The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for integrity with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1974 (18) 1975-1976 (29) 1977-1978 (25) 1979-1980 (35) 1981-1982 (26) 1983 (23) 1984 (26) 1985 (28) 1986 (20) 1987 (30) 1988 (45) 1989 (44) 1990 (63) 1991 (54) 1992 (65) 1993 (66) 1994 (74) 1995 (90) 1996 (97) 1997 (101) 1998 (134) 1999 (151) 2000 (169) 2001 (228) 2002 (270) 2003 (300) 2004 (409) 2005 (493) 2006 (490) 2007 (565) 2008 (544) 2009 (435) 2010 (224) 2011 (355) 2012 (204) 2013 (221) 2014 (223) 2015 (219) 2016 (260) 2017 (261) 2018 (336) 2019 (339) 2020 (332) 2021 (364) 2022 (315) 2023 (354) 2024 (92)
Publication types (Num. hits)
article(2872) book(14) data(3) incollection(84) inproceedings(6137) phdthesis(123) proceedings(13)
Venues (Conferences, Journals, ...)
CoRR(282) iConference(172) IICIS(118) IEEE Access(91) NeuroImage(68) SIGMOD Conference(66) HILT(62) ACSAC(57) ACM Trans. Database Syst.(55) CCS(55) DAC(55) HICSS(53) ISQED(53) Sci. Eng. Ethics(52) Comput. Secur.(50) DATE(50) More (+10 of total 2584)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5416 occurrences of 2387 keywords

Results
Found 9246 publication records. Showing 9246 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Qingfeng Chen, Chengqi Zhang, Shichao Zhang 0001 ENDL: A Logical Framework for Verifying Secure Transaction Protocols. Search on Bibsonomy Knowl. Inf. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Secure transaction protocol, Security, Verification, Integrity, Electronic commerce, Confidentiality
15Pedro Cano, Eloi Batlle, Ton Kalker, Jaap Haitsma A Review of Audio Fingerprinting. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF content-based audio identification, audio information retrieval, watermarking, integrity verification, audio fingerprinting, robust hashing
15Daniele Rossi 0001, André K. Nieuwland, Atul Katoch, Cecilia Metra New ECC for Crosstalk Impact Minimization. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Fault Tolerance, Reliability, Error Correcting Codes, Crosstalk, Signal Integrity
15Reagan W. Moore, Richard Marciano Building preservation environments. Search on Bibsonomy JCDL The full citation details ... 2005 DBLP  DOI  BibTeX  RDF infrastructure independence, persistent archives, authenticity, integrity
15Michael T. Goodrich, Mikhail J. Atallah, Roberto Tamassia Indexing Information for Data Forensics. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF data forensics, data marking, combinatorial group testing, data structures, data integrity, information hiding, tamper detection
15Cristiano Forzan, Davide Pandini A complete methodology for an accurate static noise analysis. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF noise propagation, crosstalk, signal integrity
15Junhu Wang A Comparative Study of Functional Dependencies for XML. Search on Bibsonomy APWeb The full citation details ... 2005 DBLP  DOI  BibTeX  RDF XML tree, scheme file, Data integrity, functional dependency
15Tetsuya Izu, Nobuyuki Kanaya, Masahiko Takenaka, Takashi Yoshioka PIATS: A Partially Sanitizable Signature Scheme. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Sanitizable signature scheme, partial integrity, privacy
15Li Xiao 0001, Xiaodong Zhang 0001, Artur Andrzejak 0001, Songqing Chen Building a Large and Efficient Hybrid Peer-to-Peer Internet Caching System. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF browser caching, communication anonymity, data integrity, peer-to-peer systems, proxy caching, Internet systems
15Xiaocheng Ge, Fiona Polack, Régine Laleau Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment. Search on Bibsonomy CAiSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF access control, Databases, data integrity, security models, development methods
15Yingjiu Li, Huiping Guo, Sushil Jajodia Tamper detection and localization for categorical data using fragile watermarks. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF integrity, database security, fragile watermarking
15Peter Buneman, Wenfei Fan, Scott Weinstein Interaction between path and type constraints. Search on Bibsonomy ACM Trans. Comput. Log. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF types, integrity constraints, semistructured data, implication
15Ira Acharya, Hemendra Kumar Singh Testing of 3G 1xEV-DV Stack - A Case Study. Search on Bibsonomy TestCom The full citation details ... 2003 DBLP  DOI  BibTeX  RDF testing challenges, IUT, 1xEV-DV, EV-DV, DV, reference implementation, 3GPP2, LAC, RLP, L2, L3, packet data channel, PDCHCF, Message Integrity, simulation, Testing, MAC, queues, behavior, task, video conferencing, SDL, formalism, 3G, Signaling, logging, conformance, test automation, formal description techniques, MSC, timers, protocol stack, test scripts, TTCN
15Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong Shao A flexible and scalable authentication scheme for JPEG2000 image codestreams. Search on Bibsonomy ACM Multimedia The full citation details ... 2003 DBLP  DOI  BibTeX  RDF message digest, authentication, data integrity, digital signature, image compression, JPEG2000, one-way hash function, merkle hash tree
15Elisa Bertino, Giovanni Mella, Gianluca Correndo, Elena Ferrari An infrastructure for managing secure update operations on XML data. Search on Bibsonomy SACMAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF distributed updates, integrity check protocols, XML
15Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers Secure program partitioning. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF mutual distrust, distributed systems, integrity, type systems, security policies, Confidentiality, secrecy, declassification, downgrading
15Martin S. Olivier Database Privacy. Search on Bibsonomy SIGKDD Explor. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF dataveillance, integrity, availability, confidentiality, personal data, database privacy
15Michael P. Evans, Steven Furnell A web-based resource migration protocol using WebDAV. Search on Bibsonomy WWW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF link rot, resource locator service, resource migration protocol, web, WebDAV, referential integrity
15Naren Kodali, Duminda Wijesekera Regulating access to SMIL formatted pay-per-view movies. Search on Bibsonomy XML Security The full citation details ... 2002 DBLP  DOI  BibTeX  RDF synchronized multimedia, XML, access control, integrity, encryption, smart card, SMIL, pay-per-view
15April Kwong, Michael Gertz 0001 Authentic Publication of XML Document Data. Search on Bibsonomy WISE (1) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF authentic data publication, XML, data integrity
15Andrew C. Myers, Barbara Liskov Protecting privacy using the decentralized label model. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF principals, integrity, policies, lattice, confidentiality, roles, type checking, information flow controls, declassification, end-to-end, downgrading
15Rolly Intan, Masao Mukaidono Fuzzy Functional Dependency and Its Application to Approximate Data Querying. Search on Bibsonomy IDEAS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF partial fuzzy functional dependency, approximate data querying, approximate data reduction, fuzzy integrity constraints, fuzzy query relations, extended query system, relational databases, projection, fuzzy set theory, conditional probability, approximate joins
15Petra Wohlmacher, Peter Pharow Applications in Health Care using Public-Key Certificates and Attribute Certificates. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures
15Ann Q. Gates, Patricia J. Teller DynaMICs: An Automated and Independent Software-FaultDetection Approach. Search on Bibsonomy HASE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF software-fault detection, software-fault monitoring, hardware-assisted monitoring, constraints, tracing, integrity constraints, verification and validation
15Bert O. de Brock Declarative Specifications of Complex Transactions. Search on Bibsonomy FMLDO - Selected Papers The full citation details ... 1999 DBLP  DOI  BibTeX  RDF transaction design, database dynamics, declarative specifications of database behavior, (static and dynamic) integrity constraints, (allowable versus available) transitions, cascading deletes, adaptations, semantics, Transactions, transaction models
15Antonio Corradi, Rebecca Montanari, Cesare Stefanelli Mobile Agents Protection in the Internet Environment. Search on Bibsonomy COMPSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Multiple-Hops protocol, Security, Internet, Mobile Agents, Integrity
15William Currie Colket Code analysis of saftey-critical and real-time software using ASIS. Search on Bibsonomy SIGAda The full citation details ... 1999 DBLP  DOI  BibTeX  RDF real-time, tasking, safety-critical, code analysis, ASIS, high integrity, Ada language, Ravenscar profile
15Antonio Corradi, Rebecca Montanari, Cesare Stefanelli Security Issues in Mobile Agent Technology. Search on Bibsonomy FTDCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Security, Internet, E-commerce, Mobile Agents, Integrity
15Elisa Bertino, Giovanna Guerrini Extending the ODMG Object Model with Composite Objects. Search on Bibsonomy OOPSLA The full citation details ... 1998 DBLP  DOI  BibTeX  RDF ObjectStore, data models, integrity constraints, object-oriented database systems, composite objects
15Xubo Zhang, Z. Meral Özsoyoglu Implication and Referential Constraints: A New Formal Reasoning. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Semantic integrity constraints, implication constraints, referential constraints, database system, query containment, semantic query optimization, refutation
15Peter Lindsey, Yaowei Liu, Owen Traynor A Generic Model for Fine Grained Configuration Management Including Version Control and Traceability. Search on Bibsonomy Australian Software Engineering Conference The full citation details ... 1997 DBLP  DOI  BibTeX  RDF fine grained configuration management, trusted support, high-integrity software development, formal specification, consistency, requirements, object-oriented database, completeness, traceability, configuration management, version control, prototype system, design documents
15Paul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein Surviving information warfare attacks on databases. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF information warfare attack survival, fault tolerance approach, damaged data, partially repaired data, snapshot algorithm, damage markings, consistency preserving normal transactions, countermeasure transactions, databases, protocol, security of data, integrity constraints, data security, database consistency
15Ian T. Foster, Nicholas T. Karonis, Carl Kesselman, Greg Koenig, Steven Tuecke A Secure Communications Infrastructure for High-Performance Distributed Computing. Search on Bibsonomy HPDC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security-enhanced version, Nexus communication library, security/performance tradeoffs, authenticating, distributed computing, integrity, confidentiality, high-performance, security of data, users, resources, secure communications, security mechanisms
15Christoph L. Schuba, Eugene H. Spafford A Reference Model for Firewall Technology. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF firewall technology, technological aspect, specialized engineering solution, firewall systems, integrity assurance, centralized security policy, authentication, access control, audit, reference model, computer network management, networking technologies, communications security
15Jane Grimson, Eoghan Felton, Gaye Stephens, William Grimson, Damon Berry Interoperability issues in sharing electronic healthcare records-the Synapses approach. Search on Bibsonomy ICECCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF interoperability issues, electronic healthcare records sharing, Synapses approach, pan-European project, federated database systems, distributed object-oriented environment, clinical integrity, web, standards, open systems, data warehousing, messaging, gateways
15Vijay Varadharajan, Rajan Shankaran, Michael Hitchens Security services and public key infrastructure for ATM networks. Search on Bibsonomy LCN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF ATM protocol stack, security layer, data origin authentication, user plane, key establishment protocol, ATM signaling protocol, call setup procedures, ATM nodes, public key certificate retrieval, public key certificate distribution, B-ISDN Protocol Reference Model, integrity, public key cryptography, confidentiality, ATM networks, public key infrastructure, Certification Authority, security services
15Desmond Kirkpatrick, Alberto L. Sangiovanni-Vincentelli Digital sensitivity: predicting signal interaction using functional analysis. Search on Bibsonomy ICCAD The full citation details ... 1996 DBLP  DOI  BibTeX  RDF layout synthesis, Crosstalk, sensitivity, signal integrity
15Cornelia Boldyreff, Julian Newman, Jorma Taramaa Managing process improvement in virtual software corporations. Search on Bibsonomy WETICE The full citation details ... 1996 DBLP  DOI  BibTeX  RDF virtual software corporations, process improvement management, software development organisation process, competitive demands, large multi-site multi-organization virtual software corporations, virtual software configuration, process measurement data collection, geographically distributed projects, exception condition handling, generic process model, process quality standards, software engineering, reliability, integrity, software process improvement, software development process, software process modelling, software development management
15Mark W. Maier Developments in System Architecting. Search on Bibsonomy ICECCS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Systems Architecting, multi-disciplinary system development, naval architecting, civil architecting, research needs, education programs, data integrity, systems analysis, system development
15Liqun Chen 0002, Dieter Gollmann, Chris J. Mitchell Key distribution without individual trusted authentification servers. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF key distribution systems, authentication servers, key distribution protocols, cross checksum scheme, cryptography, trust, protocols, data integrity, message authentication, symmetric encryption
15Philip M. Johnson, Carleton A. Moore Investigating strong collaboration with the Annotated Egret Navigator. Search on Bibsonomy WETICE The full citation details ... 1995 DBLP  DOI  BibTeX  RDF strong collaboration, Annotated Egret Navigator, structured hypertext document, graduate seminar, indirect authoring mechanisms, direct authoring mechanisms, context-sensitive change information, intermediate work products, groupware, hypermedia, database integrity, agent-based architecture
15Michelle M. Hugue, Richard C. Scalzo Specifying fault tolerance in large complex computing systems. Search on Bibsonomy ICECCS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF fault tolerance specification, large complex computing systems, requirements specification phase, fault hypothesis, partially correct system, system fault hypothesis, health management function, performance, real-time systems, reliability, formal specification, integrity, fault tolerant computing, software reliability, availability, safety, confidentiality, software performance evaluation, maintainability, timeliness, quality of service requirements, system behaviors, system life-cycle, dependability constraints
15Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden A Logic for Reasoning About Security. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF composition knowledge, security, integrity, policy, time, logic, secrecy, permission, obligation, possible-worlds
15Filippo Cacace, Stefano Ceri, Letizia Tanca, Stefano Crespi-Reghizzi Designing and Prototyping Data-Intensive Applications in the Logres and Algres Programming Environment. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF Logres, Algres, persistent data, declarative requirements, imperative code, formal specification, prototyping, programming environment, programming environments, rapid prototyping, relational algebra, integrity constraints, software prototyping, human errors, data-intensive applications, application specifications, object-oriented data modeling, rule-based programming, database language
15John Mylopoulos, Alexander Borgida, Matthias Jarke, Manolis Koubarakis Telos: Representing Knowledge About Information Systems. Search on Bibsonomy ACM Trans. Inf. Syst. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF belief time, history time, knowledge base, integrity constraints, class, metaclass, instance, Telos, temporal knowledge, proposition, deductive rules
15Victor M. Markowitz, Johann A. Makowsky Identifying Extended Entity-Relationship Object Structures in Relational Schemas. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF extended entity-relationship object structures, relation-schemes, key dependencies, key-based inclusion dependencies, referential integrity constraints, EER schema, EER-convertible, EER object structures, normalization procedure, relational database schemas, object-oriented database schemas, semantics, object-oriented programming, relational databases, database management systems, database theory, normal form, relational schemas
15Che-Fn Yu, Virgil D. Gligor A Specification and Verification Method for Preventing Denial of Service. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF failure absence, integrity violations, user agreements, simultaneity conditions, denial-of-service prevention, formal specification, concurrent programs, security of data, specification method, verification method
15Bipin C. Desai Performance of a Composite Attribute and Join Index. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF attribute index, composite index, B/sub c/-tree, B/sup +/-tree, common data values, structural integrity constraints, database, data structures, relational databases, tuples, join index
15Joobin Choobineh, Michael V. Mannino, Jay F. Nunamaker Jr., Benn R. Konsynski An Expert Database Design System Based on Analysis of Forms. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF expert database design system, form model, form selection, entity identification, attribute attachment, relationship identification, cardinality identification, form flow, designer dialog, expert systems, expert systems, database management systems, integrity constraints, conceptual schema
15Tzonelih Hwang, T. R. N. Rao Secret Error-Correcting Codes (SECC). Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF Algebraic-Code Cryptosystem, Block Chaining, Ciphertext-Only Attach, Chosen -Plaintext Attach, Cryptographic Parameter, Data Reliability, Data Secrecy, JEEC, Known-Plaintext Attach, SECC, Work Factor, Cryptography, Data Integrity, Cryptanalysis, Data Security, Cryptosystems, Cryptology, Data Authenticity
15Sushil V. Pillai, Ramanatham Gudipati, Leszek Lilien Design issues and an architecture for a heterogenous multidatabase system. Search on Bibsonomy ACM Conference on Computer Science The full citation details ... 1987 DBLP  DOI  BibTeX  RDF distributed systems, reliability, database management systems, heterogeneity, semantic integrity
15Michael Stonebraker, Eugene Wong 0001, Peter Kreps, Gerald Held The Design and Implementation of INGRES. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1976 DBLP  DOI  BibTeX  RDF data sublanguage, query decompositon, concurrency, relational database, data integrity, query language, protection, data organization, nonprocedural language, database optimization
15Peter P. Chen The Entity-Relationship Model - Toward a Unified View of Data. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1976 DBLP  DOI  BibTeX  RDF Data Base Task Group, data definition and manipulation, data integrity and consistency, entity set model, logigcal view of data, semantics of data, data models, database design, relational model, network model, entity-relationship model
15Naftaly H. Minsky On Interaction with Data Bases. Search on Bibsonomy SIGMOD Workshop, Vol. 1 The full citation details ... 1974 DBLP  DOI  BibTeX  RDF Sub-schema, Privacy, Integrity, Abstraction, Data base
14Flavio Lombardi, Roberto Di Pietro Transparent security for cloud. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF threat handling, security, cloud computing, virtual machine monitor
14Jin Taek Kim, Jeong-Ho Kho, Min-Seok Hong, Choul Woong Son, Do-Won Lee, Sang-Jo Youk, Geuk Lee A study on intrusion protection techniques against Linux kernel backdoor. Search on Bibsonomy ICHIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Chaoting Xuan, John A. Copeland, Raheem A. Beyah Shepherding Loadable Kernel Modules through On-demand Emulation. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Rootkit Prevention, On-demand Emulation, Emulator, Virtual Machine Monitor
14Alodeep Sanyal, Abhisek Pan, Sandip Kundu A study on impact of loading effect on capacitive crosstalk noise. Search on Bibsonomy ISQED The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Qian Wang 0002, Cong Wang 0001, Jin Li 0002, Kui Ren 0001, Wenjing Lou Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Mihir Bellare, Chanathip Namprempre Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Message authentication, Authenticated encryption, Symmetric encryption, Concrete security
14Ashish Kundu, Elisa Bertino A New Model for Secure Dissemination of XML Content. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part C The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Zemao Chen, Xiaoping Wu, Weimin Tang An Executable Code Authorization Model for Secure Operating System. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Mingyan Li, Casey K. Fung, Krishna Sampigethaya, Richard Robinson, Radha Poovendran, Rainer Falk, Florian Kohlmayer, Andreas Koepf Public key based authentication for secure integration of sensor data and RFID. Search on Bibsonomy HeterSanet The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication, workflow, RFID, sensor, tag, certificate, public key
14Mikhail J. Atallah, YounSun Cho, Ashish Kundu Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors. Search on Bibsonomy ICDE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Lingli Deng, Yeping He, Ziyao Xu Service Authenticity in P2P File-Sharing. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Francis M. David, Ellick Chan, Jeffrey C. Carlyle, Roy H. Campbell Cloaker: Hardware Supported Rootkit Concealment. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, operating system, rootkit, ARM
14Bassem Elkarablieh, Sarfraz Khurshid Juzi: a tool for repairing complex data structures. Search on Bibsonomy ICSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF systematic search, symbolic execution, assertions, error recovery, data structure repair
14Johannes Osrael, Lorenz Froihofer, Norbert Chlaupek, Karl M. Göschka Availability and Performance of the Adaptive Voting Replication. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Frank Y. W. Law, Kam-Pui Chow, Michael Y. K. Kwan, Pierre K. Y. Lai Consistency Issue on Live Systems Forensics. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Rod Chapman Correctness by construction: putting engineering (back) into software. Search on Bibsonomy SIGAda The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Ravi Sahita, Uday R. Savagaonkar, Prashant Dewan, David Durham Mitigating the Lying-Endpoint Problem in Virtualized Network Access Frameworks. Search on Bibsonomy DSOM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Network Access Framework, Lying Endpoint, Virtualization, Memory Protections
14Brian King, Xiaolan Joy Zhang Securing the Pharmaceutical Supply Chain using RFID. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pharmaceutical supply chain, security, privacy, RFID
14Meng Yu 0001, Wanyu Zang, Barbara Reagor Decentralized Trust Management based on the Reputation of Information Sources. Search on Bibsonomy ICNSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Arati Baliga, Pandurang Kamat, Liviu Iftode Lurking in the Shadows: Identifying Systemic Threats to Kernel Data. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Mohamed Nabeel, Elisa Bertino A structure preserving approach for securing XML documents. Search on Bibsonomy CollaborateCom The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Meng Yu 0001, Wanyu Zang, Peng Liu 0005 Database Isolation and Filtering against Data Corruption Attacks. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Lorenz Froihofer, Karl M. Göschka, Johannes Osrael Middleware Support for Adaptive Dependability. Search on Bibsonomy Middleware The full citation details ... 2007 DBLP  DOI  BibTeX  RDF constraint consistency, adaptivity, Middleware, dependability, replication, inconsistency
14Kiron Vijayasankar, Gopalan Sivathanu, Swaminathan Sundararaman, Erez Zadok Exploiting type-awareness in a self-recovering disk. Search on Bibsonomy StorageSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF type-awareness
14Jedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong Minos: Architectural support for protecting control data. Search on Bibsonomy ACM Trans. Archit. Code Optim. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Control data, worms, buffer overflow
14Weidong Shi, Hsien-Hsin S. Lee Authentication Control Point and Its Implications For Secure Processor Design. Search on Bibsonomy MICRO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Jordi Cabot, Ernest Teniente Incremental Evaluation of OCL Constraints. Search on Bibsonomy CAiSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Boriana Vassileva, Boris Vassilev SBAS Vertical Protection Level Assessment in the Case of Error Reduction. Search on Bibsonomy John Vincent Atanasoff Symposium The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Mohammad Ashiqur Rahaman, Andreas Schaad, Maarten Rits Towards secure SOAP message exchange in a SOA. Search on Bibsonomy SWS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF XML rewriting attack, sOAP account, SOA
14Paolo Falcarin, Riccardo Scandariato, Mario Baldi Remote Trust with Aspect-Oriented Programming. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Jedidiah R. Crandall, Frederic T. Chong A security assessment of the minos architecture. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Wei Zhang 0002 Replication Cache: A Small Fully Associative Cache to Improve Data Cache Reliability. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF write-back cache, in-cache replication, Soft error
14Brendan Hall, Kevin Driscoll 0001, Michael Paulitsch, Samar Dajani-Brown Ringing out Fault Tolerance. A New Ring Network for Superior Low-Cost Dependability. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Lantian Zheng, Andrew C. Myers End-to-End Availability Policies and Noninterference. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Michael Benedikt An Insider's Guide to Logic in Telecommunications Data. Search on Bibsonomy LICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Jordi Cabot, Ernest Teniente Computing the Relevant Instances That May Violate an OCL Constraint. Search on Bibsonomy CAiSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Fangyong Hou, Zhiying Wang 0003, Kui Dai, Yun Liu Protecting Mass Data Basing on Small Trusted Agent. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Atsushi Kurokawa, Masaharu Yamamoto, Nobuto Ono, Tetsuro Kage, Yasuaki Inoue, Hiroo Masuda Capacitance and Yield Evaluations Using a 90-nm Process Technology Based on the Dense Power-Ground Interconnect Architecture. Search on Bibsonomy ISQED The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Daesung Moon, Yongwha Chung, Kiyoung Moon, Sung Bum Pan Secure and Efficient Transmissions of Fingerprint Images for Embedded Processors. Search on Bibsonomy ICIAR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Biometrics, Embedded Processors, Fingerprint Verification
14Murat R. Becer, Ravi Vaidyanathan, Chanhee Oh, Rajendran Panda Crosstalk noise control in an SoC physical design flow. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Soon-Kyeong Kim, David A. Carrington A Formal Object-Oriented Approach to defining Consistency Constraints for UML Models. Search on Bibsonomy Australian Software Engineering Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Reiner Sailer, Trent Jaeger, Xiaolan Zhang 0001, Leendert van Doorn Attestation-based policy enforcement for remote access. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF trusted computing, security management, remote access
14Dominic Osborne, Derek Abbott, Matthew Sorell, Derek Rogers Multiple embedding using robust watermarks for wireless medical images. Search on Bibsonomy MUM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF authentication, medical images, semi-fragile watermarking
14Praveen Madiraju, Rajshekhar Sunderraman A mobile agent approach for global database constraint checking. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF multi-database systems, mobile agents, global constraints
14Jedidiah R. Crandall, Frederic T. Chong Minos: Control Data Attack Prevention Orthogonal to Memory Model. Search on Bibsonomy MICRO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Andrew K. Wright, John A. Kinast, Joe McCarty Low-Latency Cryptographic Protection for SCADA Communications. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 9246 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license