The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for integrity with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1974 (18) 1975-1976 (29) 1977-1978 (25) 1979-1980 (35) 1981-1982 (26) 1983 (23) 1984 (26) 1985 (28) 1986 (20) 1987 (30) 1988 (45) 1989 (44) 1990 (63) 1991 (54) 1992 (65) 1993 (66) 1994 (74) 1995 (90) 1996 (97) 1997 (101) 1998 (134) 1999 (151) 2000 (169) 2001 (228) 2002 (270) 2003 (300) 2004 (409) 2005 (493) 2006 (490) 2007 (565) 2008 (544) 2009 (435) 2010 (224) 2011 (355) 2012 (204) 2013 (221) 2014 (223) 2015 (219) 2016 (260) 2017 (261) 2018 (336) 2019 (339) 2020 (332) 2021 (364) 2022 (315) 2023 (354) 2024 (92)
Publication types (Num. hits)
article(2872) book(14) data(3) incollection(84) inproceedings(6137) phdthesis(123) proceedings(13)
Venues (Conferences, Journals, ...)
CoRR(282) iConference(172) IICIS(118) IEEE Access(91) NeuroImage(68) SIGMOD Conference(66) HILT(62) ACSAC(57) ACM Trans. Database Syst.(55) CCS(55) DAC(55) HICSS(53) ISQED(53) Sci. Eng. Ethics(52) Comput. Secur.(50) DATE(50) More (+10 of total 2584)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5416 occurrences of 2387 keywords

Results
Found 9246 publication records. Showing 9246 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
14Giuliano Casale, Stefano Zanero GIVS: Integrity Validation for Grid Security. Search on Bibsonomy International Conference on Computational Science (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Alin Deutsch, Bertram Ludäscher, Alan Nash Rewriting Queries Using Views with Access Patterns Under Integrity Constraints. Search on Bibsonomy ICDT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Stefano Grivet-Talocia, Igor S. Stievano, Ivan A. Maio, Flavio G. Canavero Linear and nonlinear macromodels for power/signal integrity. Search on Bibsonomy ISCAS (6) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Nobuyuki Nishiguchi An advance RTL to GDS2 design methodology for 90 nm and below system LSIs to solve timing closure, signal integrity and design for manufacturing. Search on Bibsonomy ISCAS (6) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Martin Jandl, Alexander Szep, Robert Smeikal, Karl M. Göschka Increasing Availability by Sacrificing Data Integrity - A Problem Statement. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Dwaine E. Clarke, G. Edward Suh, Blaise Gassend, Ajay Sudan, Marten van Dijk, Srinivas Devadas Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data. Search on Bibsonomy S&P The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Thomas Werner, Claus Vetter Data integrity in electric utility IT systems: a case study. Search on Bibsonomy ETFA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Leopoldo E. Bertossi, Loreto Bravo, Enrico Franconi, Andrei Lopatenko Complexity and Approximation of Fixing Numerical Attributes in Databases Under Integrity Constraints. Search on Bibsonomy DBPL The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Ajoy Kumar Palit, Volker Meyer, Walter Anheier, Jürgen Schlöffel ABCD Modeling of Crosstalk Coupling Noise to Analyze the Signal Integrity Losses on the Victim Interconnect in DSM Chips. Search on Bibsonomy VLSI Design The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Michael J. Smith 0004, Marie desJardins A framework for decomposing reputation in MAS into competence and integrity. Search on Bibsonomy AAMAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Sophie Cockcroft The Design and Implementation of a Repository for the Management of Spatial Data Integrity Constraints. Search on Bibsonomy GeoInformatica The full citation details ... 2004 DBLP  DOI  BibTeX  RDF spatial data quality, user interface, repository, business rules, system development, database constraints
14Fabian Vargas 0001, Rubem Dutra Ribeiro Fagundes, Daniel Barros Jr., Diogo B. Brum, Eduardo Luis Rhod Merging a DSP-Oriented Signal Integrity Technique and SW-Based Fault Handling Mechanisms to Ensure Reliable DSP Systems. Search on Bibsonomy J. Electron. Test. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF digital signal processing (DSP) systems, electromagnetic interference (EMI), speech recognition system (SRS), on-line testing, noise immunity
14Robyn R. Lutz, Ines Carmen Mikulski Ongoing Requirements Discovery in High-Integrity Systems. Search on Bibsonomy IEEE Softw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF requirements/specifications management, maintenance and enhancement, software and system safety, error processing, distribution, product metrics
14Josep Rius Vázquez, José Pineda de Gyvez Power Supply Noise Monitor for Signal Integrity Faults. Search on Bibsonomy DATE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Jordi Cabot, Jordi Conesa Automatic Integrity Constraint Evolution due to Model Subtract Operations. Search on Bibsonomy ER (Workshops) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Arso Savanovic, Dusan Gabrijelcic, Borka Jerman-Blazic, Janez Bester Implementation and Evaluation of Integrity Protection Facilities for Active Grids. Search on Bibsonomy International Conference on Computational Science The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Su-Wei Wu, Yao-Wen Chang Efficient power/ground network analysis for power integrity-driven design methodology. Search on Bibsonomy DAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF footnotesize floorplanning, power/ground network
14Adrian J. Hilton, Jon G. Hall High-Integrity Interfacing to Programmable Logic with Ada. Search on Bibsonomy Ada-Europe The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Jaewon Lee, Heeyoul Kim, Hyunsoo Yoon Tamper Resistant Software by Integrity-Based Encryption. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Tamper Resistant Software, Security, Software Protection
14Jagun Kwon, Andy J. Wellings, Steve King 0001 Assessment of the Java programming language for use in high integrity systems. Search on Bibsonomy ACM SIGPLAN Notices The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Vittorio Ricchiuti Power Bus Signal Integrity Improvement and EMI Mitigation on Multilayer High-Speed Digital PCBs with Embedded Capacitance. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Embedded capacitance, power bus, power/ground layers, power supply decoupling, electric field strength, S-parameters
14Andrew J. Fry Integrity-based self-validation test scheduling. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Boris Dahav, Opher Etzion Distributed Enforcement of Integrity Constraints. Search on Bibsonomy Distributed Parallel Databases The full citation details ... 2003 DBLP  DOI  BibTeX  RDF database exception handling, self-stabilization in databases, distributed rules systems, distributed databases
14Andrea Calì, Saverio De Nigris, Domenico Lembo, Gabriele Messineo, Riccardo Rosati 0001, Marco Ruzzi DIS@DIS: A System for Semantic Data Integration under Integrity Constraints. Search on Bibsonomy WISE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Andrea Acquaviva, Alessandro Bogliolo A Bottom-Up Approach to On-Chip Signal Integrity. Search on Bibsonomy PATMOS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Antoni Olivé Integrity Constraints Definition in Object-Oriented Conceptual Modeling Languages. Search on Bibsonomy ER The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Dwaine E. Clarke, Srinivas Devadas, Marten van Dijk, Blaise Gassend, G. Edward Suh Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Roberto Gorrieri, Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli Compositional Verification of Integrity for Digital Stream Signature Protocols. Search on Bibsonomy ACSD The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Mauro Borchardt, Carlos Maziero, Edgard Jamhour An Architecture for On-the-Fly File Integrity Checking. Search on Bibsonomy LADC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Tetsu Iwata, Kaoru Kurosawa On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Wolfgang A. Halang Automated Control Systems for the Safety Integrity Levels 3 and 4. Search on Bibsonomy WORDS Fall The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Anna Formica Finite Satisfiability of Integrity Constraints in Object-Oriented Database Schemas. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF constraint satisfiability (consistency), recursive schemas, axioms of infinity, equality constraints, object-oriented databases
14Paul F. Ross Whatever became of integrity? Search on Bibsonomy Commun. ACM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF World Wide Web (WWW), HTML
14Qiang Gu, Alan Marshall 0001 Using CORBA's Advanced Services to Enhance the Integrity of QoS Management Programmable Networks. Search on Bibsonomy MMNS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Mark A. Hale Maintaining Referential Integrity on the Web. Search on Bibsonomy ICFEM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Andrea Calì, Diego Calvanese, Giuseppe De Giacomo, Maurizio Lenzerini Data Integration under Integrity Constraints. Search on Bibsonomy CAiSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Soon-Kyeong Kim, David A. Carrington A Formal Model of the UML Metamodel: The UML State Machine and Its Integrity Constraints. Search on Bibsonomy ZB The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Harith Alani, Srinandan Dasmahapatra, Nicholas Gibbins, Hugh Glaser, Steve Harris, Yannis Kalfoglou, Kieron O'Hara, Nigel Shadbolt Managing Reference: Ensuring Referential Integrity of Ontologies for the Semantic Web. Search on Bibsonomy EKAW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Amir Attarha, Mehrdad Nourani Test Pattern Generation for Signal Integrity Faults on Long Interconnects. Search on Bibsonomy VTS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Rajgopal Kannan, Sudipta Sarangi, Sibabrata Ray, S. Sitharama Iyengar Minimal Sensor Integrity in Sensor Grids. Search on Bibsonomy ICPP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Darko Kirovski, Milenko Drinic, Miodrag Potkonjak Enabling trusted software integrity. Search on Bibsonomy ASPLOS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Peter P. Puschner, Andy J. Wellings A Profile for High-Integrity Real-Time Java Programs. Search on Bibsonomy ISORC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Hilarie K. Orman Data Integrity for Mildly Active Content. Search on Bibsonomy Active Middleware Services The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Josef Scharinger Construction of Data Dependent Chaotic Permutation Hashes to Ensure Communications Integrity. Search on Bibsonomy ICN (2) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Kostas Marinis, Nikos K. Moshopoulos, Fotis Karoubalis, Kiamal Z. Pekmestzi On the Hardware Implementation of the 3GPP Confidentiality and Integrity Algorithms. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Francesco Buccafurri, Filippo Furfaro, Domenico Saccà Estimating Range Queries Using Aggregate Data with Integrity Constraints: A Probabilistic Approach. Search on Bibsonomy ICDT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Xavier Hannotin, Paolo Maggi, Riccardo Sisto Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study. Search on Bibsonomy Mobile Agents The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Gordon S. Blair, Geoff Coulson, Michael Clarke, Nikos Parlavantzas Performance and Integrity in the OpenORB Reflective Middleware. Search on Bibsonomy Reflection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Richard Rabbat, Tom McNeal, Tim Burke A High-Availability Clustering Architecture with Data Integrity Guarantees. Search on Bibsonomy CLUSTER The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Diomidis Spinellis Reflection as a mechanism for software integrity verification. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF message digest, cryptographic hash function, embedded device
14John R. Michener, Tolga Acar Managing System and Active-Content Integrity. Search on Bibsonomy Computer The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
14Tim Clement, Ian Cottam, Peter K. D. Froome, Claire Jones The Development of a Commercial "Shrink-Wrapped Application" to Safety Integrity Level 2: The DUST-EXPERTTM Story. Search on Bibsonomy SAFECOMP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
14Isabelle Mirbel, Barbara Pernici, Michalis Vazirgiannis Temporal Integrity Constraints in Interactive Multimedia Documents. Search on Bibsonomy ICMCS, Vol. 2 The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
14John K. Debenham Context as Fuzzy Degrees of Acceptability for Knowledge Base Integrity. Search on Bibsonomy CONTEXT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
14Laura Mota-Herranz, Matilde Celma Automatic Generation of Trigger Rules for Integrity Enforcement in Relational Databases with View Definition. Search on Bibsonomy FQAS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
14Rolf Drechsler Verifying Integrity of Decision Diagrams. Search on Bibsonomy SAFECOMP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
14Alan Burns 0001, Brian Dobbing, George Romanski The Ravenscar Tasking Profile for High Integrity Real-Time Programs. Search on Bibsonomy Ada-Europe The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
14W. L. Yeung Semantics-Based Support Tools for High Integrity Ada Software. Search on Bibsonomy Ada-Europe The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
14Akhil Kumar 0001, J. Leon Zhao A Framework for Dynamic Routing and Operational Integrity Controls in a Workflow Management System. Search on Bibsonomy HICSS (3) The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
14Ashish Gupta 0001, Jennifer Widom Local Verification of Global Integrity Constraints in Distributed Databases. Search on Bibsonomy SIGMOD Conference The full citation details ... 1993 DBLP  DOI  BibTeX  RDF SQL, Datalog
14Swarup Reddi Integrity Constraint Enforcement in the Functional Database Language PFL. Search on Bibsonomy BNCOD The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
14Jan Chomicki Real-Time Integrity Constraints. Search on Bibsonomy PODS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
14M. M. Fonkam, W. A. Gray Employing Integrity Constraints for Query Modification and Intensional Answer Generation in Multi-database Systems. Search on Bibsonomy BNCOD The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
14Ken Satoh, Noboru Iwayama A Correct Goal-directed Proof Procedure for a General Logic Program with Integrity Constraints. Search on Bibsonomy ELP The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
14Bart Preneel, David Chaum, Walter Fumy, Cees J. A. Jansen, Peter Landrock, Gert Roelofsen Race Integrity Primitives Evaluation (RIPE): A Status Report. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
14Rainer Manthey Integrity and Recursion: Two Key Issues for Deductive Databases. Search on Bibsonomy IS/KI The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
14Olga De Troyer RIDL*: A Tool for the Computer-Assisted Engineering of Large Databases in the Presence of Integrity Constraints. Search on Bibsonomy SIGMOD Conference The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
14Joos Vandewalle, David Chaum, Walter Fumy, Cees J. A. Jansen, Peter Landrock, Gert Roelofsen A European Call For Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
14Subhasish Mazumdar, David W. Stemple, Tim Sheard Resolving the Tension between Integrity and Security Using a Theorem Prover. Search on Bibsonomy SIGMOD Conference The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
14Udo W. Lipeck, Dasu Feng Construction of Deterministic Transition Graphs from Dynamic Integrity Constraints. Search on Bibsonomy WG The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
14James P. Delgrande Formal Limits on the Automatic Generation and Maintenance of Integrity Constraints. Search on Bibsonomy PODS The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
14Richard A. Smith, Leslie Chalmers, Charles C. Wood Security and audit: Needs of the business sector for security and integrity controls. Search on Bibsonomy ACM Annual Conference The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
14Elizabeth N. Fong, Stephen R. Kimbleton Database semantic integrity for a network data manager. Search on Bibsonomy AFIPS National Computer Conference The full citation details ... 1980 DBLP  DOI  BibTeX  RDF
14Rudolf Bayer On the Integrity of Data Bases and Resource Locking. Search on Bibsonomy IBM Symposium: Data Base Systems The full citation details ... 1975 DBLP  DOI  BibTeX  RDF
10He Wang 0020, Sylvia L. Osborn Static and Dynamic Delegation in the Role Graph Model. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF security, Access controls, integrity and protection
10Carl A. Gunter, David M. Liebovitz, Bradley A. Malin Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF security and privacy protection knowledge, data engineering tools and techniques, security, privacy, integrity and protection, public policy issues
10Shubhashis Sengupta, Vikrant S. Kaulgud, Vibhu Saujanya Sharma Cloud Computing Security-Trends and Research Directions. Search on Bibsonomy SERVICES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Security, Cloud Computing, Data integrity, Survey, confidentiality, Trusted Computing
10Krzysztof Kepa, Fearghal Morgan, Peter Athanas ERDB: An Embedded Routing Database for Reconfigurable Systems. Search on Bibsonomy FPL The full citation details ... 2011 DBLP  DOI  BibTeX  RDF design integrity, security, FPGA, autonomic computing, partial reconfiguration, configurable systems
10Ahmed A. Ataullah, Frank Wm. Tompa Lifecycle Management of Relational Records for External Auditing and Regulatory Compliance. Search on Bibsonomy POLICY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF modeling integrity constraints, object lifecycle modeling, relational database, records management
10Sean Turner Secure/Multipurpose Internet Mail Extensions. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF S/MIME, message integrity, non-repudiation of origin, Internet, authentication, digital signatures, encryption, IETF, data confidentiality
10Weilian Su, Nikolaos V. Alchazidis, Tri T. Ha Multiple RFID Tags Access Algorithm. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Passive RFID systems, framed slotted aloha, progressing scanning algorithm, data integrity, tags, collisions
10Ron Kohavi, Roger Longbotham, Toby Walker Online Experiments: Practical Lessons. Search on Bibsonomy Computer The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Online experiments, Data traps, Statistical integrity constraints, Web technologies
10Haibo Hu 0001, Jianliang Xu 2PASS: Bandwidth-Optimized Location Cloaking for Anonymous Location-Based Services. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security, integrity, distributed applications, Mobile applications, protection
10Kyriacos E. Pavlou, Richard T. Snodgrass The Tiled Bitmap Forensic Analysis Algorithm. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security, temporal databases, Database management, integrity and protection
10Marco A. Casanova, Tanara Lauschner, Luiz André P. Paes Leme, Karin Koogan Breitman, António L. Furtado 0001, Vânia Maria Ponte Vidal Modeling the Mediated Schema Constraints. Search on Bibsonomy ECBS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF mediated schema, Description Logics, Integrity constraint
10Thomas Zefferer, Thomas Knall An electronic-signature based circular resolution database system. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Austrian citizen card, business workflow, circular resolution, qualified electronic signature, integrity, decision making, non-repudiation, electronic document
10Shadi A. Aljawarneh, Maher Dababneh, Hiba Hosseny, Eklass Alwadi A Web Client Authentication System Using Smart Card for e-Systems: Initial Testing and Evaluation. Search on Bibsonomy ICDS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF data integrity, web application, web based-systems, HMAC, security vulnerabilities, tampering, Web authentication
10Niko Popitsch, Bernhard Haslhofer DSNotify: handling broken links in the web of data. Search on Bibsonomy WWW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF instance matching, link integrity, blocking, linked data, broken links
10Takamasa Isohara, Keisuke Takemori, Yutaka Miyake, Ning Qu, Adrian Perrig LSM-Based Secure System Monitoring Using Kernel Protection Schemes. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Secure system monitoring, Linux Security Module, Lifetime kernel code integrity, Mandatory Access Control
10A. A. Adekunle, S. R. Woodhead Zone Based Systems Design Framework for the Realisation of Efficient Block Cipher Based Message Authentication Code Algorithms. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF integrity, block ciphers, information security, message authentication, ubiquitous networks
10Joel Mana Gonçalves Privacy and Information Security in Brazil? Yes, We Have It and We Do It! Search on Bibsonomy ITNG The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Integrity, Management, Policies, Availability, Certification, Confidentiality
10Khan Ferdous Wahid Maximizing Ethernet Security by Switch-Based Single Secure Domain. Search on Bibsonomy ITNG The full citation details ... 2010 DBLP  DOI  BibTeX  RDF global confidentiality, global integrity, LAN security, MACsec, secure device identity
10Steve Barker Personalizing access control by generalizing access control. Search on Bibsonomy SACMAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF integrity, privacy policies, access control models
10Kelvin Nilsen Ada-Java middleware for legacy software modernization. Search on Bibsonomy JTRES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF mixed-language development, software modernization, Java, real-time, Ada, safety-critical, object oriented development, high-integrity systems, mission-critical
10Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil D. Gligor, Adrian Perrig TrustVisor: Efficient TCB Reduction and Attestation. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Minimal TCB, Virtualization, Trusted Computing, TPM, Attestation, Integrity Measurement
10Mikolaj Bojanczyk, Anca Muscholl, Thomas Schwentick, Luc Segoufin Two-variable logic on data trees and XML reasoning. Search on Bibsonomy J. ACM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF XML, consistency, Integrity constraints, DTDs, implications
10Zhenyu Hu, JianChun Jiang, Fuchun Sun 0001 Using IND-CVA for constructing secure communication. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF integrity, authenticated encryption, semantic security, universally composable security, secure channel
10Zhenyu Hu, Fuchun Sun 0001, JianChun Jiang Ciphertext verification security of symmetric encryption schemes. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF reaction attack, IND-CPA, IND-CCA, privacy, integrity, encryption
10Di Ma, Gene Tsudik A new approach to secure logging. Search on Bibsonomy ACM Trans. Storage The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Secure logging, forward secure sequential aggregate (FssAgg) authentication, forward-secure stream integrity, MACs, signatures, truncation attack
Displaying result #901 - #1000 of 9246 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license