The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SecITC"( http://dblp.L3S.de/Venues/SecITC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/secitc

Publication years (Num. hits)
2015 (20) 2016 (21) 2017-2018 (52) 2019 (17) 2020 (20) 2021 (23) 2022 (20) 2023 (15) 2024 (1)
Publication types (Num. hits)
inproceedings(180) proceedings(9)
Venues (Conferences, Journals, ...)
SecITC(189)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 189 publication records. Showing 189 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Mark Manulis, Diana Maimut, George Teseleanu (eds.) Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers Search on Bibsonomy SecITC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Paul Irofti Pinky: A Modern Malware-Oriented Dynamic Information Retrieval Tool. Search on Bibsonomy SecITC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Dima Grigoriev, Ilia Ilmer, Alexey Ovchinnikov, Vladimir Shpilrain BASS: Boolean Automorphisms Signature Scheme. Search on Bibsonomy SecITC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jeroen van Wier SDVS Sender-Privacy in the Multi-party Setting. Search on Bibsonomy SecITC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Paul Cotan, George Teseleanu Elementary Remarks on Some Quadratic Based Identity Based Encryption Schemes. Search on Bibsonomy SecITC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Mario Noseda, Simon Künzli 0003 Attacking Secure-Element-Hardened MCUboot Using a Low-Cost Fault Injection Toolkit. Search on Bibsonomy SecITC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Ruxandra Balucea, Paul Irofti Software Mitigation of RISC-V Spectre Attacks. Search on Bibsonomy SecITC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Dhiraj K. Pandey, Antonio R. Nicolosi Learning Burnside Homomorphisms with Rounding and Pseudorandom Function. Search on Bibsonomy SecITC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1George Teseleanu Some Results on Related Key-IV Pairs of Espresso. Search on Bibsonomy SecITC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Adriana Nicolae, Paul Irofti, Ioana Leustean OpenBSD Formal Driver Verification with SeL4. Search on Bibsonomy SecITC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Engincan Varan, Khadija Hanifi, Aysegul Rana Erdemli, Musa Unal, Yunus Emre Tat, Dilara Tekinoglu, Orçun Çetin, Ramin Fuladi, Cemal Yilmaz 0001 Using Page Offsets for Detecting Control-Flow Anomalies. Search on Bibsonomy SecITC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Ahmad Khoureich Ka M-Sel: A Message Selection Functional Encryption from Simple Tools. Search on Bibsonomy SecITC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Giampaolo Bella, Mihai Doinea, Helge Janicke (eds.) Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers Search on Bibsonomy SecITC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Anastasia Theodouli, Evdoxia Manganopoulou, Athanasios Kalfoutzos, Athanasios Tzikas, Christos Tsislianis, Dimosthenis Ioannidis, Konstantinos Votis, Dimitrios Tzovaras Towards a Secure and Transparent Blockchain-Based System for e-Commerce Deliveries. Search on Bibsonomy SecITC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Matluba Khodjaeva, Giovanni Di Crescenzo An Efficient Small Modulus Test and Its Applications to Delegated Computation Without Preprocessing. Search on Bibsonomy SecITC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jeroen van Wier, Arash Atashpendar, Peter B. Rønne Deniable Public-Key Authenticated Quantum Key Exchange. Search on Bibsonomy SecITC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Debasmita Chakraborty, Santu Pal Superpoly Recovery of Grain-128AEAD Using Division Property. Search on Bibsonomy SecITC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Amirreza Hamidi, Hossein Ghodosi Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem. Search on Bibsonomy SecITC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Subhranil Dutta, Ratna Dutta, Sourav Mukhopadhyay Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy. Search on Bibsonomy SecITC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Yuichi Komano, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama Lightweight Authentication Using Noisy Key Derived from Physically Unclonable Function. Search on Bibsonomy SecITC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jana Medková, Josef Hynek Application-Oriented Anonymization Framework for Social Network Datasets and IoT Environments. Search on Bibsonomy SecITC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Sampath Rajapaksha, Janaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri AI-Powered Vulnerability Detection for Secure Source Code Development. Search on Bibsonomy SecITC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Matluba Khodjaeva, Ta Chen, Rajesh Krishnan, David Shur, Delaram Kahrobaei, Vladimir Shpilrain On Single-Server Delegation of RSA. Search on Bibsonomy SecITC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Giampaolo Bella Interactional Freedom and Cybersecurity. Search on Bibsonomy SecITC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Yuichi Komano, Takaaki Mizuki Card-Based Zero-Knowledge Proof Protocol for Pancake Sorting. Search on Bibsonomy SecITC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Hiromasa Kitai, Naoto Yanai, Kazuki Iwahana, Masataka Tatsumi, Jason Paul Cruz MOTUS: How Quantized Parameters Improve Protection of Model and Its Inference Input. Search on Bibsonomy SecITC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Malik Alsahli, Alex Borgognoni, Luan Cardoso dos Santos, Hao Cheng 0009, Christian Franck, Johann Großschädl Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things. Search on Bibsonomy SecITC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1George Teseleanu The Security of Quasigroups Based Substitution Permutation Networks. Search on Bibsonomy SecITC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Peter Y. A. Ryan, Cristian Toma (eds.) Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers Search on Bibsonomy SecITC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Masahisa Shimano, Kazuo Sakiyama, Daiki Miyahara Towards Verifying Physical Assumption in Card-Based Cryptography. Search on Bibsonomy SecITC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Lukasz Lapczyk, David B. Skillicorn Activity Detection from Encrypted Remote Desktop Protocol Traffic. Search on Bibsonomy SecITC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Mugurel Barcau, Cristian Lupascu, Vicentiu Pasol, George C. Turcas Bridges Connecting Encryption Schemes. Search on Bibsonomy SecITC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Emanuele Bellini 0002, Yun Ju Huang, Mohamed Rachidi Statistical Tests for Symmetric Primitives - An Application to NIST Lightweight Finalists. Search on Bibsonomy SecITC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Takuya Ishibashi 0001, Toshihiro Ohigashi, Hikaru Tsuchida Unbounded Revocable Decentralized Multi-Authority Attribute-Based Encryption Supporting Non-monotone Access Structures. Search on Bibsonomy SecITC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Ahmad Khoureich Ka Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption. Search on Bibsonomy SecITC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Murat Burhan Ilter, Ali Aydin Selçuk MILP-Aided Cryptanalysis of the FUTURE Block Cipher. Search on Bibsonomy SecITC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Li Duan, Yong Li 0021, Lijun Liao Flexible Group Non-interactive Key Exchange in the Standard Model. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Romain Brisse, Simon Boche, Frédéric Majorczyk, Jean-François Lalande KRAKEN: A Knowledge-Based Recommender System for Analysts, to Kick Exploration up a Notch. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Marian Gusatu, Ruxandra F. Olimid Improved Security Solutions for DDoS Mitigation in 5G Multi-access Edge Computing. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Luan Cardoso dos Santos, Johann Großschädl An Evaluation of the Multi-platform Efficiency of Lightweight Cryptographic Permutations. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Dániel Zentai UC Analysis of the Randomized McEliece Cryptosystem. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Li Duan, Yong Li 0021, Lijun Liao Perfect Anonymous Authentication and Secure Communication in Internet-of-Things. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Diana Maimut, George Teseleanu New Configurations of Grain Ciphers: Security Against Slide Attacks. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Xiaona Zhang, Yang Liu, Yu Chen Attack on the Common Prime Version of Murru and Saettone's RSA Cryptosystem. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Kashi Neupane Long-Term Secure Asymmetric Group Key Agreement. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Suthee Ruangwises Using Five Cards to Encode Each Integer in $\mathbb {Z}/6\mathbb {Z}$. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Emanuele Bellini 0002, Anna Hambitzer, Matteo Protopapa, Matteo Rossi Limitations of the Use of Neural Networks in Black Box Cryptanalysis. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Diana Maimut, Andrei-George Oprina, Damien Sauveron (eds.) Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers Search on Bibsonomy SECITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Vlad Constantin Craciun, Andrei-Catalin Mogage Building Deobfuscated Applications from Polymorphic Binaries. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Cristian Toma, Catalin Boja, Marius Popa, Mihai Doinea, Cristian Ciurea Viruses, Exploits, Malware and Security Issues on IoT Devices. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Christian Franck, Johann Großschädl Optimized Implementation of SHA-512 for 16-Bit MSP430 Microcontrollers. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Md. Akhtaruzzaman Adnan, Atika Younus, Md. Harun Al Kawser, Natasha Adhikary, Ahsan Habib 0005, Rakib Ul Haque Identification of Data Breaches from Public Forums. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Evgnosia-Alexandra Kelesidis An Optimization of Bleichenbacher's Oracle Padding Attack. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Esra Yeniaras, Murat Cenk Improved Polynomial Multiplication Algorithms over Characteristic Three Fields and Applications to NTRU Prime. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1George Teseleanu Lightweight Swarm Authentication. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Somanath Tripathy, Narendra Singh, Divyanshu N. Singh ADAM: Automatic Detection of Android Malware. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Mihai-Zicu Mina, Emil Simion A Multifunctional Modular Implementation of Grover's Algorithm. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Abdul Saboor Malik, Muhammad Khuram Shahzad, Mehdi Hussain A Forensic Framework for Webmail Threat Detection Using Log Analysis. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Xiaojuan Lu, Bohan Li 0004, Shichang Wang, Dongdai Lin Conditional Differential Cryptanalysis on Bagua. Search on Bibsonomy SecITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yoshifumi Manabe, Hibiki Ono Secure Card-Based Cryptographic Protocols Using Private Operations Against Malicious Players. Search on Bibsonomy SECITC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mihai-Cristian Chindris, Mihai Togan, Stefan-Ciprian Arseni Secure Speaker Recognition System Using Homomorphic Encryption. Search on Bibsonomy SECITC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ion Bica, Roxana Larisa Unc, Stefan Turcanu Virtualization and Automation for Cybersecurity Training and Experimentation. Search on Bibsonomy SECITC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Emil Simion, Rémi Géraud-Stewart (eds.) Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers Search on Bibsonomy SecITC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yuanzhen Liu, Gerhard Petrus Hancke, Umair Mujtaba Qureshi Off-the-Shelf Security Testing Platform for Contactless Systems. Search on Bibsonomy SECITC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mihai-Zicu Mina, Emil Simion A Scalable Simulation of the BB84 Protocol Involving Eavesdropping. Search on Bibsonomy SECITC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hiroaki Anada Decentralized Multi-authority Anonymous Credential System with Bundled Languages on Identifiers. Search on Bibsonomy SECITC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Andreea-Elena Panait, Ruxandra F. Olimid On Using zk-SNARKs and zk-STARKs in Blockchain-Based Identity Management. Search on Bibsonomy SECITC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Cristian Hristea Reliable RFID Offline Privacy. Search on Bibsonomy SECITC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yuto Shinoda, Daiki Miyahara, Kazumasa Shinagawa, Takaaki Mizuki, Hideaki Sone Card-Based Covert Lottery. Search on Bibsonomy SECITC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tung Chou An IND-CCA2 Attack Against the 1st- and 2nd-Round Versions of NTS-KEM. Search on Bibsonomy SECITC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Diana Maimut, George Teseleanu A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap 2k-Residuosity Assumption. Search on Bibsonomy SECITC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Lukas Malina, David Smekal, Sara Ricci, Jan Hajny, Peter Cíbik, Jakub Hrabovsky Hardware-Accelerated Cryptography for Software-Defined Networks with P4. Search on Bibsonomy SECITC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Nasser Al-Hadhrami, Matthew Collinson, Nir Oren Security Analysis Using Subjective Attack Trees. Search on Bibsonomy SECITC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Rémi Géraud-Stewart, David Naccache Elementary Attestation of Cryptographically Useful Composite Moduli. Search on Bibsonomy SECITC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Kashi Neupane Long-Term Secure Deniable Group Key Establishment. Search on Bibsonomy SECITC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Anubhab Baksi New Insights on Differential and Linear Bounds Using Mixed Integer Linear Programming. Search on Bibsonomy SECITC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Shurook S. Almohamade, John A. Clark, James Law Behaviour-Based Biometrics for Continuous User Authentication to Industrial Collaborative Robots. Search on Bibsonomy SECITC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tetsuya Nagano, Hiroaki Anada Approach to Cryptography from Differential Geometry with Example. Search on Bibsonomy SECITC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1David Pecl, Yehor Safonov, Zdenek Martinasek, Matej Kacic, Lubomir Almer, Lukas Malina Manager Asks: Which Vulnerability Must be Eliminated First? Search on Bibsonomy SECITC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Brian A. Coan, Jonathan Kirsch Secure Deterministic Automata Evaluation: Completeness and Efficient 2-party Protocols. Search on Bibsonomy SECITC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Abhrajit Sengupta, Ozgur Sinanoglu, Muhammad Yasin Logic Locking of Boolean Circuits: Provable Hardware-Based Obfuscation from a Tamper-Proof Memory. Search on Bibsonomy SECITC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mario Bischof, Tobias Oder, Tim Güneysu Efficient Microcontroller Implementation of BIKE. Search on Bibsonomy SECITC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hiroaki Anada, Yoshifumi Ueshige Generic Construction of Anonymous Deniable Predicate Authentication Scheme with Revocability. Search on Bibsonomy SECITC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Camil Jichici, Bogdan Groza, Pal-Stefan Murvay Integrating Adversary Models and Intrusion Detection Systems for In-vehicle Networks in CANoe. Search on Bibsonomy SECITC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Marc Beunardeau, Fatima-Ezzahra El Orche, Diana Maimut, David Naccache, Peter B. Rønne, Peter Y. A. Ryan Authenticated Key Distribution: When the Coupon Collector is Your Enemy. Search on Bibsonomy SECITC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Iulian Aciobanitei, Paul-Danut Urian, Mihai-Lica Pura Learned Lessons from Implementing an Android Client for the Cloud Signature Consortium API. Search on Bibsonomy SECITC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mariana Costiuc, Diana Maimut, George Teseleanu Physical Cryptography. Search on Bibsonomy SECITC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Satomi Kaneko, Akira Yamada 0001, Yukiko Sawaya, Tran Phuong Thao, Ayumu Kubota, Kazumasa Omote Detecting Malicious Websites by Query Templates. Search on Bibsonomy SECITC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mohammed Zitouni, Farid Mokrane Implementing Cryptography Pairings over Ordinary Pairing-Friendly Curves of Type y2 = x5 +a, x. Search on Bibsonomy SECITC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jean-Louis Lanet, Cristian Toma (eds.) Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers Search on Bibsonomy SecITC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Lukas Malina, Sara Ricci, Petr Dzurenda, David Smekal, Jan Hajny, Tomas Gerlich Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms. Search on Bibsonomy SECITC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Natacha Sylvie Laniado The Ups and Downs of Technology in Society. Search on Bibsonomy SECITC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ion Bica, Bogdan-Cosmin Chifor, Stefan-Ciprian Arseni, Ioana Matei Reputation-Based Security Framework for Internet of Things. Search on Bibsonomy SECITC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Risa Yashiro, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama A Deep Learning Attack Countermeasure with Intentional Noise for a PUF-Based Authentication Scheme. Search on Bibsonomy SECITC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sandra Rasoamiaramanana, Gilles Macario-Rat, Marine Minier White-Box Traitor-Tracing from Tardos Probabilistic Codes. Search on Bibsonomy SECITC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Diana Maimut, Alexandru Stefan Mega Speeding up OMD Instantiations in Hardware. Search on Bibsonomy SECITC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Victor-Mihai Talif Implementing Searchable Encryption Schemes over Multilinear Maps. Search on Bibsonomy SecITC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dan Sporici, Mihai-Daniel Chiroiu, Dan Ciocîrlan An Evaluation of OCR Systems Against Adversarial Machine Learning. Search on Bibsonomy SecITC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Stefan Bodoarca, Mihai-Lica Pura Assuring Privacy in Surfing the Internet. Search on Bibsonomy SecITC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shao-Fang Wen, Mazaher Kianpour, Basel Katt Security Knowledge Management in Open Source Software Communities. Search on Bibsonomy SecITC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 189 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license