|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 21 occurrences of 17 keywords
|
|
|
Results
Found 67 publication records. Showing 67 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
56 | Micah Sherr, Eric Cronin, Sandy Clark, Matt Blaze |
Signaling Vulnerabilities in Wiretapping Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(6), pp. 13-25, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
CALEA, FISA, Title III, privacy, signal processing, wiretap, wiretapping |
56 | Susan Landau 0001 |
Security, Wiretapping, and the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(6), pp. 26-33, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Communications Assistance for Law Enforcement Act (CALEA), security, VoIP, wiretapping |
48 | Shawn Lawson |
Subliminal wiretapping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Creativity & Cognition ![In: Proceedings of the 7th Conference on Creativity & Cognition, Berkeley, California, USA, October 26-30, 2009, pp. 429-430, 2009, ACM, 978-1-60558-865-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
automatic writing, listen, mind-matter, ouija, psyleron, random event generator, subtle, interactive, random number generator, reg, wiretap, rng |
48 | Greg Goth |
Internet Wiretapping Decision Headed for the Courts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 10(1), pp. 8-10, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
CALEA, Communications Assistance for Law Enforcement Act, VoIP, voice-over-IP, FCC |
31 | Joseph J. Schwerha |
Cybercrime: Legal Standards Governing the Collection of Digital Evidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 6(2), pp. 133-151, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Fourth Amendment, Patriot Act, Title III, ECPA, wiretapping |
26 | Yuanyu Zhang, Zhumeng Zheng, Ji He, Shuangrui Zhao, Qianyue Qu, Yulong Shen, Xiaohong Jiang 0001 |
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 22(12), pp. 9907-9922, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Ilias Dimitriadis, Dimitrios Panteleimon Giakatos, Stelios Karamanidis, Pavlos Sermpezis, Kelly Kiki, Athena Vakali |
Analyzing large scale political discussions on Twitter: the use case of the Greek wiretapping scandal (#ypoklopes). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.09819, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Bin Qiu, Wenchi Cheng, Wei Zhang 0001 |
Robust Multi-Beam Secure mmWave Wireless Communication for Hybrid Wiretapping Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 18, pp. 1393-1406, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Charles Robinson |
The Listeners: A History of Wiretapping in the United States - Bruce Hochman (Cambridge, MA, USA: Harvard Univ. Press, 2022, 366 pp.). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Technol. Soc. Mag. ![In: IEEE Technol. Soc. Mag. 42(4), pp. 24-26, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Daniel Spiekermann, Jörg Keller 0001 |
Wiretapping Pods and Nodes - Lawful Interception in Kubernetes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Commun. Eur. Assoc. Softw. Sci. Technol. ![In: Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 80, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Yuanyu Zhang, Zhumeng Zheng, Ji He, Shuangrui Zhao, Qianyue Qu, Yulong Shen, Xiaohong Jiang |
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2207.05383, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Yael Mathov, Tal Ben Senior, Asaf Shabtai, Yuval Elovici |
Stop bugging me! Evading modern-day wiretapping using adversarial perturbations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 121, pp. 102841, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Truc Thanh Tran |
Network-Coding-based Jamming With Triple Transmission Time Slots: A Method To Secure Transmission In An Extreme Case of Source-Wiretapping and Unshared Jamming Signal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Ind. Networks Intell. Syst. ![In: EAI Endorsed Trans. Ind. Networks Intell. Syst. 8(27), pp. e5, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Yuanyu Zhang, Ji He, Qianyue Qu, Zhiwei Zhang |
Wiretapping or Jamming: On Eavesdropper Attacking Strategy in mmWave Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NaNA ![In: 2021 International Conference on Networking and Network Applications, NaNA 2021, Lijiang City, China, October 29 - Nov. 1, 2021, pp. 8-14, 2021, IEEE, 978-1-6654-4158-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Tal Ben Senior, Yael Mathov, Asaf Shabtai, Yuval Elovici |
Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2010.12809, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
26 | Yizhi Zhao, Hongmei Chi |
Secure polar coding with delayed wiretapping information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Commun. ![In: IET Commun. 14(15), pp. 2564-2575, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Joseph Fitsanakis |
Redesigning Wiretapping - The Digitization of Communications Interception ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
DOI RDF |
|
26 | Satoshi Kosakatani, Tetsutaro Uehara, Songpon Teerakanok |
Japan's Act on Wiretapping for Criminal Investigation: How the system is implemented and how it should be. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-6, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Hui Chen 0008, Xiaofeng Tao, Na Li 0001, Yanzhao Hou, Jin Xu 0001, Zhu Han 0001 |
Secrecy Performance Analysis for Hybrid Wiretapping Systems Using Random Matrix Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 18(2), pp. 1101-1114, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Christoforos Ntantogian, Eleni Veroni, Georgios Karopoulos, Christos Xenakis |
A survey of voice and communication protection solutions against wiretapping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 77, pp. 163-178, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Karl-Ludwig Besser, Pin-Hsun Lin, Carsten R. Janda, Eduard A. Jorswieck |
Machine Learning Assisted Wiretapping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSSC ![In: 52nd Asilomar Conference on Signals, Systems, and Computers, ACSSC 2018, Pacific Grove, CA, USA, October 28-31, 2018, pp. 489-493, 2018, IEEE, 978-1-5386-9218-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Thomas Gabel, Philipp Klöppner, Eicke Godehardt, Alaa Tharwat |
Communication in Soccer Simulation: On the Use of Wiretapping Opponent Teams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RoboCup ![In: RoboCup 2018: Robot World Cup XXII [Montreal, QC, Canada, June 18-22, 2018]., pp. 3-15, 2018, Springer, 978-3-030-27543-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Dominik Schürmann, Fabian Kabus, Gregor Hildermeier, Lars C. Wolf |
Wiretapping End-to-End Encrypted VoIP Calls: Real-World Attacks on ZRTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2017(3), pp. 4, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Piotr Zawadzki |
Quantum Direct Communication Wiretapping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CN ![In: Computer Networks - 24th International Conference, CN 2017, Lądek Zdrój, Poland, June 20-23, 2017, Proceedings, pp. 287-294, 2017, Springer, 978-3-319-59766-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Linda M. Merola |
Talking about NSA Wiretapping and Guantanamo: A Systematic Examination the Language used by Different Networks to Report Post-9/11 Policy Dilemmas Concerning Rights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Signs Semiot. Syst. ![In: Int. J. Signs Semiot. Syst. 5(1), pp. 20-34, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Xiangmao Chang, Jin Wang 0009, Jianping Wang 0001, Kejie Lu, Yi Zhuang 0002 |
On the optimal design of secure network coding against wiretapping attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 99, pp. 82-98, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Shu Wang, Xinyu Da, Zhenyong Chu |
Wiretapping Strategies for Artificial Noise Assisted Communication in MU-MIMO wiretap channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 10(5), pp. 2166-2180, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Jing Huang, Bo Xi, Peng Li, Fan Zhang 0010, Xinjie Zhao 0001 |
一种基于量子密码的卫星网络窃听攻击检测方法 (Method for Detecting Wiretapping Attack in Satellite Network Based on Quantum Cryptography). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 43(7), pp. 157-161, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Truc Thanh Tran, Hyung Yun Kong |
A method enabling exploitation of spatial diversity and physical layer security in an extreme case of source-wiretapping without a jamming beamformer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Commun. Networks ![In: J. Commun. Networks 17(5), pp. 482-490, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Sang Quang Nguyen 0001, Hyung Yun Kong |
Binary Jamming Message Solutions for Source-Wiretapping Under Physical-Layer Security: Analysis and Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 84(4), pp. 2493-2512, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Mitch Monsour |
Surveillance or Security?: The Risks Posed by New Wiretapping Technologies, by Susan Landau. Cambridge, MA: MIT Press, 2013, 400 pp. $18.95 paper. ISBN 9780262518741 (paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Soc. ![In: Inf. Soc. 31(2), pp. 225-226, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Adam Bates 0001, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach |
Accountable wiretapping - or - I know they can hear you now. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 23(2), pp. 167-195, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Maliheh Shirvanian, Nitesh Saxena |
Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, pp. 868-879, 2014, ACM, 978-1-4503-2957-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Chia-Hao Lee, Li-Chung Lo, Wan-Jen Huang |
Precoder design for AF cooperative systems with multiple wiretapping relays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIT ![In: 14th International Symposium on Communications and Information Technologies, ISCIT 2014, Incheon, South Korea, September 24-26, 2014, pp. 223-227, 2014, IEEE, 978-1-4799-4416-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Xiaoxin Lv, Baihai Zhang |
Security Analysis and Evaluation of Random Linear Network coding under Wiretapping Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Inf. Manag. ![In: J. Digit. Inf. Manag. 11(6), pp. 446-452, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
26 | Steven M. Bellovin, Matt Blaze, Sandy Clark, Susan Landau 0001 |
Going Bright: Wiretapping without Weakening Communications Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 11(1), pp. 62-72, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Andrew Clement |
IXmaps - Tracking your personal data through the NSA's warrantless wiretapping sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISTAS ![In: Social Implications of Wearable Computing and Augmediated Reality in Everyday Life: 2013 IEEE International Symposium on Technology and Society, ISTAS 2013, Toronto, ON, Canada, 27-29 June, 2013, pp. 216-223, 2013, IEEE, 978-1-4799-1242-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Chang-Han Jong, Virgil D. Gligor |
Discovering records of private VoIP calls without wiretapping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 67-68, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Adam Bates 0001, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach |
Accountable Wiretapping -or- I know they can hear you now. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, February 5-8, 2012, 2012, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
26 | |
Wiretapping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 1391, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Joffrey Villard, Pablo Piantanida, Shlomo Shamai |
Secure Lossy Source-Channel Wiretapping with Side Information at the Receiving Terminals ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1105.4555, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
26 | Susan Landau 0001 |
Surveillance Or Security? The Risks Posed by New Wiretapping Technologies ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2011 |
RDF |
|
26 | Joffrey Villard, Pablo Piantanida, Shlomo Shamai |
Secure lossy source-channel wiretapping with side information at the receiving terminals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIT ![In: 2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011, St. Petersburg, Russia, July 31 - August 5, 2011, pp. 1141-1145, 2011, IEEE, 978-1-4577-0596-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Qin Guo, Mingxing Luo, Lixiang Li 0001, Yixian Yang |
Secure Network Coding against Wiretapping and Byzantine Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EURASIP J. Wirel. Commun. Netw. ![In: EURASIP J. Wirel. Commun. Netw. 2010, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Arwen Mullikin, Syed M. Rahman |
Ethical Dilemma of Governmental Wiretapping ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1011.6526, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
26 | Tao Cui, Tracey Ho, Jörg Kliewer |
On secure network coding with unequal link capacities and restricted wiretapping sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITW ![In: 2010 IEEE Information Theory Workshop, ITW 2010, Dublin, Ireland, August 30 - September 3, 2010, pp. 1-5, 2010, IEEE, 978-1-4244-8264-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Haris Aziz 0001, Oded Lachish, Mike Paterson, Rahul Savani |
Wiretapping a hidden network ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0909.5293, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
26 | Josh Karlin, Stephanie Forrest, Jennifer Rexford |
Nation-State Routing: Censorship, Wiretapping, and BGP ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0903.3218, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
26 | Haris Aziz 0001, Oded Lachish, Mike Paterson, Rahul Savani |
Wiretapping a Hidden Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WINE ![In: Internet and Network Economics, 5th International Workshop, WINE 2009, Rome, Italy, December 14-18, 2009. Proceedings, pp. 438-446, 2009, Springer, 978-3-642-10840-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | T. D. Wilson 0001 |
Review of: Diffie, Whitfield & Landau, S. Privacy on the line: the politics of wiretapping and encryption. Updated and expanded edition. Cambridge, MA: The MIT Press, 2007. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Res. ![In: Inf. Res. 13(1), 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
26 | Whitfield Diffie, Susan Landau 0001 |
Privacy on the line: the politics of wiretapping and encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGACT News ![In: SIGACT News 39(4), pp. 30-32, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Kim-Kwang Raymond Choo |
Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 51(6), pp. 744, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Mohammad Ravanbakhsh, Mehdi M. Hassanzadeh, Dag Haugland |
Wiretapping Based on Node Corruption over Secure Network Coding: Analysis and Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMCTA ![In: Coding Theory and Applications, Second International Castle Meeting, ICMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008. Proceedings, pp. 154-162, 2008, Springer, 978-3-540-87447-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Whitfield Diffie, Susan Landau 0001 |
Privacy on the line - the politics of wiretapping and encryption (updated expanded ed.). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2007 |
RDF |
|
26 | Kamal Jain |
Security based on network topology against the wiretapping attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Wirel. Commun. ![In: IEEE Wirel. Commun. 11(1), pp. 68-71, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Internet Architecture Board, Internet Engineering Steering Group |
IETF Policy on Wiretapping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2804, pp. 1-10, May 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Thomas A. Peters |
Privacy on the Line: The Politics of Wiretapping and Encryption, by Whitfield Diffie and Susan Landau. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Am. Soc. Inf. Sci. ![In: J. Am. Soc. Inf. Sci. 49(14), pp. 1339, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Marc Rotenberg |
Wiretapping Bill: Costly and Intrusive. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computerization and Controversy, 2nd Ed. ![In: Computerization and Controversy, 2nd Ed., pp. 664-668, 1996, Morgan Kaufmann / Elsevier, 978-0-12-415040-9. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
26 | David Kahn |
A Soviet Wiretapping Office. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptologia ![In: Cryptologia 13(2), pp. 190-191, 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
23 | Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau 0001, Peter G. Neumann, Jennifer Rexford |
Risking Communications Security: Potential Hazards of the Protect America Act. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 6(1), pp. 24-33, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Lijuan Geng, Feng Lu, Ying-Chang Liang, Francois P. S. Chin |
Secure multi-path construction in wireless sensor networks using network coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PIMRC ![In: Proceedings of the IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008, 15-18 September 2008, Cannes, French Riviera, France, pp. 1-5, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Klara A. Weiand, Jos S. Bouten, Cor J. Veenman |
Similarity Visualization for the Grouping of Forensic Speech Recordings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCF ![In: Computational Forensics, Second International Workshop, IWCF 2008, Washington, DC, USA, August 7-8, 2008, Proceedings, pp. 169-180, 2008, Springer, 978-3-540-85302-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Albert Gidari |
Designing the right wiretap solution: setting standards under CALEA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(3), pp. 29-36, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Shiping Chen 0003, Xinyuan Wang 0005, Sushil Jajodia |
On the anonymity and traceability of peer-to-peer VoIP calls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Netw. ![In: IEEE Netw. 20(5), pp. 32-37, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Francesco Palmieri 0002, Ugo Fiore |
Securing the MPLS Control Plane. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC ![In: High Performance Computing and Communications, First International Conference, HPCC 2005, Sorrento, Italy, September 21-23, 2005, Proceedings, pp. 511-523, 2005, Springer, 3-540-29031-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
strong authentication, label distribution, integrity, MPLS, signaling |
23 | Robert Tracz, Konrad S. Wrona |
Fair electronic cash withdrawal and change return for wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop Mobile Commerce ![In: Proceedings of the 1st International Workshop on Mobile Commerce, Rome, Italy, July, 21, 2001, pp. 14-19, 2001, ACM, 1-58113-376-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
electronic commerce, payment systems, wireless applications |
23 | Mohammed Inam Ul Haq |
Insuring individual's privacy from statistical data base users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFIPS National Computer Conference ![In: American Federation of Information Processing Societies: 1975 National Computer Conference, 19-22 May 1975, Anaheim, CA, USA, pp. 941-946, 1975, AFIPS Press, 978-1-4503-7919-9. The full citation details ...](Pics/full.jpeg) |
1975 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #67 of 67 (100 per page; Change: )
|
|