The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "WOSIS"( http://dblp.L3S.de/Venues/WOSIS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/sis

Publication years (Num. hits)
2004 (37) 2005 (33) 2006 (26) 2007 (25) 2008 (17) 2009-2011 (32) 2014 (9)
Publication types (Num. hits)
inproceedings(171) proceedings(8)
Venues (Conferences, Journals, ...)
WOSIS(179)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 179 publication records. Showing 179 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Andrey Jivsov WCFB: A Wide Block Encryption for Large Data Sets. Search on Bibsonomy WOSIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1David Kelm, Melanie Volkamer Towards a Social Engineering Test Framework. Search on Bibsonomy WOSIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Vivaksha J. Jariwala, Devesh C. Jinwala Privacy and Integrity Preserving Secure Data Aggregation in Wireless Sensor Networks. Search on Bibsonomy WOSIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Luis Márquez Alcañiz, David Garcia Rosado, Daniel Mellado, Eduardo Fernández-Medina Security in Legacy Systems Migration to the Cloud: A Systematic Mapping Study. Search on Bibsonomy WOSIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1David Garcia Rosado, Carlos Blanco 0001, Daniel Mellado, Jan Jürjens, Luis Enrique Sánchez (eds.) WOSIS 2014 - Proceedings of the 11th International Workshop on Security in Information Systems, Lisbon, Portugal, 27 April, 2014 Search on Bibsonomy WOSIS The full citation details ... 2014 DBLP  BibTeX  RDF
1Ajay Nagarajan, Arun Sood SCIT Based Moving Target Defense Reduces and Shifts Attack Surface. Search on Bibsonomy WOSIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Francisco Martín-Fernández, Pino Caballero-Gil, Cándido Caballero-Gil, Jezabel Molina-Gil Increasing Privacy and Trust in Cooperative Social Platforms for Vehicular Applications. Search on Bibsonomy WOSIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Changwei Liu, Anoop Singhal, Duminda Wijesekera A Model Towards Using Evidence from Security Events for Network Attack Analysis. Search on Bibsonomy WOSIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Christian Schmitt 0002, Peter Liggesmeyer Implications of the Operational Environmental on Software Security Requirements Engineering. Search on Bibsonomy WOSIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jezabel Molina-Gil, Pino Caballero-Gil, Cándido Caballero-Gil Enhancing Cooperation in Wireless Vehicular Networks. Search on Bibsonomy WOSIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Angel Gallego, Antonio Santos-Olmo, Luis Enrique Sánchez, Eduardo Fernández-Medina Automated Security Metrics in ISMSs to Discover the Level of Security of OSs and DBMSs. Search on Bibsonomy WOSIS The full citation details ... 2011 DBLP  BibTeX  RDF
1David Garcia Rosado, Luis Enrique Sánchez, Jan Jürjens (eds.) WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011 Search on Bibsonomy WOSIS The full citation details ... 2011 DBLP  BibTeX  RDF
1HonGian Karen Lu Accessing Cloud through API in a More Secure and Usable Way. Search on Bibsonomy WOSIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Waldo Rocha Flores, Mathias Ekstedt Information Security Governance Analysis Using Probabilistic Relational Models. Search on Bibsonomy WOSIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Ye Hou, Ping Gao 0003, Richard Heeks 0001 The Influence of Institutional Forces on Employee Compliance with Information Security Policies. Search on Bibsonomy WOSIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina A Comparative Review of Cloud Security Proposals with ISO/IEC 27002. Search on Bibsonomy WOSIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Haibo Hu 0002, Dan Yang 0001, Hong Xiang, Li Fu, Chunxiao Ye, Ren Li Towards a Semantic Web-enabled Knowledge Base to Elicit Security Requirements for Misuse Cases. Search on Bibsonomy WOSIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Santiago Moral-García, Santiago Moral-Rubio, Eduardo Fernández-Medina Security Pattern Mining: Systematic Review and Proposal. Search on Bibsonomy WOSIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Jérôme Dossogne, Stephane Fernandes Medeiros Enhancing Cryptographic Code against Side Channel Cryptanalysis with Aspects. Search on Bibsonomy WOSIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Hannes Holm, Teodor Sommestad, Ulrik Franke, Mathias Ekstedt Expert Assessment on the Probability of Successful Remote Code Execution Attacks. Search on Bibsonomy WOSIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Jaime Devesa, Xabier Cantero, Gonzalo Álvarez Marañón, Pablo García Bringas An efficient Security Solution for Dealing with Shortened URL Analysis. Search on Bibsonomy WOSIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Min-Hua Shao, Yi-Ping Lee, Yen-Fen Hou, Cheng-Yi Ho A Trusted Routing Based Service Discovery Protocol with Backup Nodes in MANETs. Search on Bibsonomy WOSIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Antonio Santos-Olmo, Luis Enrique Sánchez, Eduardo Fernández-Medina, Mario Piattini Desirable Characteristics for an ISMS oriented to SMEs. Search on Bibsonomy WOSIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Dina Satybaldina, Altynbek Sharipbayev, Aigul Adamova Implementation of the Finite Automaton Public Key Cryptosystem on FPGA. Search on Bibsonomy WOSIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Roberto Ortiz, Santiago Moral-Rubio, Javier Garzás, Eduardo Fernández-Medina Towards a Pattern-based Security Methodology to Build Secure Information Systems. Search on Bibsonomy WOSIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Sergey Butakov, Craig Barber, Vadim Diagilev, Alexey Mikhailov Architecture of Plagiarism Detection Service that Does Not Violate Intellectual Property of the Student. Search on Bibsonomy WOSIS The full citation details ... 2011 DBLP  BibTeX  RDF
1Alban Gabillon A Privacy Model for Social Networks. Search on Bibsonomy WOSIS The full citation details ... 2011 DBLP  BibTeX  RDF
1William R. Claycomb, Dongwan Shin An Enhanced Approach to using Virtual Directories for Protecting Sensitive Information. Search on Bibsonomy WOSIS The full citation details ... 2009 DBLP  BibTeX  RDF
1Juan Jose Roque SLSB: Improving the Steganographic Algorithm LSB. Search on Bibsonomy WOSIS The full citation details ... 2009 DBLP  BibTeX  RDF
1Luis Enrique Sánchez, Antonio Santos-Olmo, Eduardo Fernández-Medina, Mario Piattini MMSM-SME: Methodology for the Management of Security and its Maturity in SME. Search on Bibsonomy WOSIS The full citation details ... 2009 DBLP  BibTeX  RDF
1Axel Schröpfer, Florian Kerschbaum, Dagmar Sadkowiak, Richard Pibernik Risk-Aware Secure Supply Chain Master Planning. Search on Bibsonomy WOSIS The full citation details ... 2009 DBLP  BibTeX  RDF
1Basel Alomair, Radha Poovendran Unconditionally Secure Authenticated Encryption with Shorter Keys. Search on Bibsonomy WOSIS The full citation details ... 2009 DBLP  BibTeX  RDF
1Candelaria Hernández-Goya, Pino Caballero-Gil, Amparo Fúster-Sabater Rethinking Self-organized Public-key Management for Mobile Ad-Hoc Networks. Search on Bibsonomy WOSIS The full citation details ... 2009 DBLP  BibTeX  RDF
1Alfonso Rodríguez 0001, Mariemma Inmaculada Yagüe del Valle, Eduardo Fernández-Medina (eds.) Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009 Search on Bibsonomy WOSIS The full citation details ... 2009 DBLP  BibTeX  RDF
1Corrado Aaron Visaggio, Francesca de Rosa Managing Security Knowledge through Case based Reasoning. Search on Bibsonomy WOSIS The full citation details ... 2009 DBLP  BibTeX  RDF
1Óscar Sánchez Ramón, Fernando Molina, Jesús García Molina, José Ambrosio Toval Álvarez A Model Driven Approach for Generating Code from Security Requirements. Search on Bibsonomy WOSIS The full citation details ... 2009 DBLP  BibTeX  RDF
1Víctor Torres, Jaime Delgado, Xavier Maroñas, Silvia Llorente, Marc Gauvin Enhancing Rights Management Systems through the Development of Trusted Value Networks. Search on Bibsonomy WOSIS The full citation details ... 2009 DBLP  BibTeX  RDF
1Boustia Narhimene, Aïcha Mokhtari DLδε-OrBAC: Context based Access Control. Search on Bibsonomy WOSIS The full citation details ... 2009 DBLP  BibTeX  RDF
1Mukhtiar Memon, Michael Hafner, Ruth Breu Security as a Service - A Reference Architecture for SOA Security. Search on Bibsonomy WOSIS The full citation details ... 2009 DBLP  BibTeX  RDF
1Pino Caballero-Gil, Amparo Fúster-Sabater, Candelaria Hernández-Goya Deterministic Cryptanalysis of some Stream Ciphers. Search on Bibsonomy WOSIS The full citation details ... 2009 DBLP  BibTeX  RDF
1Jonathan White, Brajendra Panda, Quassai Yassen, Khanh Nguyen, Weihan Li Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation. Search on Bibsonomy WOSIS The full citation details ... 2009 DBLP  BibTeX  RDF
1Koen Buyens, Bart De Win, Wouter Joosen Improving Least Privilege in Software Architecture by Guided Automated Compartmentalization. Search on Bibsonomy WOSIS The full citation details ... 2008 DBLP  BibTeX  RDF
1Asmaa Adnane, Christophe Bidan, Rafael T. de Sousa Jr. Effectiveness of Trust Reasoning for Attack Detection in OLSR. Search on Bibsonomy WOSIS The full citation details ... 2008 DBLP  BibTeX  RDF
1Michael VanHilst, Eduardo B. Fernández, Fabrício A. Braz A Multi-Dimensional Classification for Users of Security Patterns. Search on Bibsonomy WOSIS The full citation details ... 2008 DBLP  BibTeX  RDF
1Qutaibah Althebyan, Brajendra Panda Knowledge Extraction and Management for Insider Threat Mitigation. Search on Bibsonomy WOSIS The full citation details ... 2008 DBLP  BibTeX  RDF
1Marco Ramilli, Marco Prandini Adaptive Filtering of Comment Spam in Multi-user Forums and Blogs. Search on Bibsonomy WOSIS The full citation details ... 2008 DBLP  BibTeX  RDF
1Sushmita Ruj, Bimal K. Roy Key Establishment Algorithms for Some Deterministic Key Predistribution Schemes. Search on Bibsonomy WOSIS The full citation details ... 2008 DBLP  BibTeX  RDF
1Michele Chinosi, Alberto Trombetta Integrating Privacy Policies into Business Processes. Search on Bibsonomy WOSIS The full citation details ... 2008 DBLP  BibTeX  RDF
1Alfonso Rodríguez 0001, Mariemma Inmaculada Yagüe del Valle, Eduardo Fernández-Medina (eds.) Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008 Search on Bibsonomy WOSIS The full citation details ... 2008 DBLP  BibTeX  RDF
1Pino Caballero-Gil, Amparo Fúster-Sabater, Maria Eugenia Pazo-Robles New Attack Strategy for the Shrinking Generator. Search on Bibsonomy WOSIS The full citation details ... 2008 DBLP  BibTeX  RDF
1Ralph Herkenhöner Process Modeling for Privacy - Conformant Biobanking: Case Studies on Modeling in UMLsec. Search on Bibsonomy WOSIS The full citation details ... 2008 DBLP  BibTeX  RDF
1Carlos Blanco 0001, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo 0001, Mario Piattini Obtaining Secure Code in SQL Server Analysis Services by using MDA and QVT. Search on Bibsonomy WOSIS The full citation details ... 2008 DBLP  BibTeX  RDF
1Sergio Pozo, Rafael Ceballos, Rafael M. Gasca Firewall Rule Set Inconsistency Characterization by Clustering. Search on Bibsonomy WOSIS The full citation details ... 2008 DBLP  BibTeX  RDF
1William M. Fitzgerald, Simon N. Foley, Mícheál Ó Foghlú Network Access Control Interoperation using Semantic Web Techniques. Search on Bibsonomy WOSIS The full citation details ... 2008 DBLP  BibTeX  RDF
1Cameron Ross Dunne, Thibault Candebat, David Gray An Access Control Model for Location based Services. Search on Bibsonomy WOSIS The full citation details ... 2008 DBLP  BibTeX  RDF
1Min-Hua Shao, Shin-Jia Huang Trust-Aware Anonymous and Efficient Routing for Mobile Ad-Hoc Networks. Search on Bibsonomy WOSIS The full citation details ... 2008 DBLP  BibTeX  RDF
1Heinz Lothar Grob, Gereon Strauch, Jan Hermans Conceptual Design of a Method to Support IS Security Investment Decisions within the Context of Critical Business Processes. Search on Bibsonomy WOSIS The full citation details ... 2008 DBLP  BibTeX  RDF
1Joaquín Lasheras, Rafael Valencia-García, Jesualdo Tomás Fernández-Breis, José Ambrosio Toval Álvarez An Ontology-Based Framework for Modelling Security Requirements. Search on Bibsonomy WOSIS The full citation details ... 2008 DBLP  BibTeX  RDF
1Azzam Mourad, Marc-André Laverdière, Mourad Debbabi New Primitives to AOP Weaving Capabilities for Security Hardening Concerns. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Berthold Agreiter, Michael Hafner, Ruth Breu A Fair Non-repudiation Service in a Web Services Peer-to-Peer Environment. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Florian Kerschbaum A New Way to Think About Secure Computation: Language-based Secure Computation. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Manuel Sáchez Cuenca, Gabriel López 0001, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta A Proposal for Extending the Eduroam Infrastructure with Authorization Mechanisms. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Omid Tafreschi, Dominique Maehler, Janina Fengel, Michael Rebstock, Claudia Eckert 0001 A Reputation System for Electronic Negotiations. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Katalin Anna Lázá, Csilla Farkas Security in TciNMP Systems. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Mariemma Inmaculada Yagüe del Valle, Eduardo Fernández-Medina (eds.) Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007 Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Ernesto Damiani, Majirus Fansi, Alban Gabillon, Stefania Marrara A General Approach to Securely Querying XML. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Barry Sweeney, Duminda Wijesekera Comparison of IPsec to TLS and SRTP for Securing VoIP. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Silvia Llorente, Jaime Delgado, Xavier Maroñas Implementing Mobile DRM with MPEG 21 and OMA. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini SREPPLine: Towards a Security Requirements Engineering Process for Software Product Lines. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Rui Guo, Guiran Chang, Ruidong Hou, Baojing Sun, An Liu, Bencheng Zhang Research on Counter Http DDoS Attacks based on Weighted Queue Random Early Drop . Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Stefan Böttcher Inferring Secret Information in Relational Databases. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Marco Ramilli, Marco Prandini RoboAdmin: A Different Approach to Remote System Administration. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Gerardo Canfora, Corrado Aaron Visaggio A Three Layered Model to Implement Data Privacy Policies. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Emilio Soler, Juan Trujillo 0001, Eduardo Fernández-Medina, Mario Piattini SECRDW: An Extension of the Relational Package from CWM for Representing Secure Data Warehouses at the Logical Level. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Daniel Kadenbach, Carsten Kleiner, Lukas Grittner A DRM Architecture for Securing User Privacy by Design. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Víctor Rodríguez-Doncel, Marc Gauvin, Jaime Delgado An Ontology for the Expression of Intellectual Property Entities and Relations. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Ruth Breu Model-Driven Approaches to Security. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Marco Prandini, Eugenio Faldella, Roberto Laschi Confining the Insider Threat in Mass Virtual Hosting Systems. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Reine Lundin, Thijs Holleboom, Stefan Lindskog On the Relationship between Confidentiality Measures: Entropy and Guesswork. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Klaus Plößl, Hannes Federrath A Privacy Aware and Efficient Security Infrastructure for Vehicular Ad Hoc Networks. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Alfonso Rodríguez 0001, Ignacio García Rodríguez de Guzmán Obtaining Use Cases and Security Use Cases from Secure Business Process through the MDA Approach. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Luís Enrique Sanchez, Daniel Villafranca, Mario Piattini MMISS-SME Practical Development: Maturity Model for Information Systems Security Management in SMEs. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Anna Zych, Milan Petkovic, Willem Jonker A Key Management Method for Cryptographically Enforced Access Control. Search on Bibsonomy WOSIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Eva Rodríguez, Silvia Llorente, Jaime Delgado Protecting Notification of Events in Multimedia Systems. Search on Bibsonomy WOSIS The full citation details ... 2006 DBLP  BibTeX  RDF
1Miguel A. Martínez 0002, Joaquín Lasheras, José Ambrosio Toval Álvarez, Mario Piattini An Audit Method of Personal Data Based on Requirements Engineering. Search on Bibsonomy WOSIS The full citation details ... 2006 DBLP  BibTeX  RDF
1Thomas Heyman, Bart De Win, Christophe Huygens, Wouter Joosen Improving Intrusion Detection through Alert Verification. Search on Bibsonomy WOSIS The full citation details ... 2006 DBLP  BibTeX  RDF
1Antti Tuomisto, Mikko Savela Information Security and Business Continuity in SMEs. Search on Bibsonomy WOSIS The full citation details ... 2006 DBLP  BibTeX  RDF
1Simone Lupetti, Feike W. Dillema, Tage Stabell-Kulø Names in Cryptographic Protocols. Search on Bibsonomy WOSIS The full citation details ... 2006 DBLP  BibTeX  RDF
1Manuel Sánchez, Gabriel López 0001, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta Grid Authorization Based on Existing AAA Architectures. Search on Bibsonomy WOSIS The full citation details ... 2006 DBLP  BibTeX  RDF
1Serge Chaumette, Achraf Karray, Damien Sauveron The Software Infrastructure of a Java Card Based Security Platform for Distributed Applications. Search on Bibsonomy WOSIS The full citation details ... 2006 DBLP  BibTeX  RDF
1Oleksiy Mazhelis, Anton Naumenko The Place and Role of Security Patterns in Software Development Process. Search on Bibsonomy WOSIS The full citation details ... 2006 DBLP  BibTeX  RDF
1Athanasios Moralis, Angelos Lenis, Mary Grammatikou, Symeon Papavassiliou, Basil S. Maglaris A Distributed Kerberized Access Architecture for Real Time Grids. Search on Bibsonomy WOSIS The full citation details ... 2006 DBLP  BibTeX  RDF
1Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini SREP: A Proposal for Establishing Security Requirements for the Development of Secure Information Systems. Search on Bibsonomy WOSIS The full citation details ... 2006 DBLP  BibTeX  RDF
1Christos K. Dimitriadis Honeynets in 3G - A Game Theoretic Analysis. Search on Bibsonomy WOSIS The full citation details ... 2006 DBLP  BibTeX  RDF
1Alfonso Rodríguez 0001, Eduardo Fernández-Medina, Mario Piattini Towards a UML 2.0 Profile for RBAC Modeling in Activity Diagrams. Search on Bibsonomy WOSIS The full citation details ... 2006 DBLP  BibTeX  RDF
1Ahmed Alazzawe, Anis Alazzawe, Asad Nawaz, Duminda Wijesekera Analyzing Preauthentication Timestamps To Crack Kerberos V Passwords. Search on Bibsonomy WOSIS The full citation details ... 2006 DBLP  BibTeX  RDF
1Martin Steinebach, Sascha Zmudzinski, Sergey Neichtadt Robust-audio-hash Synchronized Audio Watermarking. Search on Bibsonomy WOSIS The full citation details ... 2006 DBLP  BibTeX  RDF
1Yi Hu, Brajendra Panda Modeling Deceptive Action in Virtual Communities. Search on Bibsonomy WOSIS The full citation details ... 2006 DBLP  BibTeX  RDF
1Sébastien Canard, Fabrice Clerc, Benjamin Morin A Secure Universal Loyalty Card. Search on Bibsonomy WOSIS The full citation details ... 2006 DBLP  BibTeX  RDF
1William G. Sirett, John A. MacDonald, Keith Mayes, Constantinos Markantonakis Secure Deployment of Applications to Fielded Devices and Smart Cards. Search on Bibsonomy WOSIS The full citation details ... 2006 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 179 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license