The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ETRICS"( http://dblp.L3S.de/Venues/ETRICS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/etrics

Publication years (Num. hits)
2006 (37)
Publication types (Num. hits)
inproceedings(36) proceedings(1)
Venues (Conferences, Journals, ...)
ETRICS(37)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 17 occurrences of 17 keywords

Results
Found 37 publication records. Showing 37 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Wolfgang Hommel Policy-Based Integration of User and Provider-Sided Identity Management. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Rainer Böhme A Comparison of Market Approaches to Software Vulnerability Disclosure. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Nicolai Kuntze, Andreas U. Schmidt Transitive Trust in Mobile Scenarios. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Steffen Kolarczyk, Manuel Koch, Klaus-Peter Löhr, Karl Pauls SecTOOL - Supporting Requirements Engineering for Access Control. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Andreas Pfitzmann Multilateral Security: Enabling Technologies and Their Evaluation. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Martin Wimmer 0001, Martina-Cezara Albutiu, Alfons Kemper Optimized Workflow Authorization in Service Oriented Architectures. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Dieter Hutter Possibilistic Information Flow Control in MAKS and Action Refinement. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Carsten Hohendorf, Erwin P. Rathgeb, Esbold Unurkhaan, Michael Tüxen Secure End-to-End Transport over SCTP. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Holger Grandy, Dominik Haneberg, Wolfgang Reif, Kurt Stenzel Developing Provable Secure M-Commerce Applications. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Sebastian Clauß A Framework for Quantification of Linkability Within a Privacy-Enhancing Identity Management System. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Igor Fischer, Thorsten Herfet Visual Document Authentication Using Human-Recognizable Watermarks. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Paul E. Sevinç, David A. Basin, Ernst-Rüdiger Olderog Controlling Access to Documents: A Formal Access Control Model. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Stefan Köpsell Low Latency Anonymous Communication - How Long Are Users Willing to Wait?. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Francesco Palmieri 0002 Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Layer-2 VPN, security, Grid computing, MPLS
1Dominik Raub, Rainer Steinwandt An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Arthur Schmidt Quantum Algorithm for Solving the Discrete Logarithm Problem in the Class Group of an Imaginary Quadratic Field and Security Comparison of Current Cryptosystems at the Beginning of Quantum Computer Age. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda A P2P Content Authentication Protocol Based on Byzantine Agreement. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Denis Hatebur, Maritta Heisel, Holger Schmidt 0001 Security Engineering Using Problem Frames. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier 0001 Simplifying Signature Engineering by Reuse. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attack Signatures, Intrusion Detection, Computer Security, Misuse Detection
1Marko Hassinen, Konstantin Hyppönen, Keijo Haataja An Open, PKI-Based Mobile Payment System. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jun Qian, Chao Xu, Meilin Shi Redesign and Implementation of Evaluation Dataset for Intrusion Detection System. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jürgen Nützel, Anja Beyer How to Increase the Security of Digital Rights Management Systems Without Affecting Consumer's Security. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ihab Hamadeh, George Kesidis Toward a Framework for Forensic Analysis of Scanning Worms. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Shyong K. Lam, Dan Frankowski, John Riedl Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Stefan Köpsell, Rolf Wendolsky, Hannes Federrath Revocable Anonymity. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jim Dowd, Shouhuai Xu, Weining Zhang Privacy-Preserving Decision Tree Mining Based on Random Substitutions. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF data mining, decision tree, Privacy-preservation, matrix, perturbation
1Ulrich Flegel, Joachim Biskup Requirements of Information Reductions for Cooperating Intrusion Detection Agents. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Young-Sik Hwang, Seung Wan Han, Taek Yong Nam Secure Rejoining Scheme for Dynamic Sensor Networks. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Günter Müller (eds.) Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Sven Wohlgemuth, Günter Müller Privacy with Delegation of Rights by Identity Management. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Marcin Gogolewski, Marek Klonowski, Przemyslaw Kubiak 0001, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski Kleptographic Attacks on E-Voting Schemes. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF receipt voting, election integrity, verifiable pseudo-randomness, electronic voting, coercion, kleptography
1Florian Kerschbaum, Orestis Terzidis Filtering for Private Collaborative Benchmarking. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Kathrin Lehmann, Peter Thiemann 0001 Field Access Analysis for Enforcing Access Control Policies. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Michael Barnett 0001, David A. Naumann, Wolfram Schulte, Qi Sun Allowing State Changes in Specifications. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Woojin Chang Reliable Keystroke Biometric System Based on a Small Number of Keystroke Samples. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Keystroke Biometric System, Hierarchical tree-based classification, Discrete Wavelet Transform, Resampling, Training set
1Fernando Godínez, Dieter Hutter, Raúl Monroy On the Use of Word Networks to Mimicry Attack Detection. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #37 of 37 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license