The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Secure with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1970-1976 (16) 1977-1978 (16) 1979 (15) 1980-1981 (19) 1982-1983 (29) 1984 (34) 1985 (34) 1986 (23) 1987 (40) 1988 (49) 1989 (70) 1990 (84) 1991 (65) 1992 (80) 1993 (90) 1994 (113) 1995 (91) 1996 (177) 1997 (182) 1998 (287) 1999 (365) 2000 (389) 2001 (556) 2002 (688) 2003 (949) 2004 (1291) 2005 (1751) 2006 (2029) 2007 (2179) 2008 (2159) 2009 (2046) 2010 (1416) 2011 (1672) 2012 (1552) 2013 (1840) 2014 (1836) 2015 (2324) 2016 (2333) 2017 (2745) 2018 (3002) 2019 (3155) 2020 (3262) 2021 (3436) 2022 (3509) 2023 (3638) 2024 (875)
Publication types (Num. hits)
article(21303) book(77) data(3) incollection(392) inproceedings(29814) phdthesis(766) proceedings(156)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 14395 occurrences of 3839 keywords

Results
Found 52511 publication records. Showing 52511 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
61Di Ma, Gene Tsudik A new approach to secure logging. Search on Bibsonomy ACM Trans. Storage The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Secure logging, forward secure sequential aggregate (FssAgg) authentication, forward-secure stream integrity, MACs, signatures, truncation attack
53Guang-Huei Chiou, Wen-Tsuen Chen Secure Broadcasting Using the Secure Lock. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF secure broadcasting protocols, secret key minimization, secure broadcasting, secure lock, deciphering operation, private-key cryptosystem, cryptography, protocols, broadcasting, public-key cryptosystem, Chinese Remainder theorem, satellite, telecommunication channels, session key, radio, broadcast channels, secret keys, ciphertext
48Sungwoo Tak, Eun Kyo Park A Software Framework for Non-Repudiation Service based on Adaptive Secure Methodology in Electronic Commerce. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security software framework, electronic commerce (e-commerce), adaptive secure methodology, non-repudiation
45Zhenyu Hu, JianChun Jiang, Fuchun Sun 0001 Using IND-CVA for constructing secure communication. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF integrity, authenticated encryption, semantic security, universally composable security, secure channel
45Di Ma, Gene Tsudik A New Approach to Secure Logging. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF secure logging, forward secure stream integrity, MACs, signatures, truncation attack
45Panagiotis Papadimitratos, Zygmunt J. Haas Secure data transmission in mobile ad hoc networks. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF MANET security, secure message transmission, secure routing, multi-path routing, secure routing protocol
45Thomas F. Keefe, Wei-Tek Tsai A multiversion transaction scheduler for centralized multilevel secure database systems. Search on Bibsonomy HASE The full citation details ... 1996 DBLP  DOI  BibTeX  RDF multiversion transaction scheduler, centralized multilevel secure database systems, multilevel secure database management systems, MLS/DBMSs, secure multiversion scheduling protocol, serializable schedules, MLS noninterference assertions, timestamp generation, concurrency, concurrency control, transactions, correctness, contention, failure, covert channels, data access, abstract model, concurrent execution, multiple versions
44Peishun Wang, Huaxiong Wang, Josef Pieprzyk Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data. Search on Bibsonomy Secure Data Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Common secure index, Paillier’s cryptosystem, search on encrypted data
42Dong-Hong Xu, Yong Qi, Di Hou, Gong-Zhen Wang, Ying Chen 0004 An Improved Calculus for Secure Dynamic Services Composition. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Global calculus, Web services composition, Orchestration, Choreography, Spi calculus
41Jae-Deok Lim, Joon-Suk Yu, Jeong-Nyeo Kim A study of the method of providing secure network channel among secure OSs. Search on Bibsonomy ISICT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
39Soumyadeb Mitra, Marianne Winslett Secure deletion from inverted indexes on compliance storage. Search on Bibsonomy StorageSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secure deletion, inverted index, regulatory compliance
39Vu Dong Tô, Reihaneh Safavi-Naini, Yejing Wang A 2-Secure Code with Efficient Tracing Algorithm. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF frameproof codes, secure codes, secure frameproof codes, traceability codes, fingerprinting codes
39Rohit Valia, Yahya Y. Al-Salqan Secure Workflow Environment. Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF administrative data processing, secure workflow environment, workflow management products, geographical distribution, platform-independent environment, group-oriented virtual private network, write once, run anywhere paradigm, Internet, heterogeneity, portability, public-key encryption, future, Java language, Secure Sockets Layer
39Mark Moriconi, Xiaolei Qian, Robert A. Riemenschneider, Li Gong Secure Software Architectures. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF secure software architectures, open architectural standards, competitive success, secure system design, X/Open distributed transaction processing reference architecture, secure access control, Bell-LaPadula model, formal methods, authorisation, security properties, computer industry
37Manjinder Singh, Sarabjit Singh Network Security (Security in Large Networks). Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF secure broadcasting, secure communication channel, legal receiving principals, secure broadcasting protocol, broadcast packet size, cryptography, cryptography, protocols, network security, broadcasting, computer networks, computer networks, packet switching, telecommunication security, decrypting, large networks, packet transmission, encryption algorithm
36Shafi Goldwasser, Yehuda Lindell Secure Multi-Party Computation without Agreement. Search on Bibsonomy J. Cryptol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Broadcast, Secure multi-party computation, Protocol composition
36Stephen S. Yau, Xinyu Zhang A Middleware Service for Secure Group Communication in Mobile Ad Hoc Networks. Search on Bibsonomy COMPSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF context-sensitive middleware, ubiquitous computing, mobile ad hoc networks, distributed applications, Secure group communication, middleware service
36Shailesh Vaya Brief announcement: realizing secure multiparty computation on incomplete networks. Search on Bibsonomy PODC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF almost everywhere secure computation, hybrid argument, simulation paradigm, unconditional secure multiparty computation
36Yuan Tian 0036, Hao Zhang GUC-Secure Set-Intersection Computation. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Secure Set-Intersection Computation, Anonymous Identity-based Encryption, Generalized Universally Composable Security, Secure Multiparty Computation
36Christopher Dilloway, Gavin Lowe Specifying Secure Transport Channels. Search on Bibsonomy CSF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Confidentiality and authentication, Secure transport layers, Specification, Security protocols, Secure channels
36Jaideep Vaidya, Chris Clifton Leveraging the "Multi" in secure multi-party computation. Search on Bibsonomy WPES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF secure distributed computation, privacy, secure multi-party computation
36Lakshminath R. Dondeti, Sarit Mukherjee, Ashok Samal DISEC: A Distributed Framework for Scalable Secure Many-to-Many Communication. Search on Bibsonomy ISCC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF distributed group key management, many-to-many secure multicasting, secure group communication, Multicast security
36Christian Labonté, Sampalli Srinivas Group Management Strategies for Secure Multicasting on Active Virtual Private Networks. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF multicast group management, active virtual private networks, message integrity, message privacy, Secure Active VPN Environment, SAVE project, Dalhousie University, authentication, cryptography, cryptography, multicasting, transport protocols, network architecture, multicast communication, message authentication, IP multicast, telecommunication networks, telecommunication security, secure multicasting, business communication, telecommunication network management
36Sarvar Patel Number Theoretic Attacks on Secure Password Schemes. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF number theoretic attacks, secure password schemes, Encrypted Key Exchange, EKE, authenticated information exchange, insecure network, secret key cryptography, randomized confounders, RSA version, half encrypted versions, Direct Authentication Protocol, Secret Public Key Protocol versions, secure protocols, message authentication, dictionary attacks, active attacks, password guessing attacks
35Navdeep Kaur, Rajwinder Singh, Anil Kumar Sarje, Manoj Misra Performance Evaluation of Secure Concurrency Control Algorithm for Multilevel Secure Distributed Database Systems. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Distributed database, concurrency control, covert channel, multilevel secure database system
34Simon N. Foley Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF secure canonical upgrade policies, multilevel secure object stores, multilevel relabel policies, high-level subjects, low-level security labels, message filter model, object-oriented database, security of data
34Leon Pan, Chang N. Zhang A criterion-based multilayer access control approach for multimedia applications and the implementation considerations. Search on Bibsonomy ACM Trans. Multim. Comput. Commun. Appl. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Multilayer access control, secure object, secure permission, secure user, security criterion
33Danny Harnik, Yuval Ishai, Eyal Kushilevitz, Jesper Buus Nielsen OT-Combiners via Secure Computation. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Vijay Sundaresan, Srividhya Rammohan, Ranga Vemuri Power invariant secure IC design methodology using reduced complementary dynamic and differential logic. Search on Bibsonomy VLSI-SoC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Jin Li 0002, Yuen-Yan Chan, Yanming Wang A Generic Construction of Secure Signatures Without Random Oracles. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Weak Chosen Message Attack, Signature, Standard Model
33Lan Ma, Zhijun Wu 0001, Yun Hu, Wei Yang An Information-Hiding Model for Secure Communication. Search on Bibsonomy ICIC (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Information hiding model, Security, Steganography, Speech, Secure communication
33Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang Secure information sharing enabled by Trusted Computing and PEI models. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF PEI models, secure information sharing, access control, authorization, trusted computing, security framework
33Mohammed Assora, Ayoub Shirvani Enhancing the Security and Efficiency of 3-D Secure. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 3-D Secure, password based authentication and key exchange, online transaction security, SSL/TLS
33Luciano Bononi, Carlo Tacconi A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Secure Clustering and Routing, Statistically Unique and Cryptographically Verifiable Identifiers, Mobile Ad Hoc Networks, Intrusion Detection System
33Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin On 2-Round Secure Multiparty Computation. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF lower bounds, Secure multiparty computation, round complexity
33Hirofumi Muratani A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience. Search on Bibsonomy Information Hiding The full citation details ... 2001 DBLP  DOI  BibTeX  RDF c-secure code, digital watermarking, fingerprinting, error correction, Chinese Remainder Theorem, collusion attack
33Aris Zakinthinos, E. Stewart Lee How and why feedback composition fails [secure systems]. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF feedback composition, generalized noninterference, secure components, n-forward correctability, system designer, security of data, composability, necessary and sufficient conditions, restrictiveness
33Martin S. Olivier, Sebastiaan H. von Solms A Taxonomy for Secure Object-Oriented Databases. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF multilevel secure databases, object-orientation, information security, formal security models
33Mohammad Hossain Heydari, Linda Morales, Ivan Hal Sudborough Efficient Algorithms for Batch Re-Keying Operations in Secure Multicast. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secure multicast re-keying multicasting, tree-based system, re-key complexity, batch re-keying, security, group key management, Secure multicast
33M. V. N. Ashwin Kumar, Pranava R. Goundan, K. Srinathan, C. Pandu Rangan On perfectly secure cmmunication over arbitrary networks. Search on Bibsonomy PODC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF adversary structures, secure communication, information-theoretic security, secure multiparty computation
33Ioannis Ioannidis, Ananth Grama, Mikhail J. Atallah A Secure Protocol for Computing Dot-Products in Clustered and Distributed Environments. Search on Bibsonomy ICPP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Secure dot-products, Application-level security protocols, Distributed secure computations
33Kuen-Pin Wu, Shanq-Jang Ruan, Feipei Lai, Chih-Kuang Tseng On Key Distribution in Secure Multicasting. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF video-conferencing systems, authorized recipients, message encryption, secure filter, cryptography, distributed processing, key distribution, teleconferencing, multicast communication, distributed environment, telecommunication security, secure multicasting, group key, pay per view
33Lakshminath R. Dondeti, Ashok Samal, Sarit Mukherjee A Dual Encryption Protocol for Scalable Secure Multicasting. Search on Bibsonomy ISCC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Scalable Key Distribution Dual Encryption, Secure Group Communication, Secure Multicasting
33P. Venkat Rangan Trust Requirements and Performance of a Fast Subtransprot-Level Protocol for Secure Communication. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF trust requirements, fast subtransport-level protocol, authenticated datagram protocol, host-to-host secure channels, agent-to-agent channels, average latency, performance, protocols, data integrity, Ethernet, security of data, secure communication, Sun workstations, maximum throughput
33Abdessamad Imine, Asma Cherif 0001, Michaël Rusinowitch A Flexible Access Control Model for Distributed Collaborative Editors. Search on Bibsonomy Secure Data Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Secure Data Management, Authorization and Access Control, Collaborative Editing Systems
33Yuval Ishai, Eyal Kushilevitz Randomizing Polynomials: A New Representation with Applications to Round-Efficient Secure Computation. Search on Bibsonomy FOCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF randomizing polynomials, round-efficient secure computation, natural representation, degree-3 polynomials, round-efficient secure protocols, protocols, probability, Boolean functions, Boolean functions, communication complexity, communication complexity, polynomials, secure multi-party computation, branching program, low-degree polynomials
32Kihong Kim, Jinkeun Hong, Jongin Lim 0001 A Secure and Efficient Communication Resume Protocol for Secure Wireless Networks. Search on Bibsonomy DAIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Qi Mi, John A. Stankovic, Radu Stoleru Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF wireless sensor networks, key distribution, secure localization
31Zhenchao Zhu, Yuqing Zhang, Fengjiao Wang The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF provably secure, signcryption, Identity based cryptography
31Mohamed Shehab, Elisa Bertino, Arif Ghafoor SERAT: SEcure role mApping technique for decentralized secure interoperability. Search on Bibsonomy SACMAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF decentralized secure interoperability, path discovery, collaboration, role based access control, access path
31Ragib Hasan, Marianne Winslett, Radu Sion Requirements of Secure Storage Systems for Healthcare Records. Search on Bibsonomy Secure Data Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Kari Kostiainen, Jan-Erik Ekberg, N. Asokan, Aarne Rantala On-board credentials with open provisioning. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF provisioning protocols, trusted computing, credentials, secure hardware
31Payman Mohassel, Matthew K. Franklin Efficiency Tradeoffs for Malicious Two-Party Computation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Yao’s garbled circuit, malicious adversary, secure two-party computation, secure function evaluation
30Christoph Lucas, Dominik Raub, Ueli M. Maurer Hybrid-secure MPC: trading information-theoretic robustness for computational privacy. Search on Bibsonomy PODC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF hybrid security, party emulation, computational security, information-theoretic security, universal composability, multi-party computation
30N. R. Sunitha, B. B. Amberker Forward-Secure Multi-signatures. Search on Bibsonomy ICDCIT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Serial multi-signature, Parallel multi-signature, Digital Signature, Forward-Security, e-banking, ElGamal Signatures
30Hao Chen 0095, Ronald Cramer, Shafi Goldwasser, Robbert de Haan, Vinod Vaikuntanathan Secure Computation from Random Error Correcting Codes. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin The round complexity of verifiable secret sharing and secure multicast. Search on Bibsonomy STOC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
30Jan-Erik Ekberg, N. Asokan, Kari Kostiainen, Aarne Rantala Scheduling execution of credentials in constrained secure environments. Search on Bibsonomy STC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF onboard credentials, secure execution environments, trusted hardware, scheduling
30R. Aparna, B. B. Amberker Authenticated Secure Group Communication using Broadcast Encryption Key Computation. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Threshold, Broadcast encryption, Secure Group Communication, Secret key
30Hanping Lufei, Weisong Shi, Vipin Chaudhary Adaptive Secure Access to Remote Services. Search on Bibsonomy IEEE SCC (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure Access, Adaptation, Services
30Luciano Bononi, Carlo Tacconi Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Secure clustering and routing, Statistically unique and cryptographically verifiable identifiers, Mobile Ad Hoc and Vehicular Networks, Intrusion detection system
30Shejie Lu, Jun Li, Zhiyuan Liu, Guohua Cui A Secure Data Transmission Protocol for Mobile Ad Hoc Networks. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secure data transmission, malicious behavior judgment, Ad Hoc network, intrusion detection
30James Kempf, Jonathan Wood, Zulfikar Ramzan, Craig Gentry IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secure address proxy, SEND, multi-key cryptographically generated address, Mobile IPv6, ring signature
30Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank Black-box constructions for secure computation. Search on Bibsonomy STOC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF theory of cryptography, oblivious transfer, secure computation, black-box reductions
30Vince Grolmusz, Zoltán Király Generalized Secure Routerless Routing. Search on Bibsonomy ICN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF High speed optical networks, routerless routing, secure network protocols
30Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow Secure Hierarchical Identity Based Signature and Its Application. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Hierarchical identity-based signature, forward-secure signature, bilinear pairings
30Yehuda Lindell Bounded-concurrent secure two-party computation without setup assumptions. Search on Bibsonomy STOC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF secure computation, protocol composition
30Li Gong, Xiaolei Qian Computational Issues in Secure Interoperation. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF secure composability, algorithms, computational complexity, interoperability, Computer security, database systems
30Marianne Winslett, Kenneth P. Smith, Xiaolei Qian Formal Query Languages for Secure Relational Databases. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF multilevel secure databases, information security, formal security models
30Meng Yu 0001, Peng Liu 0005, Wanyu Zang, Sushil Jajodia Trusted Recovery. Search on Bibsonomy Secure Data Management in Decentralized Systems The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Juan Du 0006, Wei Wei, Xiaohui Gu, Ting Yu 0001 Towards secure dataflow processing in open distributed systems. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secure component composition, secure data processing, service oriented architecture, cloud computing
30Fergle D'Aubeterre, Lakshmi S. Iyer, Rahul Singh An empirical evaluation of information security awareness levels in designing secure business processes. Search on Bibsonomy DESRIST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secure business process, secure process design, situational awareness, design science, security awareness, information systems security
30Mohamed Shehab, Kamal Bhattacharya, Arif Ghafoor Web services discovery in secure collaboration environments. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Secure collaboration, encapsulated SOAP, private UDDI registries, secure access paths, protocols, services
30Dijiang Huang, Deep Medhi A key-chain-based keying scheme for many-to-many secure group communication. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF key chain, many-to-many secure group communication, secure group communication, Hash chain
30Naveen Sastry, Umesh Shankar, David A. Wagner 0001 Secure verification of location claims. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF secure location authentication, secure location verification, sensor networks
30Steven J. Ross, Jason L. Hill, Michael Y. Chen, Anthony D. Joseph, David E. Culler, Eric A. Brewer A Composable Framework for Secure Multi-Modal Access to Internet Services from Post-PC Devices. Search on Bibsonomy WMCSA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF secure multi-modal access, post-PC devices, public kiosks, cellular telephones, voice based vehicle telematics, infrastructure-based secure proxy architecture, security transformation functions, generic content, service-specific rules, untrusted public Internet access points, proxy transformations, unoptimized Java implementation, Internet, mobile computing, mobile devices, PDAs, latency, security of data, information access, information resources, telecommunication security, Internet services, reusable components
30P. C. Clark, M. C. Meissner, K. O. Vance Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF secure compartmented data access, untrusted network, COTS-based architecture, secure network computing architecture, application-level firewalls, DoD applications, software architecture, access control, electronic commerce, computer networks, authorisation, telecommunication security, electronic business, military computing, military applications, sensitive information, commercial-off-the-shelf products, sensitive data
30Vikram R. Pesati, Thomas E. Keefe, Shankar Pal The Design and Implementation of a Multilevel Secure Log Manager. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF data loggers, multilevel secure log manager, log management, flush latency, performance, system design, bandwidth, system implementation, security evaluation, multilevel secure database system
30Luigi Giuri, Pietro Iglio A Role-Based Secure Database Design Tool. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF role based secure database design tool, database design methodologies, secure database design methodology, entity relationship conceptual data model, role based security model, analysis algorithm, potential security design mistakes, translation procedure, SQL specification, conceptual model, entity-relationship modelling
28Suman Banerjee 0001, Arunesh Mishra MobiCom poster: secure spaces: location-based secure wireless group communication. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Gaesoon Ahn, B. Chang, Tai-Myung Chung Design of Secure Monitor in the Secure Zone Cooperation. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Miguel Angel García de Dios, Carolina Dania, David A. Basin, Manuel Clavel Model-Driven Development of a Secure eHealth Application. Search on Bibsonomy Engineering Secure Future Internet Services and Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Elda Paja, Fabiano Dalpiaz, Paolo Giorgini The Socio-technical Security Requirements Modelling Language for Secure Composite Services. Search on Bibsonomy Secure and Trustworthy Service Composition The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Achim D. Brucker, Luca Compagna, Pierre Guilleminot Compliance Validation of Secure Service Compositions. Search on Bibsonomy Secure and Trustworthy Service Composition The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Marianne Busch, Nora Koch, Martin Wirsing Evaluation of Engineering Approaches in the Secure Software Development Life Cycle. Search on Bibsonomy Engineering Secure Future Internet Services and Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28José Antonio Martín, Fabio Martinelli, Ilaria Matteucci, Ernesto Pimentel 0001, Mathieu Turuani On the Synthesis of Secure Services Composition. Search on Bibsonomy Engineering Secure Future Internet Services and Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Erkuden Rios, Francesco Malmignati, Eider Iturbe, Michela D'Errico, Mattia Salnitri From Consumer Requirements to Policies in Secure Services. Search on Bibsonomy Secure and Trustworthy Service Composition The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi 0001, Bo Zhou 0001 The Aniketos Service Composition Framework - Analysing and Ranking of Secure Services. Search on Bibsonomy Secure and Trustworthy Service Composition The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Konstantinos Markantonakis, Keith Mayes Errata to: Secure Smart Embedded Devices, Platforms and Applications. Search on Bibsonomy Secure Smart Embedded Devices, Platforms and Applications The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Konstantinos Markantonakis, Keith Mayes Errata to: Secure Smart Embedded Devices, Platforms and Applications. Search on Bibsonomy Secure Smart Embedded Devices, Platforms and Applications The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Yuval Ishai Randomization Techniques for Secure Computation. Search on Bibsonomy Secure Multi-Party Computation The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Gilad Asharov, Yehuda Lindell The BGW Protocol for Perfectly-Secure Multiparty Computation. Search on Bibsonomy Secure Multi-Party Computation The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Ueli Maurer, Vassilis Zikas Information-Theoretic Secure Multiparty Computation. Search on Bibsonomy Secure Multi-Party Computation The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Sahin Buyrukbilen, Spiridon Bakiras Secure Similar Document Detection with Simhash. Search on Bibsonomy Secure Data Management The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Jan Camenisch Research Challenges to Secure the Future Internet. Search on Bibsonomy Secure Data Management The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Stepan Kozak, David Novak, Pavel Zezula Secure Metric-Based Index for Similarity Cloud. Search on Bibsonomy Secure Data Management The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Chunwang Zhang, Junjie Jin, Ee-Chien Chang, Sharad Mehrotra Secure Quasi-Realtime Collaborative Editing over Low-Cost Storage Services. Search on Bibsonomy Secure Data Management The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Spiridon Bakiras, Konstantinos F. Nikolopoulos Adjusting the Trade-Off between Privacy Guarantees and Computational Cost in Secure Hardware PIR. Search on Bibsonomy Secure Data Management The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi A Comprehensive Framework for Secure Query Processing on Relational Data in the Cloud. Search on Bibsonomy Secure Data Management The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Nayot Poolsappasit, Vimal Kumar 0001, Sanjay Madria, Sriram Chellappan Challenges in Secure Sensor-Cloud Computing. Search on Bibsonomy Secure Data Management The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 52511 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license