The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for integrity with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1974 (18) 1975-1976 (29) 1977-1978 (25) 1979-1980 (35) 1981-1982 (26) 1983 (23) 1984 (26) 1985 (28) 1986 (20) 1987 (30) 1988 (45) 1989 (44) 1990 (63) 1991 (54) 1992 (65) 1993 (66) 1994 (74) 1995 (90) 1996 (97) 1997 (101) 1998 (134) 1999 (151) 2000 (169) 2001 (228) 2002 (270) 2003 (300) 2004 (409) 2005 (493) 2006 (490) 2007 (565) 2008 (544) 2009 (435) 2010 (224) 2011 (355) 2012 (204) 2013 (221) 2014 (223) 2015 (219) 2016 (260) 2017 (261) 2018 (336) 2019 (339) 2020 (332) 2021 (364) 2022 (315) 2023 (354) 2024 (92)
Publication types (Num. hits)
article(2872) book(14) data(3) incollection(84) inproceedings(6137) phdthesis(123) proceedings(13)
Venues (Conferences, Journals, ...)
CoRR(282) iConference(172) IICIS(118) IEEE Access(91) NeuroImage(68) SIGMOD Conference(66) HILT(62) ACSAC(57) ACM Trans. Database Syst.(55) CCS(55) DAC(55) HICSS(53) ISQED(53) Sci. Eng. Ethics(52) Comput. Secur.(50) DATE(50) More (+10 of total 2584)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5416 occurrences of 2387 keywords

Results
Found 9246 publication records. Showing 9246 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
10Mallik Kandala, Wei Zhang 0002, Laurence Tianruo Yang An Area-Efficient Approach to Improving Register File Reliability against Transient Errors. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Junjie Ni, Yongxin Zhu 0001, Wei Guo An Improved RAIM Scheme for Processing Multiple Outliers in GNSS. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Kevin W. Hamlen, Bhavani Thuraisingham Secure peer-to-peer networks for trusted collaboration. Search on Bibsonomy CollaborateCom The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Jae-Hyeok Jang, Myung-Chan Park, Young-Shin Park, Byoung-Soo Koh, Yong-Rak Choi A Mechanism for Securing Digital Evidences in Pervasive Environments. Search on Bibsonomy APWeb/WAIM Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Philip David Smart, Alia I. Abdelmoty, Baher A. El-Geresy, Christopher B. Jones A Framework for Combining Rules and Geo-ontologies. Search on Bibsonomy RR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Xiao Qin 0001 Security-aware resource management for real-time applications on clusters. Search on Bibsonomy CLUSTER The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10An'an Luo, Chuang Lin 0002, Zhen Chen 0001, Xuehai Peng, Peter D. Ungsunan TNC-compatible NAC System implemented on Network Processor. Search on Bibsonomy LCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF TNC, AES algorithm, network processor, network access control
10Masoom Alam, Jean-Pierre Seifert, Xinwen Zhang A Model-Driven Framework for Trusted Computing Based Systems. Search on Bibsonomy EDOC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Marco Panunzio, Tullio Vardanega A Metamodel-Driven Process Featuring Advanced Model-Based Timing Analysis. Search on Bibsonomy Ada-Europe The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Lenin Singaravelu, Calton Pu Fine-Grain, End-to-End Security for Web Service Compositions. Search on Bibsonomy IEEE SCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Nicolas Sklavos 0001, Paris Kitsos, K. Papadopoulos, Odysseas G. Koufopavlou Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security. Search on Bibsonomy J. Supercomput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF WTLS implementation, WAP security, wireless networks, wireless communications, security system
10Sudharshan S. Vazhkudai, Xiaosong Ma, Vincent W. Freeh, Jonathan W. Strickland, Nandan Tammineedi, Tyler A. Simon, Stephen L. Scott Constructing collaborative desktop storage caches for large scientific datasets. Search on Bibsonomy ACM Trans. Storage The full citation details ... 2006 DBLP  DOI  BibTeX  RDF serverless storage system, storage networking, storage resoucce management, storage scavenging, striped storage, parallel I/O, Distributed storage, scientific data management, storage cache
10Brian Rogers, Milos Prvulovic, Yan Solihin Efficient data protection for distributed shared memory multiprocessors. Search on Bibsonomy PACT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DSM multiprocessor, memory encryption and authentication, data security
10Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai Digitally signed document sanitizing scheme based on bilinear maps. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF digital signature, information disclosure, privacy issue
10Leo Freitas, Ana Cavalcanti 0001, Jim Woodcock 0001 Taking Our Own Medicine: Applying the Refinement Calculus to State-Rich Refinement Model Checking. Search on Bibsonomy ICFEM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Renan G. Cattelan, Shan He 0002, Darko Kirovski Prototyping a novel platform for free-trade of digital content. Search on Bibsonomy WebMedia The full citation details ... 2006 DBLP  DOI  BibTeX  RDF digital content trading, mobile electronic marketing, off-line economies, electronic commerce, mobile commerce, viral marketing, word-of-mouth
10Luciano Caroprese, Cristian Molinaro, Ester Zumpano Integrating and Querying P2P Deductive Databases. Search on Bibsonomy IDEAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Mikael Asplund, Simin Nadjm-Tehrani Post-partition reconciliation protocols for maintaining consistency. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF reconciliation protocol, partition, consistency, availability, trade-off
10Sunghyuck Hong, Noé Lopez-Benitez Enhanced Group Key Generation Algorithm. Search on Bibsonomy NOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Stephen Chong, Andrew C. Myers Decentralized Robustness. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Yintang Dai, Shiyong Zhang Multi-Agent based Data Integration in Real-world. Search on Bibsonomy CIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Multi-Agent System (MAS), Data Integration, Data Warehouse
10Alban Gabillon, Laurent Gallon Availability Constraints for Avionic Data Buses. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Feng Cao, Cullen Jennings Providing Response Identity and Authentication in IP Telephony. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Secure Enterprise Architecture, Voice Spam, Spam in IP Telephony (SPIT), IP Telephony, VoIP Security
10Mingchu Li, Hongyan Yao Recovery Mechanism of Cooperative Process Chain in Grid. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF process cooperation, processrecovery mechanism, grid
10Johannes Osrael, Lorenz Froihofer, Karl M. Göschka, Stefan Beyer, Pablo Galdámez, Francesc D. Muñoz-Escoí A System Architecture for Enhanced Availability of Tightly Coupled Distributed Systems. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Zijing Tan, Wei Wang 0009, Jianjun Xu, Baile Shi Repairing Inconsistent XML Documents. Search on Bibsonomy KSEM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Anna Queralt, Ernest Teniente Reasoning on UML Class Diagrams with OCL Constraints. Search on Bibsonomy ER The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough DSO: Dependable Signing Overlay. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF P2P overlay, digital signing service, fault-tolerance, dependable, intrusion-tolerance
10Janne Lahtiranta, Kai Kimppa Elderly People and Emerging Threats of the Internet and New Media. Search on Bibsonomy I3E The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Adam Pridgen, Christine Julien 0001 SMASH: Modular Security for Mobile Agents. Search on Bibsonomy SELMAS (LNCS) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Erkut Sinan Ayla, Attila Ozgit An architecture for end-to-end and inter-domain trusted mail delivery service. Search on Bibsonomy ISCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Heiko Rossnagel, Tobias Scherner Secure Mobile Notifications of Civilians in Case of a Disaster. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc-Talon Spread-Spectrum Substitution watermarking Game. Search on Bibsonomy ICME The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Istemi Ekin Akkus, Öznur Özkasap, M. Reha Civanlar Secure Transmission of Video on an End System Multicast Using Public Key Cryptography. Search on Bibsonomy MRCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Vivek Nigam, Masud H. Chowdhury, Roland Priemer Compound noise analysis in digital circuits using blind source separation. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Yun Ji Na, Il Seok Ko, Gun Heui Han A Design of the Flexible Mobile Agents Based on Web. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Mobile Agent, Intelligent Agent, Flexibility
10Andrew B. Kahng, Bao Liu 0001, Xu Xu 0001 Constructing Current-Based Gate Models Based on Existing Timing Library. Search on Bibsonomy ISQED The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Zijing Tan, Wei Wang 0009, Baile Shi Extending Tree Automata to Obtain Consistent Query Answer from Inconsistent XML Document. Search on Bibsonomy IMSCCS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Bettina Fazzinga, Sergio Flesca, Filippo Furfaro, Francesco Parisi DART: A Data Acquisition and Repairing Tool. Search on Bibsonomy EDBT Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao, Ashraf U. Kazi Attacking Confidentiality: An Agent Based Approach. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Mikael Asplund, Simin Nadjm-Tehrani Formalising Reconciliation in Partitionable Networks with Distributed Services. Search on Bibsonomy RODIN Book The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Ashish Gehani, Surendar Chandra PAST: Probabilistic Authentication of Sensor Timestamps. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Ashish Kundu, Elisa Bertino Secure Dissemination of XML Content Using Structure-based Routing. Search on Bibsonomy EDOC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Jordi Cabot, Ernest Teniente Constraint Support in MDA Tools: A Survey. Search on Bibsonomy ECMDA-FA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Diletta Cacciagrano, Flavio Corradini, Rosario Culmone, Leonardo Vito Dynamic Constraint-Based Invocation of Web Services. Search on Bibsonomy WS-FM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Youtao Zhang, Jun Yang 0002, Yongjing Lin, Lan Gao Architectural support for protecting user privacy on trusted processors. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10N. Venkateswaran 0002, S. Balaji, V. Sridhar Fault tolerant bus architecture for deep submicron based processors. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF deep submicron technology, fault tolerance, interconnect, electromigration
10Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Mrinmoy Ghosh Towards the issues in architectural support for protection of software execution. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, encryption, attack, tamper resistance, copy protection
10Adrian Baldwin, Simon Shiu Enabling shared audit data. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Notarisation, Audit, Timestamp, Secure hardware
10Benoît Fraikin, Marc Frappier, Régine Laleau State-based versus event-based specifications for information systems: a comparison of B and eb3. Search on Bibsonomy Softw. Syst. Model. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF State-based paradigm, Event-based paradigm, eb3, Formal specification, Information system, Process algebra, B
10Hung-Ming Chen, Li-Da Huang, I-Min Liu, Martin D. F. Wong Simultaneous power supply planning and noise avoidance in floorplan design. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Amir H. Ajami, Kaustav Banerjee, Massoud Pedram Modeling and analysis of nonuniform substrate temperature effects on global ULSI interconnects. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Paul C. van Oorschot, Anil Somayaji, Glenn Wurster Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF self-hashing, operating system kernels, software protection, Tamper resistance, checksumming, application security, processor design
10Elisa Bertino, Ravi S. Sandhu Database Security-Concepts, Approaches, and Challenges. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Data confindentiality, relational and object databases, XML, data privacy
10Sergio Flesca, Filippo Furfaro, Sergio Greco, Ester Zumpano Querying and Repairing Inconsistent XML Data. Search on Bibsonomy WISE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Guangyan Zhang, Jiwu Shu, Wei Xue, Weimin Zheng MagicStore: A New Out-of-Band Virtualization System in SAN Environments. Search on Bibsonomy NPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10David Dagon, Wenke Lee, Richard J. Lipton Protecting Secret Data from Insider Attacks. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Chang-Joo Moon, Woojin Paik, Young-Gab Kim, JuHum Kwon The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Gustaf Naeser, Kristina Lundqvist Component-Based Approach to Run-Time Kernel Specification and Verification. Search on Bibsonomy ECRTS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Zoran Majkic Querying with Negation in Data Integration Systems. Search on Bibsonomy IDEAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Ramon E. Moore Order relations and rigor in computing. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Ramon E. Moore Order relations and rigor in computing. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF intervals, reliable computations
10Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, Yongdae Kim Remote Software-Based Attestation for Wireless Sensors. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Tao Zhang 0037, Xiaotong Zhuang, Santosh Pande Building Intrusion-Tolerant Secure Software. Search on Bibsonomy CGO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Ismail Ahmad, Hong Tat Ewe A Model for Secure Knowledge Sharing. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Peng Li, Steve Zdancewic Practical Information-flow Control in Web-Based Information Systems. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Francisco Rodríguez 0003, Juan José Serrano Control Flow Error Checking with ISIS. Search on Bibsonomy ICESS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Alexander F. Gelbukh, Namo Kang, Sangyong Han Combining Sources of Evidence for Recognition of Relevant Passages in Texts. Search on Bibsonomy ISSADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10V. Radha 0001, N. Hemanth Kumar EISA - An Enterprise Application Security Solution for Databases. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Johan A. Pouwelse, Pawel Garbacki, Dick H. J. Epema, Henk J. Sips The Bittorrent P2P File-Sharing System: Measurements and Analysis. Search on Bibsonomy IPTPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Ritesh Mukherjee, J. William Atwood Multicast Group Authentication. Search on Bibsonomy Net-Con The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Anthony S. Ruocco Experiences using SPARK in an undergraduate CS course. Search on Bibsonomy SIGAda The full citation details ... 2005 DBLP  DOI  BibTeX  RDF computer science education, computer science curriculum, SPARK
10Errin W. Fulp, Stephen J. Tarsa Trie-Based Policy Representations for Network Firewalls. Search on Bibsonomy ISCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Gary Gostin, Jean-Francois Collard, Kirby Collins The architecture of the HP Superdome shared-memory multiprocessor. Search on Bibsonomy ICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10N. S. Nagaraj Dealing with interconnect process variations. Search on Bibsonomy SLIP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Ming Yao, Kun Peng, Ed Dawson Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10André K. Nieuwland, Atul Katoch, Daniele Rossi 0001, Cecilia Metra Coding Techniques for Low Switching Noise in Fault Tolerant Busses. Search on Bibsonomy IOLTS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Reagan W. Moore, Joseph F. JáJá, Robert Chadduck Mitigating Risk of Data Loss in Preservation Environments. Search on Bibsonomy MSST The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Bharat B. Madan, Shashi Phoha, Kishor S. Trivedi StackOFFence: A Technique for Defending Against Buffer Overflow Attacks. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Glenn Wurster, Paul C. van Oorschot, Anil Somayaji A Generic Attack on Checksumming-Based Software Tamper Resistance. Search on Bibsonomy S&P The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Elaine Shi, Adrian Perrig, Leendert van Doorn BIND: A Fine-Grained Attestation Service for Secure Distributed Systems. Search on Bibsonomy S&P The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Praveen Madiraju, Rajshekhar Sunderraman An efficient constraint planning algorithm for multidatabases. Search on Bibsonomy AICCSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Eun-Jun Yoon, Kee-Young Yoo New Efficient Simple Authenticated Key Agreement Protocol. Search on Bibsonomy COCOON The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Modification attack, Elliptic curve discrete logarithm problem, Authenticated key agreement, Password guessing attack
10Esam Khan, M. Watheq El-Kharashi, Fayez Gebali, Mostafa I. H. Abd-El-Barr An FPGA Design of a Unified Hash Engine for IPSec Authentication. Search on Bibsonomy IWSOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Ning Dong 0002, Jaijeet S. Roychowdhury Automated nonlinear Macromodelling of output buffers for high-speed digital applications. Search on Bibsonomy DAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF I/O buffer macromodeling, nonlinear macromodeling
10Sabre A. Schnitzer, Robert A. Johnson, Henry Hoyt Secured storage using secureParserTM. Search on Bibsonomy StorageSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF encryption, file system, parsing, fabric
10John K. Debenham A multiagent system manages collaboration in emergent processes. Search on Bibsonomy AAMAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF collaboration, negotiation, business process management
10Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF secure shell, stateful decryption, Authenticated encryption, security proofs
10Hye Yeon Kim, Frederick T. Sheldon Testing Software Requirements with Z and Statecharts Applied to an Embedded Control System. Search on Bibsonomy Softw. Qual. J. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF requirements specification and validation, fault-tolerance, consistency, completeness, Statecharts, Z
10Algirdas Avizienis, Jean-Claude Laprie, Brian Randell, Carl E. Landwehr Basic Concepts and Taxonomy of Dependable and Secure Computing. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF fault forecasting, security, fault tolerance, trust, Dependability, attacks, errors, failures, faults, vulnerabilities, fault removal
10Michael Pramateftakis, Tobias Oelbaum, Klaus Diepold Authentication of MPEG-4-based surveillance video. Search on Bibsonomy ICIP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Hao Cai, Andy J. Wellings A Real-Time Isolate Specification for Ravenscar-Java. Search on Bibsonomy ISORC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Qi He, Tok Wang Ling Extending and inferring functional dependencies in schema transformation. Search on Bibsonomy CIKM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF schematic discrepancy, functional dependency, schema integration, multidatabase
10Claudia Kretzschmar, Torsten Bitterlich, Dietmar Müller 0001 A High-Level DSM Bus Model for Accurate Exploration of Transmission Behaviour and Power Estimation of Global System Buses. Search on Bibsonomy PATMOS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Tawfiq S. M. Barhoom, Shen-sheng Zhang Trusted Exam Marks System at IUG Using XML-Signature. Search on Bibsonomy CIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF XML Digital Signature, Multi-Signed Document, non-repudiation, XML security
10Lynn Choi, Yong Shin Enforcement of Architectural Safety Guards to Deter Malicious Code Attacks through Buffer Overflow Vulnerabilities. Search on Bibsonomy ARCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Zhaofeng Ma, Boqin Feng Fail-Stop Authentication Protocol for Digital Rights Management in Adaptive Information Retrieval System. Search on Bibsonomy WAIM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Roderick Chapman, Adrian Hilton 0002 Enforcing security and safety models with an information flow analysis tool. Search on Bibsonomy SIGAda The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Bell-LaPadula, Dolev-Yao, SPARK Ada, security, Ada, safety, information flow
10Paul Ruth, Dongyan Xu, Bharat K. Bhargava, Fred Regnier E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities. Search on Bibsonomy iTrust The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #1301 - #1400 of 9246 (100 per page; Change: )
Pages: [<<][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19]
[20][21][22][23][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license