The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SECURWARE"( http://dblp.L3S.de/Venues/SECURWARE )

URL (DBLP): http://dblp.uni-trier.de/db/conf/securware

Publication years (Num. hits)
2007 (37) 2008 (66) 2009 (51) 2010 (46)
Publication types (Num. hits)
inproceedings(196) proceedings(4)
Venues (Conferences, Journals, ...)
SECURWARE(200)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 125 occurrences of 103 keywords

Results
Found 200 publication records. Showing 200 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jonas Pfoh, Christian A. Schneider, Claudia Eckert 0001 Exploiting the x86 Architecture to Derive Virtual Machine State Information. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Danilo Valeros Bernardo, Doan Hoang Protecting Next Generation High Speed Network Protocol - UDT through Generic Security Service Application Program Interface - GSS-API. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dongkyun Ahn, Gyungho Lee Prospect of Fine Grain Dynamic Memory Access Control with Profiling. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mathieu Blanc, Jérémy Briffaut, Thibault Coullet, Maxime Fonda, Christian Toinard Protection of a Shared HPC Cluster. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hiroto Kakiuchi, Takao Kawamura, Toshihiko Sasama, Kazunori Sugahara Detection Methods Improving Reliability of Automatic Human Tracking System. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Homam El-Taj, Omar Abouabdalla, Ahmed M. Manasrah, Ahmed Al-Madi, Muhammad Imran Sarwar, Sureswaran Ramadass Forthcoming Aggregating Intrusion Detection System Alerts Framework. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Praveen Bommannavar, Nicholas Bambos Patch Scheduling for Risk Exposure Mitigation under Service Disruption Constraints. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ali Ahmed 0001, Ning Zhang 0001 An Access Control Architecture for Context-Risk-Aware Access Control: Architectural Design and Performance Evaluation. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Boulares Ouchenne, Ousmane Koné A Security Control Architecture for SOAP-Based Services. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1S. Hasan Mirjalili, Arjen K. Lenstra Towards a Structural Secure Design Process. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Donghai Tian, Deguang Kong, Changzhen Hu, Peng Liu 0005 Protecting Kernel Data through Virtualization Technology. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mohit Soni, Sandesh Gupta, M. S. Rao, Phalguni Gupta An Efficient Vein Pattern-Based Recognition System. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sarosh Hashmi, John Brooke Towards Sybil Resistant Authentication in Mobile Ad Hoc Networks. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Francesco Beritelli, Salvatore Casale, Rosario Grasso, Andrea Spadaccini Performance Evaluation of SNR Estimation Methods in Forensic Speaker Recognition. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Cagatay Karabat, Mehmet Keskinöz Blind Detectors in Spread Spectrum Watermarking for Interference Reduction. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kun Peng, Feng Bao 0001 A Shuffling Scheme with Strict and Strong Security. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alireza Shahrestani, Maryam Feily, Rodina Binti Ahmad, Sureswaran Ramadass Discovery of Invariant Bot Behavior through Visual Network Monitoring System. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xavier Titi, Jean-Marc Seigneur Verifying Hotspot Quality User Rating with Certified QoS Evidence. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Thomas C. Ormerod, Lingyu Wang 0001, Mourad Debbabi, Amr M. Youssef, Hamad Binsalleeh, Amine Boukhtouta, Prosenjit Sinha Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Pekka Pietikäinen, Kati Karjalainen, Juha Röning, Juhani Eronen Socio-technical Security Assessment of a VoIP System. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Fan Wu 0013, Chung-Han Chen, Hira N. Narang An Efficient Acceleration of Symmetric Key Cryptography Using General Purpose Graphics Processing Unit. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Pierre de Leusse, Theo Dimitrakos SOA-Based Security Governance Middleware. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Bilal Khan, Muhammad Khurram Khan, Maqsood Mahmud, Khaled Alghathbar Security Analysis of Firewall Rule Sets in Computer Networks. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jin Tamura Improving the Efficiency of a Highly-Used Access Control Scheme. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ahlem Bouchahda, Nhan Le Thanh, Adel Bouhoula, Faten Labbene RBAC+: Dynamic Access Control for RBAC-Administered Web-Based Databases. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Anders Fongen Identity Management without Revocation. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Wolfgang Boehmer Analysis of Strongly and Weakly Coupled Management Systems in Information Security. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jonathan Rouzaud-Cornabas, Patrice Clemente, Christian Toinard An Information Flow Approach for Preventing Race Conditions: Dynamic Protection of the Linux OS. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Tewfiq El Maliki, Jean-Marc Seigneur A Security Adaptation Reference Monitor (SARM) for Highly Dynamic Wireless Environments. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Rainer Falk, Hans-Joachim Hof Industrial Sensor Network Security Architecture. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Daniel Hartung, Christoph Busch 0001 Biometric Transaction Authentication Protocol. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jaziar Radianti A Study of a Social Behavior inside the Online Black Markets. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Tamás Paulik, Ádám Máté Földes, Gábor György Gulyás BlogCrypt: Private Content Publishing on the Web. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Abdel Alim Kamal, Amr M. Youssef Applications of SAT Solvers to AES Key Recovery from Decayed Key Schedule Images. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sedat Soydan Analyzing the DPA Leakage of the Masked S-box via Digital Simulation and Reducing the Leakage by Inserting Delay Cells. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Manfred Schäfer, Wolf-Dietrich Moeller Strategies for Managed Software Integrity Protection. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Keunwoo Rhee, Byunghee Lee, Dongho Won, Hac Yun Na, Seungjoo Kim Vulnerabilities and Improvements of Du-Xiao-Chen-Wu's Secure Cell Relay Routing Protocol for Sensor Networks. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Francisco José Bellido Outeiriño, Pedro Canales Aranda, José Luis de la Cruz Fernández, Benito Pérez Jarauta Universal Bluetooth Access Control and Security System for e-Keys Enviroments. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ravishankar Borgaonkar An Analysis of the Asprox Botnet. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Pierluigi Failla Heuristic Search in Encrypted Graphs. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jaziar Radianti Eliciting Information on the Vulnerability Black Market from Interviews. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Masaru Takesue Cascaded Simple Filters for Accurate and Lightweight Email-Spam Detection. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Francesco Beritelli, Andrea Spadaccini A Statistical Approach to Biometric Identity Verification Based on Heart Sounds. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Reijo Savola, Masaru Takesue, Rainer Falk, Manuela Popescu (eds.) Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010 Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  BibTeX  RDF
1Reijo M. Savola, Petri Heinonen Security-Measurability-Enhancing Mechanisms for a Distributed Adaptive Security Monitoring System. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Cynthia Y. Lester Shifting the Paradigm: Training Undergraduate Students in Software Security. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Wilson Goudalo, Dominique Seret The Process of Engineering of Security of Information Systems (ESIS): The Formalism of Business Processes. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Engineering Process, Information Systems Security Engineering, Business Process Formalism, Information Systems Urbanization, UML, Enterprise Architecture
1Reijo Savola, Habtamu Abie Identification of Basic Measurable Security Components for a Distributed Messaging System. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security requirements, security metrics, messaging systems
1Hossein Rezaei Ghaleh, Shahin Norouzi A New Approach to Protect the OS from Off-line Attacks Using the Smart Card. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF OS security, off-line attack, trusted computing, smartcard
1Cynthia Y. Lester, Frank Jamerson Incorporating Software Security into an Undergraduate Software Engineering Course. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secure software development lifecycle, software engineering, Collaborative learning, software security, undergraduate curriculum
1Mohamed Abo El-Fotouh, Klaus Diepold The Pushdown Attack on AES. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Pushdown Attacks, Cryptanalysis, AES
1Antonietta Stango, Neeli R. Prasad, Dimitris M. Kyriazanos A Threat Analysis Methodology for Security Evaluation and Enhancement Planning. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF vulnerabilities, security metrics, assets, threat analysis
1Kamil Reddy, Hein S. Venter Using Object-Oriented Concepts to Develop a High-Level Information Privacy Risk Management Model. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Aleksander Dikanski, Christian Emig, Sebastian Abeck Integration of a Security Product in Service-Oriented Architecture. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Stefan Kraxberger, Udo Payer Secure Routing Approach for Unstructured P2P Systems. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, p2p systems, secure routing
1Gábor György Gulyás, Róbert Schulcz, Sándor Imre Modeling Role-Based Privacy in Social Networking Services. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy, social networks, Anonymity, identity management
1Wei Zhou, Zhiqiang Wei 0001, Mijun Kang, Paddy Nixon, Lang Jia A Credit-Based Incentive Mechanism for Recommendation Acquisition in Multihop Mobile Ad Hoc Networks. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Heiko Klarl, Korbinian Molitorisz, Christian Emig, Karsten Klinger, Sebastian Abeck Extending Role-Based Access Control for Business Usage. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Access Control, RBAC, Business Process Modelling, Roles, Identity Management, Business-IT Alignment
1Ángel Cuevas, Paul El Khoury, Laurent Gomez, Annett Laube, Alessandro Sorniotti A Security Pattern for Untraceable Secret Handshakes. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Christian Seifert, Peter Komisarczuk, Ian Welch True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF client honeypot, security, evaluation, intrusion detection
1Khaled Gaaloul, Philip Miseldine, François Charoy Towards Proactive Policies Supporting Event-Based Task Delegation. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Access Control, Workflow, Policy, Delegation
1Jérémy Briffaut, Xavier Kauffmann-Tourkestansky, Jean-François Lalande, Waleed W. Smari Generation of Role Based Access Control Security Policies for Java Collaborative Applications. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF java, RBAC, collaborative applications
1Rüdiger Grimm A Formal IT-Security Model for a Weak Fair-Exchange Cooperation with Non-repudiation Proofs. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IT-security model, secure state, trust model, non-repudiation, fair exchange, obligation, transition rule
1Su Chang, Thomas E. Daniels Correlation Based Node Behavior Profiling for Enterprise Network Security. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, Behavior Profiling
1Vicente Hernández, Lourdes López-Santidrián, Oscar Prieto, José-Fernán Martínez, Ana Belén García, Antonio da Silva 0001 Security Framework for DPWS Compliant Devices. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Secure Protocols, WS Security, Security Framework, DPWS
1Rainer Falk, Andreas Koepf, Hermann Seuschek, Ming-Yuh Huang, Mingyan Li Simulating a Multi-domain RFID System for Replacement Part Tracking. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Zahoor Ahmad Jhat, Ajaz Hussain Mir, Simeen Rubab Fingerprint Texture Feature for Discrimination and Personal Verification. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF spatial grey level dependence method, verification, Biometric, texture, fingerprint
1Davide Lorenzoli, George Spanoudakis Detection of Security and Dependability Threats: A Belief Based Reasoning Approach. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security and dependability, belief based reasoning, runtime monitoring
1Gh. Rasool Begh, Ajaz Hussain Mir Quantification of the Effect of Security on Performance in Wireless LANs. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Wireless LAN, TCP, Packet Loss, UDP, WEP, WPA
1Nuno Amálio Suspicion-Driven Formal Analysis of Security Requirements. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, planning, requirements, confidentiality, formal analysis, separation of duty, Event-Calculus
1Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Seiji Mune, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi A Two-Step Execution Mechanism for Thin Secure Hypervisors. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF TCB, ID management, Security, Virtual machine monitor, Hypervisor, Trusted Computing Base, VMM
1Catalin V. Bîrjoveanu Secrecy for Bounded Security Protocols without Freshness Check. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Masaru Takesue Personalized Filtering of Polymorphic E-mail Spam. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Personalized filter, polymorphous spam, filtering metric, fingerprint, Bloom filter, piecewise linear function
1Rainer Falk, Wilson Goudalo, Eric Y. Chen, Reijo Savola, Manuela Popescu (eds.) The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  BibTeX  RDF
1Igor Podebrad, Klaus Hildebrandt, Bernd Klauer List of Criteria for a Secure Computer Architecture. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF parts of von-Neumann- Maschine, computer-architecture, IT-security
1Matti Mantere, Ilkka Uusitalo, Juha Röning Comparison of Static Code Analysis Tools. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Peipei Shi, Bo Zhu, Amr M. Youssef A PIN Entry Scheme Resistant to Recording-Based Shoulder-Surfing. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Secure PIN entry, shoulder surfing
1Benjamin Aziz, Geoff W. Hamilton Detecting Man-in-the-Middle Attacks by Precise Timing. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Timed Algebra, Security, Static Analysis, Process Algebra
1Peter Lory Secure Distributed Multiplication of Two Polynomially Shared Values: Enhancing the Efficiency of the Protocol. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multiplication protocol, secret sharing, Multiparty computations, divided differences
1Hyangjin Lee, Inkyoung Jeun, Hyuncheol Jung Criteria for Evaluating the Privacy Protection Level of Identity Management Services. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Privacy protection level, Assessment, Identity Management
1Wolfgang Boehmer Survivability and Business Continuity Management System According to BS 25999. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF BS 25999, BCMS, Business Continuity Plan (BCP), Disaster Recovery (DR)
1Alireza Sadighian, Rasool Jalili AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Chit Wei Saw Runtime Protection via Dataflow Flattening. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, data hiding, obfuscation, software protection
1Jan Nagy, Peter Pecho Social Networks Security. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, privacy, social networks
1Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani Security in Ad Hoc Networks: From Vulnerability to Risk Management. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ad hoc networks, attacks, vulnerabilities, security measures
1Rainer Falk, Hans-Joachim Hof Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wake-up radio, security, wireless sensor network
1Mauro Migliardi, Valentina Resaz Distributed Intrusion Detection: Simulation and Evaluation of Two Methodologies. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Distributed Intrusion Detection., Simulation, Evaluation
1Vasileios Karyotis, Anastasios Kakalis, Symeon Papavassiliou On the Tradeoff between MAC-Layer and Network-Layer Topology-Controlled Malware Spreading Schemes in Ad Hoc and Sensor Networks. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malware spreading, topology control attacks, closed queuing networks
1Bogdan Groza Analysis of a Password Strengthening Technique and Its Practical Use. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication, protocol, password
1Ilkka Uusitalo, Josep M. Catot, Ramon Loureiro Phishing and Countermeasures in Spanish Online Banking. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Abuse and crime involving computers, Security, Authentication, Electronic commerce, Invasive software
1Maryam Feily, Alireza Shahrestani, Sureswaran Ramadass A Survey of Botnet and Botnet Detection. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Cristian Varas, Thomas Hirsch Self Protection through Collaboration Using D-CAF: A Distributed Context-Aware Firewall. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Participative Measurement, Denial of Service, Autonomic Communication, Intrusion Prevention, Flash crowds
1Imad M. Abbadi, Muntaha Alawneh Replay Attack of Dynamic Rights within an Authorised Domain. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Enterprise Rights Management, Dynamic Rights, Authorised Domain, Digital Rights Management
1Hyewon Park, Zeen Kim, Kwangjo Kim Forward Secure ID-Based Group Key Agreement Protocol with Anonymity. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF GKA, anonymous, forward-secure, ID-based
1Mucahit Mutlugun, Ibrahim Sogukpinar Multi-level Authentication Scheme Utilizing Smart Cards and Biometrics. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF smart card, fingerprint, security policy, remote authentication
1Mario Ibáñez, Natividad Martínez Madrid, Ralf Seepold Security Management with Virtual Gateway Platforms. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security architecure, Virtualization, Residential Gateway
1Jérémy Briffaut, Jean-François Lalande, Christian Toinard, Mathieu Blanc Enforcement of Security Properties for Dynamic MAC Policies. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Wolfgang Boehmer Appraisal of the Effectiveness and Efficiency of an Information Security Management System Based on ISO 27001. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Katarzyna Michalska, Tomasz Walkowiak Hierarchical Approach to Dependability Analysis of Information Systems by Modeling and Simulation. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jérémy Briffaut, Jean-François Lalande, Waleed W. Smari Team--Based MAC Policy over Security--Enhanced Linux. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 200 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license