence
21Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung Strong Key-Insulated Signature Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung Key-Insulated Public Key Cryptosystems. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
21Gene Itkis Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
21Gene Itkis, Leonid Reyzin SiBIR: Signer-Base Intrusion-Resilient Signatures. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 387 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license