The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "iNetSec"( http://dblp.L3S.de/Venues/iNetSec )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ifip11-4

Publication years (Num. hits)
2009 (15) 2010 (15) 2011-2015 (23) 2016 (1)
Publication types (Num. hits)
inproceedings(50) proceedings(4)
Venues (Conferences, Journals, ...)
iNetSeC(54)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 54 publication records. Showing 54 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jan Camenisch, Dogan Kesdogan (eds.) Open Problems in Network Security - IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers Search on Bibsonomy iNetSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dominik Herrmann, Jens Lindemann 0001, Ephraim Zimmer, Hannes Federrath Anonymity Online for Everyone: What Is Missing for Zero-Effort Privacy on the Internet? Search on Bibsonomy iNetSeC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christoph Hofmann, Elke Franz 0001, Silvia Santini A Metric for Adaptive Routing on Trustworthy Paths. Search on Bibsonomy iNetSeC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hristina Mihajloska, Danilo Gligoroski, Simona Samardjiska Reviving the Idea of Incremental Cryptography for the Zettabyte Era Use Case: Incremental Hash Functions Based on SHA-3. Search on Bibsonomy iNetSeC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Daniele Enrico Asoni, Chen Chen 0013, David Barrera 0003, Adrian Perrig On Building Onion Routing into Future Internet Architectures. Search on Bibsonomy iNetSeC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hartmut Richthammer, Sebastian Reif Intrusion Detection in the Smart Grid Based on an Analogue Technique. Search on Bibsonomy iNetSeC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christos Pappas, Raphael M. Reischuk, Adrian Perrig Forwarding Accountability: A Challenging Necessity of the Future Data Plane. Search on Bibsonomy iNetSeC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Harsha K. Kalutarage, Siraj Ahmed Shaikh, Bu-Sung Lee, Chonho Lee, Chai Kiat Yeo Early Warning Systems for Cyber Defence. Search on Bibsonomy iNetSeC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Marko Vukolic The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication. Search on Bibsonomy iNetSeC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ephraim Zimmer, Jens Lindemann 0001, Dominik Herrmann, Hannes Federrath Catching Inside Attackers: Balancing Forensic Detectability and Privacy of Employees. Search on Bibsonomy iNetSeC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Dogan Kesdogan (eds.) Open Problems in Network Security - IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers Search on Bibsonomy iNetSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Endre Bangerter, Stefan Bühlmann, Engin Kirda Efficient and Stealthy Instruction Tracing and Its Applications in Automated Malware Analysis: Open Problems and Challenges. Search on Bibsonomy iNetSeC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Erik Wästlund, Julio Angulo, Simone Fischer-Hübner Evoking Comprehensive Mental Models of Anonymous Credentials. Search on Bibsonomy iNetSeC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Stephan Groß, Alexander Schill Towards User Centric Data Governance and Control in the Cloud. Search on Bibsonomy iNetSeC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Martin Szydlowski, Manuel Egele, Christopher Kruegel, Giovanni Vigna Challenges for Dynamic Analysis of iOS Applications. Search on Bibsonomy iNetSeC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Inger Anne Tøndel, Åsmund Ahlmann Nyre Towards a Similarity Metric for Comparing Machine-Readable Privacy Policies. Search on Bibsonomy iNetSeC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Marine Minier, Raphael C.-W. Phan Energy-Efficient Cryptographic Engineering Paradigm. Search on Bibsonomy iNetSeC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sebastian Biedermann, Stefan Katzenbeisser 0001 Detecting Computer Worms in the Cloud. Search on Bibsonomy iNetSeC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Muhammad Rizwan Asghar, Giovanni Russello Flexible and Dynamic Consent-Capturing. Search on Bibsonomy iNetSeC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Marcel Heupel, Dogan Kesdogan Towards Usable Interfaces for Proof Based Access Rights on Mobile Devices. Search on Bibsonomy iNetSeC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo Securing Data Provenance in the Cloud. Search on Bibsonomy iNetSeC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Laurent Bussard, Ulrich Pinsdorf Abstract Privacy Policy Framework: Addressing Privacy Problems in SOA. Search on Bibsonomy iNetSeC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Milica Milutinovic, Koen Decroix, Vincent Naessens, Bart De Decker Commercial Home Assistance (eHealth) Services. Search on Bibsonomy iNetSeC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Valentin S. Kisimov, Maria Dubovitskaya (eds.) Open Research Problems in Network Security - IFIP WG 11.4 International Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised Selected Papers Search on Bibsonomy iNetSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sandra Steinbrecher The Need for Interoperable Reputation Systems. Search on Bibsonomy iNetSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alapan Arnab, Tobias Martin, Andrew Hutchison Practical Experiences with Purenet, a Self-Learning Malware Prevention System. Search on Bibsonomy iNetSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dimiter Velev, Plamena Zlateva Cloud Infrastructure Security. Search on Bibsonomy iNetSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Louis Jordaan, Basie von Solms A Biometrics-Based Solution to Combat SIM Swap Fraud. Search on Bibsonomy iNetSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dimitrina Polimirova, Eugene Nickolov Real-Time System for Assessing the Information Security of Computer Networks. Search on Bibsonomy iNetSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Raphael C.-W. Phan, Ahmad Roshidi Amran, John N. Whitley, David J. Parish Evidential Notions of Defensibility and Admissibility with Property Preservation. Search on Bibsonomy iNetSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Anton Palazov Some Technologies for Information Security Protection in Weak-Controlled Computer Systems and Their Applicability for eGovernment Services Users. Search on Bibsonomy iNetSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Raphael C.-W. Phan, John N. Whitley, David J. Parish Adversarial Security: Getting to the Root of the Problem. Search on Bibsonomy iNetSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Benjamin Kellermann Open Research Questions of Privacy-Enhanced Event Scheduling. Search on Bibsonomy iNetSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Edita Djambazova, Magnus Almgren, Kiril Dimitrov, Erland Jonsson Emerging and Future Cyber Threats to Critical Systems. Search on Bibsonomy iNetSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Basie von Solms Securing the Internet: Fact or Fiction? Search on Bibsonomy iNetSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna Are BGP Routers Open to Attack? An Experiment. Search on Bibsonomy iNetSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Stefano Ortolani, Mauro Conti, Bruno Crispo, Roberto Di Pietro Event Handoff Unobservability in WSN. Search on Bibsonomy iNetSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vassilka Tchifilionova Security and Privacy Implications of Cloud Computing - Lost in the Cloud. Search on Bibsonomy iNetSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Veliko Ivanov, Monika Tzaneva, Alexandra Murdjeva, Valentin S. Kisimov Securing the Core University Business Processes. Search on Bibsonomy iNetSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vincent Naessens, Mehmet Tahir Sandikkaya, Jorn Lapon, Kristof Verslype, Pieter Verhaeghe, Girma Nigusse, Bart De Decker Privacy Policies, Tools and Mechanisms of the Future. Search on Bibsonomy iNetSeC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Roel Peeters, Markulf Kohlweiss, Bart Preneel Threshold Things That Think: Authorisation for Resharing. Search on Bibsonomy iNetSeC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Carlos Javier Hernández-Castro, Arturo Ribagorda Remotely Telling Humans and Computers Apart: An Unsolved Problem. Search on Bibsonomy iNetSeC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1San-Tsai Sun, Konstantin Beznosov Open Problems in Web 2.0 User Content Sharing. Search on Bibsonomy iNetSeC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Manuel Egele, Engin Kirda, Christopher Kruegel Mitigating Drive-By Download Attacks: Challenges and Open Problems. Search on Bibsonomy iNetSeC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jan Seedorf Security Issues for P2P-Based Voice- and Video-Streaming Applications. Search on Bibsonomy iNetSeC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Erik-Oliver Blass, Martina Zitterbart Tailored Security and Safety for Pervasive Computing. Search on Bibsonomy iNetSeC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Christian Cachin Rational Protocols. Search on Bibsonomy iNetSeC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Dang Vinh Pham, Joss Wright Discussing Anonymity Metrics for Mix Based Anonymity Approaches. Search on Bibsonomy iNetSeC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Dogan Kesdogan (eds.) iNetSec 2009 - Open Research Problems in Network Security - IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers Search on Bibsonomy iNetSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Leucio Antonio Cutillo, Refik Molva, Thorsten Strufe Leveraging Social Links for Trust and Privacy in Networks. Search on Bibsonomy iNetSeC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Michael S. Kirkpatrick, Elisa Bertino Context-Dependent Authentication and Access Control. Search on Bibsonomy iNetSeC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Craig Asher, Jean-Philippe Aumasson, Raphael C.-W. Phan Security and Privacy Preservation in Human-Involved Networks. Search on Bibsonomy iNetSeC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Erik-Oliver Blass, Refik Molva New Directions in RFID Security. Search on Bibsonomy iNetSeC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Raphael C.-W. Phan, John N. Whitley, David J. Parish On the Design of Forgiving Biometric Security Systems. Search on Bibsonomy iNetSeC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #54 of 54 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license