Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
103 | Jan Cederquist, Muhammad Torabi Dashti |
An intruder model for verifying liveness in security protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006, pp. 23-32, 2006, ACM, 1-59593-550-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Dolev-Yao intruder, intruder models, security protocols, liveness properties |
100 | Bin Tong, Santosh Panchapakesan, Wensheng Zhang 0001 |
A Three-Tier Framework for Intruder Information Sharing in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECON ![In: Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2008, June 16-20, 2008, Crowne Plaza, San Francisco International Airport, California, USA, pp. 451-459, 2008, IEEE, 978-1-4244-1777-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
92 | Alwen Tiu, Rajeev Goré |
A Proof Theoretic Analysis of Intruder Theories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTA ![In: Rewriting Techniques and Applications, 20th International Conference, RTA 2009, Brasília, Brazil, June 29 - July 1, 2009, Proceedings, pp. 103-117, 2009, Springer, 978-3-642-02347-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
AC convergent theories, intruder deduction, security protocols, sequent calculus |
92 | Lali Barrière, Paola Flocchini, Pierre Fraigniaud, Nicola Santoro |
Capture of an intruder by mobile agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPAA ![In: Proceedings of the Fourteenth Annual ACM Symposium on Parallel Algorithms and Architectures, SPAA 2002, Winnipeg, Manitoba, Canada, August 11-13, 2002, pp. 200-209, 2002, ACM, 1-58113-529-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
network intruder, mobile agent, graph-searching |
84 | Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi |
From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 6th Workshop on Enabling Technologies (WET-ICE '97), Infrastructure for Collaborative Enterprises, 18-20 June 1997, MIT, Cambridge, MA, USA, Proceedings, pp. 256-262, 1997, IEEE Computer Society, 0-8186-7967-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
authentication protocol specifications, flaws, automatic formal algorithm, protocol roles, intruder communication abilities, intruder computational abilities, protocol instrumentations, formal verification, encryption, message authentication, decryption, attack scenarios, deductive system |
81 | Flaminia L. Luccio |
Intruder Capture in Sierpinski Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FUN ![In: Fun with Algorithms, 4th International Conference, FUN 2007, Castiglioncello, Italy, June 3-5, 2007, Proceedings, pp. 249-261, 2007, Springer, 978-3-540-72913-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
intruder capture, Sierpi?ski graphs, Mobile agents |
81 | Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò 0001 |
A Formalization of Off-Line Guessing for Security Protocol Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LPAR ![In: Logic for Programming, Artificial Intelligence, and Reasoning, 11th International Conference, LPAR 2004, Montevideo, Uruguay, March 14-18, 2005, Proceedings, pp. 363-379, 2004, Springer, 3-540-25236-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
70 | Yannick Chevalier, Michaël Rusinowitch |
Combining Intruder Theories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings, pp. 639-651, 2005, Springer, 3-540-27580-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Flaminia L. Luccio |
Contiguous Search Problem in Sierpinski Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theory Comput. Syst. ![In: Theory Comput. Syst. 44(2), pp. 186-204, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Intruder capture, Sierpi?ski graphs, Mobile agents |
62 | Heejin Jang, Sangwook Kim |
A Self-Extension Monitoring for Security Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 196-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
self-extension monitoring, information security patterns, active security protection, intruder identification system, authorisation, security management, hackers, information infrastructures, computer crime, information warfare |
60 | Yannick Chevalier, Mounira Kourjieh |
A Symbolic Intruder Model for Hash-Collision Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers, pp. 13-27, 2006, Springer, 978-3-540-77504-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
60 | Heejin Jang, Sangwook Kim |
An intruder tracing system based on a shadowing mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 1-4 July 2002, Taormina, Italy, pp. 904-909, 2002, IEEE Computer Society, 0-7695-1671-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
60 | Heejin Jang, Sangwook Kim |
Real-Time Intruder Tracing through Self-Replication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings, pp. 1-16, 2002, Springer, 3-540-44270-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
52 | Yannick Chevalier, Laurent Vigneron |
Strategy for Verifying Security Protocols with Unbounded Message Size. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autom. Softw. Eng. ![In: Autom. Softw. Eng. 11(2), pp. 141-166, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
intruder model, automatic strategies, verification, security protocols, flaw detection |
52 | Mourad Debbabi, Nancy A. Durgin, Mohamed Mejri, John C. Mitchell |
Security by typing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Softw. Tools Technol. Transf. ![In: Int. J. Softw. Tools Technol. Transf. 4(4), pp. 472-495, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Intruder abilities, Authentication, Integrity, Type System, Cryptographic Protocols, Secrecy |
51 | N. E. Venkatesan, Tarun Agarwal, P. Vijay Kumar |
On the Average Case Communication Complexity for Detection in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DCOSS ![In: Distributed Computing in Sensor Systems, 4th IEEE International Conference, DCOSS 2008, Santorini Island, Greece, June 11-14, 2008, Proceedings, pp. 176-189, 2008, Springer, 978-3-540-69169-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
51 | Stéphanie Delaune, Florent Jacquemard |
Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Autom. Reason. ![In: J. Autom. Reason. 36(1-2), pp. 85-124, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
verification, formal methods, cryptographic protocols, dictionary attacks, probabilistic encryption |
51 | Ping Yi, Zhoulin Dai, YiPing Zhong, Shiyong Zhang |
Resisting Flooding Attacks in Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (2) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 2, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 657-662, 2005, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Navid Imani, Hamid Sarbazi-Azad, Albert Y. Zomaya |
Capturing an Intruder in Product Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HiPC ![In: High Performance Computing - HiPC 2006, 13th International Conference, Bangalore, India, December 18-21, 2006, Proceedings, pp. 193-204, 2006, Springer, 3-540-68039-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Pooya Shareghi, Navid Imani, Hamid Sarbazi-Azad |
Capturing an Intruder in the Pyramid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: Computer Science - Theory and Applications, First International Symposium on Computer Science in Russia, CSR 2006, St. Petersburg, Russia, June 8-12, 2006, Proceedings, pp. 580-590, 2006, Springer, 3-540-34166-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Yannick Chevalier, Michaël Rusinowitch |
Hierarchical Combination of Intruder Theories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTA ![In: Term Rewriting and Applications, 17th International Conference, RTA 2006, Seattle, WA, USA, August 12-14, 2006, Proceedings, pp. 108-122, 2006, Springer, 3-540-36834-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
49 | James N. K. Liu, Meng Wang 0005, Bo Feng |
iBotGuard: an Internet-based Intelligent Robot security system using Invariant Face Recognition against intruder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part C ![In: IEEE Trans. Syst. Man Cybern. Part C 35(1), pp. 97-105, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Paola Flocchini, Miao Jun Huang, Flaminia L. Luccio |
Contiguous Search in the Hypercube for Capturing an Intruder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), CD-ROM / Abstracts Proceedings, 4-8 April 2005, Denver, CO, USA, 2005, IEEE Computer Society, 0-7695-2312-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Hubert Comon-Lundh, Ralf Treinen |
Easy Intruder Deductions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Verification: Theory and Practice ![In: Verification: Theory and Practice, Essays Dedicated to Zohar Manna on the Occasion of His 64th Birthday, pp. 225-242, 2003, Springer, 3-540-21002-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Jurek Czyzowicz, Evangelos Kranakis, Danny Krizanc, Ioannis Lambadaris, Lata Narayanan, Jaroslav Opatrny, Ladislav Stacho, Jorge Urrutia, Mohammadreza Yazdani |
On Minimizing the Maximum Sensor Movement for Barrier Coverage of a Line Segment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADHOC-NOW ![In: Ad-Hoc, Mobile and Wireless Networks, 8th International Conference, ADHOC-NOW 2009, Murcia, Spain, September 22-25, 2009, Proceedings, pp. 194-212, 2009, Springer, 978-3-642-04382-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Intruder, Optimal Movement, Sensors, NP-complete, Coverage, Detection, PTAS, Barrier, Line Segment |
42 | Paola Flocchini, Amiya Nayak, Arno Schulz |
Cleaning an Arbitrary Regular Network with Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, Second International Conference, ICDCIT 2005, Bhubaneswar, India, December 22-24, 2005, Proceedings, pp. 132-142, 2005, Springer, 3-540-30999-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Intruder Capture, Mobile Agents, Mesh, Graph Search |
42 | Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas |
Specifying electronic voting protocols in typed MSR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, November 7, 2005, pp. 35-39, 2005, ACM, 1-59593-228-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Dolev-Yao intruder, typed MSR, privacy, specification, security protocols, electronic voting |
42 | Kymie M. C. Tan, Blair R. Collie |
Detection and Classification of TCP/IP Network Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 99-107, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
TCP/IP network service classification, computer intruders, remote terminal software, undetectable access, system audit, intruder activity detection, unauthorised network services, network connection signature, neural network, learning, monitoring, experiment, transport protocols, data security, network traffic, generalisation, Australia, law enforcement |
41 | Gitae Kim, Tony J. Bogovic, Dana Chee |
ACtive edge-Tagging (ACT): An Intruder Identification & Isolation Scheme in Active Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 3-5 July 2001, Hammamet, Tunisia, pp. 29-34, 2001, IEEE Computer Society, 0-7695-1177-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Intruder Identification & Isolation, Distributed Denial of Service (DDoS) Attacks, Active (or Programmable) Networks, Network Security, Traffic Monitoring |
41 | Rimvydas Ruksenas, Paul Curzon, Ann Blandford |
Modelling and analysing cognitive causes of security breaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Innov. Syst. Softw. Eng. ![In: Innov. Syst. Softw. Eng. 4(2), pp. 143-160, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security, Formal verification, Human error, Cognitive architecture, SAL |
41 | Tiago Sak, Jacques Wainer, Siome Klein Goldenstein |
Probabilistic Multiagent Patrolling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBIA ![In: Advances in Artificial Intelligence - SBIA 2008, 19th Brazilian Symposium on Artificial Intelligence, Savador, Brazil, October 26-30, 2008. Proceedings, pp. 124-133, 2008, Springer, 978-3-540-88189-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani |
An NP Decision Procedure for Protocol Insecurity with XOR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LICS ![In: 18th IEEE Symposium on Logic in Computer Science (LICS 2003), 22-25 June 2003, Ottawa, Canada, Proceedings, pp. 261-270, 2003, IEEE Computer Society, 0-7695-1884-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
41 | James Heather, Steve A. Schneider |
Equal To The Task? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings, pp. 162-177, 2002, Springer, 3-540-44345-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
inequality tests, formal methods in security, RSA, cryptographic protocols, security models, rank functions, data independence, security verification, strand spaces |
41 | Lawrence H. Ozarow, Aaron D. Wyner |
Wire-Tap Channel II. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology: Proceedings of EUROCRYPT 84, A Workshop on the Theory and Application of of Cryptographic Techniques, Paris, France, April 9-11, 1984, Proceedings, pp. 33-50, 1984, Springer, 3-540-16076-0. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
39 | Sergio de Oliveira, Hao Chi Wong, José Marcos S. Nogueira |
NEKAP: Intruder Resilient and Energy Efficient Key Establishment in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 16th International Conference on Computer Communications and Networks, IEEE ICCCN 2007, Turtle Bay Resort, Honolulu, Hawaii, USA, August 13-16, 2007, pp. 803-808, 2007, IEEE, 978-1-4244-1251-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | David A. Basin, Sebastian Mödersheim, Luca Viganò 0001 |
Algebraic Intruder Deductions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LPAR ![In: Logic for Programming, Artificial Intelligence, and Reasoning, 12th International Conference, LPAR 2005, Montego Bay, Jamaica, December 2-6, 2005, Proceedings, pp. 549-564, 2005, Springer, 3-540-30553-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Hubert Comon-Lundh |
Intruder Theories (Ongoing Work). ![Search on Bibsonomy](Pics/bibsonomy.png) |
FoSSaCS ![In: Foundations of Software Science and Computation Structures, 7th International Conference, FOSSACS 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2004, Barcelona, Spain, March 29 - April 2, 2004, Proceedings, pp. 1-4, 2004, Springer, 3-540-21298-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Hubert Comon-Lundh, Vitaly Shmatikov |
Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LICS ![In: 18th IEEE Symposium on Logic in Computer Science (LICS 2003), 22-25 June 2003, Ottawa, Canada, Proceedings, pp. 271-, 2003, IEEE Computer Society, 0-7695-1884-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
39 | Dongxi Liu, Xiaoyong Li, Yingcai Bai |
An Intelligent Intruder Model for Security Protocol Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001, pp. 13-22, 2001, Springer, 3-540-42880-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
38 | Shivam Kainth, Subham Sahoo, Rajtilak Pal, Shashi Shekhar Jha |
Chasing the Intruder: A Reinforcement Learning Approach for Tracking Intruder Drones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.05070, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
30 | Siva Anantharaman, Hai Lin 0005, Christopher Lynch, Paliath Narendran, Michaël Rusinowitch |
Cap unification: application to protocol security modulo homomorphic encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 192-203, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
secrecy analysis, protocol, rewriting, unification |
30 | Navid Imani, Hamid Sarbazi-Azad, Albert Y. Zomaya, Paria Moinzadeh |
Detecting Threats in Star Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 20(4), pp. 474-483, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Bijan Soleymani, Muthucumaru Maheswaran |
Social Authentication Protocol for Mobile Phones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (4) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 436-441, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Sebastian Mödersheim, Luca Viganò 0001 |
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures, pp. 166-194, 2009, Springer, 978-3-642-03828-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani |
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Log. ![In: ACM Trans. Comput. Log. 9(4), pp. 24:1-24:52, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Diffie-Hellman exponentiation, Dolev-Yao model, complexity, protocols, Algebraic properties |
30 | Xuehou Tan, Bo Jiang 0004 |
Searching a Polygonal Region by Two Guards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 23(5), pp. 728-739, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
polygon search problem, two-guard problem, robotics, computational geometry, visibility |
30 | Assane Gueye, Jean C. Walrand |
Security in networks: A game-theoretic approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDC ![In: Proceedings of the 47th IEEE Conference on Decision and Control, CDC 2008, December 9-11, 2008, Cancún, Mexico, pp. 829-834, 2008, IEEE, 978-1-4244-3123-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis |
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007., pp. 238-251, 2007, Springer, 978-3-540-75100-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
intrusion attacks, e-commerce protocols, model checking, SPIN |
30 | Siva Anantharaman, Paliath Narendran, Michaël Rusinowitch |
Intruders with Caps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTA ![In: Term Rewriting and Applications, 18th International Conference, RTA 2007, Paris, France, June 26-28, 2007, Proceedings, pp. 20-35, 2007, Springer, 978-3-540-73447-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Damas P. Gruska |
Information-Flow Attacks Based on Limited Observations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ershov Memorial Conference ![In: Perspectives of Systems Informatics, 6th International Andrei Ershov Memorial Conference, PSI 2006, Novosibirsk, Russia, June 27-30, 2006. Revised Papers, pp. 223-234, 2006, Springer, 978-3-540-70880-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
process algebras, information flow, timing attacks |
30 | Olivier Dousse, Christina Tavoularis, Patrick Thiran |
Delay of intrusion detection in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHoc ![In: Proceedings of the 7th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2006, Florence, Italy, May 22-25, 2006, pp. 155-165, 2006, ACM, 1-59593-368-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
sensor networks, intrusion detection, delay, percolation |
30 | Mark Moors, Dirk Schulz 0001 |
Improved Markov Models for Indoor Surveillance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2006, October 9-15, 2006, Beijing, China, pp. 4072-4077, 2006, IEEE, 1-4244-0258-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Giovanni Di Crescenzo, Richard J. Lipton, Shabsi Walfish |
Perfectly Secure Password Protocols in the Bounded Retrieval Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings, pp. 225-244, 2006, Springer, 3-540-32731-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Vaibhav Mehta, Constantinos Bartzis, Haifeng Zhu 0001, Edmund M. Clarke, Jeannette M. Wing |
Ranking Attack Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings, pp. 127-144, 2006, Springer, 3-540-39723-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Google PageRank, Model Checking, security metric, Attack Graph, Attack Model |
30 | S. Prasanna, V. Vetri Selvi |
An Improved Intrusion Detection Technique for Mobile Adhoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, Second International Conference, ICDCIT 2005, Bhubaneswar, India, December 22-24, 2005, Proceedings, pp. 364-376, 2005, Springer, 3-540-30999-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Ping Yi, YiPing Zhong, Shiyong Zhang |
Applying Mobile Agent to Intrusion Response for Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (2) ![In: Computational Science - ICCS 2005, 5th International Conference, Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part II, pp. 593-600, 2005, Springer, 3-540-26043-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Jae-Ha Lee, Sang-Min Park, Kyung-Yong Chwa |
Equivalence of Search Capability Among Mobile Guards with Various Visibilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESA ![In: Algorithms - ESA 2004, 12th Annual European Symposium, Bergen, Norway, September 14-17, 2004, Proceedings, pp. 484-495, 2004, Springer, 3-540-23025-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Yongjian Li, Rui Xue |
Using SPIN to Model Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (2) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 741-745, 2004, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Catherine Meadows 0001 |
A Procedure for Verifying Security Against Type Confusion Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June - 2 July 2003, Pacific Grove, CA, USA, pp. 62-, 2003, IEEE Computer Society, 0-7695-1927-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Hui-Feng Huang, Chin-Chen Chang 0001 |
An Efficient Convertible Authenticated Encryption Scheme and Its Variant. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings, pp. 382-392, 2003, Springer, 3-540-20150-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Somesh Jha, Oleg Sheyner, Jeannette M. Wing |
Two Formal Analys s of Attack Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada, pp. 49-63, 2002, IEEE Computer Society, 0-7695-1689-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
30 | Kenji Masui, Masahiko Tomoishi, Naoki Yonezaki |
Design of UNIX System for the Prevention of Damage Propagation by Intrusion and Its Implementation Based on 4.4BSD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings, pp. 536-553, 2001, Springer, 3-540-42662-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
30 | Xuehou Tan |
Efficient Algorithms for Searching a Polygonal Room with a Door. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCDCG ![In: Discrete and Computational Geometry, Japanese Conference, JCDCG 2000, Tokyo, Japan, November, 22-25, 2000, Revised Papers, pp. 339-350, 2000, Springer, 3-540-42306-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
29 | Hernando Fernandez-Canque, Sorin Hintea, John Freer, Ali Ahmadinia |
Machine Vision Application to Automatic Intruder Detection Using CCTV. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based and Intelligent Information and Engineering Systems, 13th International Conference, KES 2009, Santiago, Chile, September 28-30, 2009, Proceedings, Part II, pp. 498-505, 2009, Springer, 978-3-642-04591-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
CCTV, human posture recognition, image processing, Machine vision |
29 | ChingSeong Tan, Aryuanto Soetedjo |
Feasibility Study on An Automated Intruder Detection for Tropical Fish Farm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAM ![In: 2008 IEEE Conference on Robotics, Automation and Mechatronics, RAM 2008, 21-24 September 2008, Chengdu, China, pp. 1018-1021, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Stijn B. J. Van Dam, Max Mulder, M. M. van Paassen |
Airborne self-separation display with turn dynamics and intruder intent-information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Montréal, Canada, 7-10 October 2007, pp. 1445-1451, 2007, IEEE, 978-1-4244-0990-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Vincent Bernat, Hubert Comon-Lundh |
Normal Proofs in Intruder Theories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers, pp. 151-166, 2006, Springer, 978-3-540-77504-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Pascal Lafourcade 0001, Denis Lugiez, Ralf Treinen |
Intruder Deduction for AC-Like Equational Theories with Homomorphisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTA ![In: Term Rewriting and Applications, 16th International Conference, RTA 2005, Nara, Japan, April 19-21, 2005, Proceedings, pp. 308-322, 2005, Springer, 3-540-25596-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani, Laurent Vigneron |
Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSL ![In: Computer Science Logic, 17th International Workshop, CSL 2003, 12th Annual Conference of the EACSL, and 8th Kurt Gödel Colloquium, KGC 2003, Vienna, Austria, August 25-30, 2003, Proceedings, pp. 128-141, 2003, Springer, 3-540-40801-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Alwen Tiu, Jeremy E. Dawson |
Automating Open Bisimulation Checking for the Spi Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 23rd IEEE Computer Security Foundations Symposium, CSF 2010, Edinburgh, United Kingdom, July 17-19, 2010, pp. 307-321, 2010, IEEE Computer Society, 978-0-7695-4082-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
open bisimulation, symbolic trace analysis, intruder deduction, spi-calculus |
22 | Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas |
Specifying and implementing privacy-preserving cryptographic protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 7(6), pp. 395-420, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Specification of Security Protocols, Dolev-Yao Intruder, Security-typed language, Typed MSR, Jif, Privacy, Linkability |
22 | Yuliy M. Baryshnikov, Edward G. Coffman Jr., Kyung Joon Kwak |
High Performance Sleep-Wake Sensor Systems Based on Cyclic Cellular Automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks, IPSN 2008, St. Louis, Missouri, USA, April 22-24, 2008, pp. 517-526, 2008, IEEE Computer Society, 978-0-7695-3157-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
intruder detection, cyclic cellular automata, self-organizing, Sleep schedule |
22 | Youssef Hanna, Hridesh Rajan, Wensheng Zhang 0001 |
Slede: a domain-specific verification framework for sensor network security protocol implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008, pp. 109-118, 2008, ACM, 978-1-59593-814-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
intruder generation, sensor networks, model checking, security protocols |
22 | Paola Flocchini, Amiya Nayak, Arno Schulz |
Decontamination of Arbitrary Networks using a Team of Mobile Agents with Limited Visibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 11-13 July 2007, Melbourne, Australia, pp. 469-474, 2007, IEEE Computer Society, 0-7695-2841-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Network Decontamination, Intruder Capture, Mobile Agents |
22 | Tarak Gandhi, Mohan M. Trivedi |
Motion analysis for event detection and tracking with a mobile omnidirectional camera. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 10(2), pp. 131-143, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Intruder detection, Mobile robots, Optical flow, Surveillance, Motion detection, Dynamic vision, Panoramic vision |
20 | Fida Kamal Dankar, Khaled El Emam |
A method for evaluating marketer re-identification risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT/ICDT Workshops ![In: Proceedings of the 2010 EDBT/ICDT Workshops, Lausanne, Switzerland, March 22-26, 2010, 2010, ACM, 978-1-60558-990-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
identity disclosure, re-identification risk, privacy, disclosure control |
20 | Boting Yang, Yi Cao |
Standard directed search strategies and their applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comb. Optim. ![In: J. Comb. Optim. 17(4), pp. 378-399, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Oriented grids, Pursuit-evasion problem, Digraph, Directed search |
20 | Binay K. Bhattacharya, Tsunehiko Kameda, John Z. Zhang |
Surveillance of a polygonal area by a mobile searcher from the boundary: Searchability testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICRA ![In: 2009 IEEE International Conference on Robotics and Automation, ICRA 2009, Kobe, Japan, May 12-17, 2009, pp. 2461-2466, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Jan Platos, Václav Snásel, Pavel Krömer, Ajith Abraham |
Detecting Insider Attacks Using Non-negative Matrix Factorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 693-696, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Bo Jiang 0004, Xuehou Tan |
Searching a Circular Corridor with Two Flashlights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TAMC ![In: Theory and Applications of Models of Computation, 6th Annual Conference, TAMC 2009, Changsha, China, May 18-22, 2009. Proceedings, pp. 345-359, 2009, Springer, 978-3-642-02016-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Adnan Nadeem, Michael P. Howarth |
Adaptive intrusion detection & prevention of denial of service attacks in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009, pp. 926-930, 2009, ACM, 978-1-60558-569-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
intrusion detection & prevention, ad-hoc network security |
20 | Bogdan Groza, Marius Minea |
A Calculus to Detect Guessing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 59-67, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Rohit Chadha, Stéphanie Delaune, Steve Kremer |
Epistemic Logic for the Applied Pi Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMOODS/FORTE ![In: Formal Techniques for Distributed Systems, Joint 11th IFIP WG 6.1 International Conference FMOODS 2009 and 29th IFIP WG 6.1 International Conference FORTE 2009, Lisboa, Portugal, June 9-12, 2009. Proceedings, pp. 182-197, 2009, Springer, 978-3-642-02137-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Nicola Basilico, Nicola Gatti 0001, Francesco Amigoni |
Leader-follower strategies for robotic patrolling in environments with arbitrary topologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS (1) ![In: 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), Budapest, Hungary, May 10-15, 2009, Volume 1, pp. 57-64, 2009, IFAAMAS, 978-0-9817381-6-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
leader-follower strategies, robotic patrolling |
20 | Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano |
Efficient representation of the attacker's knowledge in cryptographic protocols analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects Comput. ![In: Formal Aspects Comput. 20(3), pp. 303-348, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Knowledge representation, Cryptographic protocols, State space exploration |
20 | Stephen Kloder, Seth Hutchinson 0001 |
Partial barrier coverage: Using game theory to optimize probability of undetected intrusion in polygonal environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICRA ![In: 2008 IEEE International Conference on Robotics and Automation, ICRA 2008, May 19-23, 2008, Pasadena, California, USA, pp. 2671-2676, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | YuanYuan Li, Lynne E. Parker |
Detecting and monitoring time-related abnormal events using a wireless sensor network and mobile robot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: 2008 IEEE/RSJ International Conference on Intelligent Robots and Systems, September 22-26, 2008, Acropolis Convention Center, Nice, France, pp. 3292-3298, 2008, IEEE, 978-1-4244-2057-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Aaron Hunter 0001 |
Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an Adversary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroISI ![In: Intelligence and Security Informatics, First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings, pp. 61-72, 2008, Springer, 978-3-540-89899-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | John Z. Zhang, Tsunehiko Kameda |
A Linear-Time Algorithm for Finding All Door Locations That Make a Room Searchable. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TAMC ![In: Theory and Applications of Models of Computation, 5th International Conference, TAMC 2008, Xi'an, China, April 25-29, 2008. Proceedings, pp. 502-513, 2008, Springer, 978-3-540-79227-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Michael J. Ocean, Azer Bestavros |
Wireless and physical security via embedded sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008, pp. 131-139, 2008, ACM, 978-1-59593-814-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
sensor networks, intrusion detection, wireless, physical security |
20 | Xuehou Tan |
Searching a Polygonal Region by Two Guards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TAMC ![In: Theory and Applications of Models of Computation, 4th International Conference, TAMC 2007, Shanghai, China, May 22-25, 2007, Proceedings, pp. 262-273, 2007, Springer, 978-3-540-72503-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Vivek K. Singh 0001, Mohan S. Kankanhalli |
Towards Adversary Aware Surveillance Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, July 2-5, 2007, Beijing, China, pp. 2038-2041, 2007, IEEE Computer Society, 1-4244-1017-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Oscar García Morchon, Heribert Baldus, Tobias Heer, Klaus Wehrle |
Cooperative security in distributed sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing, White Plains, New York, USA, November 12-15, 2007, pp. 96-105, 2007, IEEE Computer Society / ICST, 1-4244-1317-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Yannick Chevalier, Mounira Kourjieh |
Key Substitution in the Symbolic Analysis of Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSTTCS ![In: FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science, 27th International Conference, New Delhi, India, December 12-14, 2007, Proceedings, pp. 121-132, 2007, Springer, 978-3-540-77049-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Guoqiang Shu, David Lee 0001 |
Message Confidentiality Testing of Security Protocols - Passive Monitoring and Active Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TestCom ![In: Testing of Communicating Systems, 18th IFIP TC6/WG6.1 International Conference, TestCom 2006, New York, NY, USA, May 16-18, 2006, Proceedings, pp. 357-372, 2006, Springer, 3-540-34184-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Yohan Boichut, Pierre-Cyrille Héam, Olga Kouchnarenko |
Handling Algebraic Properties in Automatic Analysis of Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTAC ![In: Theoretical Aspects of Computing - ICTAC 2006, Third International Colloquium, Tunis, Tunisia, November 20-24, 2006, Proceedings, pp. 153-167, 2006, Springer, 3-540-48815-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Andrew D. Gordon 0001 |
Provable Implementations of Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LICS ![In: 21th IEEE Symposium on Logic in Computer Science (LICS 2006), 12-15 August 2006, Seattle, WA, USA, Proceedings, pp. 345-346, 2006, IEEE Computer Society, 0-7695-2631-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Giorgio Delzanno, Javier Esparza, Jirí Srba |
Monotonic Set-Extended Prefix Rewriting and Verification of Recursive Ping-Pong Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATVA ![In: Automated Technology for Verification and Analysis, 4th International Symposium, ATVA 2006, Beijing, China, October 23-26, 2006., pp. 415-429, 2006, Springer, 3-540-47237-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Satoshi Kawabata, Shinsaku Hiura, Kosuke Sato |
Real-Time Detection of Anomalous Objects in Dynamic Scene. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR (3) ![In: 18th International Conference on Pattern Recognition (ICPR 2006), 20-24 August 2006, Hong Kong, China, pp. 1171-1174, 2006, IEEE Computer Society, 0-7695-2521-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Urs Hengartner, Peter Steenkiste |
Securing Information Gateways with Derivation-Constrained Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, pp. 181-195, 2006, Springer, 3-540-33376-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|