The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "NordSec"( http://dblp.L3S.de/Venues/NordSec )

URL (DBLP): http://dblp.uni-trier.de/db/conf/nordsec

Publication years (Num. hits)
2009 (21) 2010 (20) 2011 (18) 2012 (19) 2013 (22) 2014 (17) 2015 (17) 2016 (17) 2017 (19) 2018 (30) 2019 (18) 2020 (15) 2021-2022 (34) 2023 (18) 2024 (1)
Publication types (Num. hits)
inproceedings(271) proceedings(15)
Venues (Conferences, Journals, ...)
NordSec(286)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 28 occurrences of 27 keywords

Results
Found 286 publication records. Showing 286 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Kaie Maennel, Sten Mäses, Olaf Maennel Cyber Hygiene: The Big Picture. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ronan Lashermes, Hélène Le Bouder, Gaël Thomas 0002 Hardware-Assisted Program Execution Integrity: HAPEI. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alexander Bajic, Georg T. Becker Attack Simulation for a Realistic Evaluation and Comparison of Network Security Techniques. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Stewart Sentanoe, Benjamin Taubmann, Hans P. Reiser Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zheng Yang 0001, Mohsin Khan, Wanping Liu, Jun He On Security Analysis of Generic Dynamic Authenticated Group Key Exchange. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nils Gruschka (eds.) Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hanne Rygge, Audun Jøsang Threat Poker: Solving Security and Privacy Threats in Agile Software Development. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Barbara Krumay, Edward W. N. Bernroider, Roman Walser Evaluation of Cybersecurity Management Controls and Metrics of Critical Infrastructures: A Literature Review Considering the NIST Cybersecurity Framework. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sebastian Zillien, Steffen Wendzel Detection of Covert Channels in TCP Retransmissions. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Charalampos Stylianopoulos, Linus Johansson, Oskar Olsson, Magnus Almgren CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUs. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1George Teseleanu Unifying Kleptographic Attacks. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Matilda Backendal, Mihir Bellare, Jessica Sorrell, Jiahao Sun The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tobias Pulls, Rasmus Dahlberg Steady - A Simple End-to-End Secure Logging System. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan Next Generation Cryptographic Ransomware. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ehtesham Zahoor, Asim Ikram, Sabina Akhtar, Olivier Perrin 0001 Authorization Policies Specification and Consistency Management within Multi-cloud Environments. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Avikarsha Mandal, Frederik Armknecht, Erik Zenner Privacy-Preserving Distributed Economic Dispatch Protocol for Smart Grid. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rémi Géraud, Mirko Koscina, Paul Lenczner, David Naccache, David Saulpic Generating Functionally Equivalent Programs Having Non-isomorphic Control-Flow Graphs. Search on Bibsonomy NordSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thibault de Balthasar, Julio C. Hernandez-Castro An Analysis of Bitcoin Laundry Services. Search on Bibsonomy NordSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thanh Bui, Tuomas Aura GPASS: A Password Manager with Group-Based Access Control. Search on Bibsonomy NordSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Núria Costa, Ramiro Martínez, Paz Morillo Proof of a Shuffle for Lattice-Based Cryptography. Search on Bibsonomy NordSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kaie Maennel, Rain Ottis, Olaf Maennel Improving and Measuring Learning Effectiveness at Cyber Defense Exercises. Search on Bibsonomy NordSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rosario Giustolisi Free Rides in Denmark: Lessons from Improperly Generated Mobile Transport Tickets. Search on Bibsonomy NordSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christian Roth 0002, Lukas Hartmann, Dogan Kesdogan PARTS - Privacy-Aware Routing with Transportation Subgraphs. Search on Bibsonomy NordSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Richard Gay, Jinwei Hu, Heiko Mantel, Johannes Schickel Towards Accelerated Usage Control Based on Access Correlations. Search on Bibsonomy NordSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ryuji Miyoshi, Hiroaki Yamamoto, Hiroshi Fujiwara, Takashi Miyazaki Practical and Secure Searchable Symmetric Encryption with a Small Index. Search on Bibsonomy NordSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevicius (eds.) Secure IT Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings Search on Bibsonomy NordSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Aurélien Palisse, Antoine Durand, Hélène Le Bouder, Colas Le Guernic, Jean-Louis Lanet Data Aware Defense (DaD): Towards a Generic and Practical Ransomware Countermeasure. Search on Bibsonomy NordSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Alberto Geniola, Markku Antikainen, Tuomas Aura A Large-Scale Analysis of Download Portals and Freeware Installers. Search on Bibsonomy NordSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christophe Kiennert, Nesrine Kaaniche, Maryline Laurent, Pierre-Olivier Rocher, Joaquín García-Alfaro Anonymous Certification for an e-Assessment Framework. Search on Bibsonomy NordSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Peeter Laud, Alisa Pankova Privacy-Preserving Frequent Itemset Mining for Sparse and Dense Data. Search on Bibsonomy NordSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ahto Buldas, Risto Laanoja, Ahto Truu A Server-Assisted Hash-Based Signature Scheme. Search on Bibsonomy NordSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Danielle Morgan, Arnis Parsovs Using the Estonian Electronic Identity Card for Authentication to a Machine. Search on Bibsonomy NordSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Go Ohtake, Reihaneh Safavi-Naini, Liang Feng Zhang Outsourcing of Verifiable Attribute-Based Keyword Search. Search on Bibsonomy NordSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Farzaneh Abed, Francesco Berti, Stefan Lucks Is RCB a Leakage Resilient Authenticated Encryption Scheme? Search on Bibsonomy NordSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sabarathinam Chockalingam, Wolter Pieters, André Teixeira 0001, Pieter H. A. J. M. van Gelder Bayesian Network Models in Cyber Security: A Systematic Review. Search on Bibsonomy NordSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Joeri de Ruiter A Tale of the OpenSSL State Machine: A Large-Scale Black-Box Analysis. Search on Bibsonomy NordSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rasmus Dahlberg, Tobias Pulls, Roel Peeters Efficient Sparse Merkle Trees - Caching Strategies and Secure (Non-)Membership Proofs. Search on Bibsonomy NordSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jose Rubio-Hernan, Luca De Cicco, Joaquín García-Alfaro Event-Triggered Watermarking Control to Handle Cyber-Physical Integrity Attacks. Search on Bibsonomy NordSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gustavo Gonzalez Granadillo, Ender Alvarez, Alexander Motzek, Matteo Merialdo, Joaquín García-Alfaro, Hervé Debar Towards an Automated and Dynamic Risk Management Response System. Search on Bibsonomy NordSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Martin Potthast, Christian Forler, Eik List, Stefan Lucks Passphone: Outsourcing Phone-Based Web Authentication While Protecting User Privacy. Search on Bibsonomy NordSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Maqsood Ahmad 0001, Bruno Crispo, Teklay Gebremichael Empirical Analysis on the Use of Dynamic Code Updates in Android and Its Security Implications. Search on Bibsonomy NordSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sampsa Rauti, Samuel Laurén, Joni Uitto, Shohreh Hosseinzadeh, Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen A Survey on Internal Interfaces Used by Exploits and Implications on Interface Diversification. Search on Bibsonomy NordSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Oualid Koucham, Stéphane Mocanu, Guillaume Hiet, Jean-Marc Thiriet, Frédéric Majorczyk Detecting Process-Aware Attacks in Sequential Control Systems. Search on Bibsonomy NordSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Peeter Laud, Martin Pettai Secure Multiparty Sorting Protocols with Covert Privacy. Search on Bibsonomy NordSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Olga Gadyatskaya, Andra-Lidia Lezza, Yury Zhauniarovich Evaluation of Resource-Based App Repackaging Detection in Android. Search on Bibsonomy NordSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Min Gu, Zaruhi Aslanyan, Christian W. Probst Understanding How Components of Organisations Contribute to Attacks. Search on Bibsonomy NordSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shay Gueron, Fabian Schlieker Speeding up R-LWE Post-quantum Key Exchange. Search on Bibsonomy NordSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Pierre-Edouard Fabre, Hervé Debar, Jouni Viinikka, Grégory Blanc ML: DDoS Damage Control with MPLS. Search on Bibsonomy NordSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bernhards Blumbergs, Mauno Pihelgas, Markus Kont, Olaf Maennel, Risto Vaarandi Creating and Detecting IPv6 Transition Mechanism-Based Information Exfiltration Covert Channels. Search on Bibsonomy NordSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kimmo Halunen, Visa Antero Vallivaara Secure, Usable and Privacy-Friendly User Authentication from Keystroke Dynamics. Search on Bibsonomy NordSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sandra König, Stefan Schauer, Stefan Rass A Stochastic Framework for Prediction of Malware Spreading in Heterogeneous Networks. Search on Bibsonomy NordSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Billy Bob Brumley, Juha Röning (eds.) Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings Search on Bibsonomy NordSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Billy Bob Brumley Faster Binary Curve Software: A Case Study. Search on Bibsonomy NordSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Edgar Alonso Lopez-Rojas, Stefan Axelsson Using the RetSim Fraud Simulation Tool to Set Thresholds for Triage of Retail Fraud. Search on Bibsonomy NordSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Luigi Catuogno, Clemente Galdi, Giuseppe Persiano Guaranteeing Dependency Enforcement in Software Updates. Search on Bibsonomy NordSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sanna Suoranta, Lari Haataja, Tuomas Aura Electronic Citizen Identities and Strong Authentication. Search on Bibsonomy NordSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Martin Leth Pedersen, Michael Hedegaard Sørensen, Daniel Lux, Ulrik Nyman, René Rydhof Hansen The Timed Decentralised Label Model. Search on Bibsonomy NordSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hayretdin Bahsi, Olaf Manuel Maennel A Conceptual Nationwide Cyber Situational Awareness Framework for Critical Infrastructures. Search on Bibsonomy NordSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hannes Holm, Martin Karresand, Arne Vidström, Erik Westring A Survey of Industrial Control System Testbeds. Search on Bibsonomy NordSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hongyu Jin 0001, Panos Papadimitratos Resilient Collaborative Privacy for Location-Based Services. Search on Bibsonomy NordSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Huihui Yang, Vladimir A. Oleshchuk An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees. Search on Bibsonomy NordSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sonja Buchegger, Mads Dam (eds.) Secure IT Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings Search on Bibsonomy NordSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ijlal Loutfi, Audun Jøsang FIDO Trust Requirements. Search on Bibsonomy NordSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Artem Voronkov, Stefan Lindskog, Leonardo A. Martucci Challenges in Managing Firewalls. Search on Bibsonomy NordSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bernd Jäger, Christian Röpke 0001, Iris Adam, Thorsten Holz Multi-layer Access Control for SDN-Based Telco Clouds. Search on Bibsonomy NordSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Dan Gorton IncidentResponseSim: An Agent-Based Simulation Tool for Risk Management of Online Fraud. Search on Bibsonomy NordSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Markku-Juhani O. Saarinen, Billy Bob Brumley WHIRLBOB, the Whirlpool Based Variant of STRIBOB. Search on Bibsonomy NordSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Daniel Bosk, Martin Kjellqvist, Sonja Buchegger Towards Perfectly Secure and Deniable Communication Using an NFC-Based Key-Exchange Scheme. Search on Bibsonomy NordSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Benjamin Greschbach, Guillermo Rodríguez-Cano, Tomas Ericsson, Sonja Buchegger Design of a Privacy-Preserving Document Submission and Grading System. Search on Bibsonomy NordSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kalpana Gondi, A. Prasad Sistla, V. N. Venkatakrishnan DEICS: Data Erasure in Concurrent Software. Search on Bibsonomy NordSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Aapo Kalliola, Tuomas Aura, Sanja Scepanovic Denial-of-Service Mitigation for Internet Services. Search on Bibsonomy NordSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Alberto Trombetta, Giuseppe Persiano, Stefano Braghin Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption. Search on Bibsonomy NordSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Marco Giunti Static Semantics of Secret Channel Abstractions. Search on Bibsonomy NordSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Håkon Jacobsen, Rune Erlend Jensen, Mohamed El-Hadedy 0001 π-Cipher: Authenticated Encryption for Big Data. Search on Bibsonomy NordSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Anika Pflug, Christoph Busch 0001 Segmentation and Normalization of Human Ears Using Cascaded Pose Regression. Search on Bibsonomy NordSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Aleksandr Lenin, Jan Willemson, Dyan Permata Sari Attacker Profiling in Quantitative Security Assessment Based on Attack Trees. Search on Bibsonomy NordSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Elena Reshetova, Janne Karhunen, Thomas Nyman, N. Asokan Security of OS-Level Virtualization Technologies. Search on Bibsonomy NordSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Erik Bergström, Rose-Mharie Åhlfeldt Information Classification Issues. Search on Bibsonomy NordSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Siani Pearson Accountability in Cloud Service Provision Ecosystems. Search on Bibsonomy NordSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Karin Bernsmed, Simone Fischer-Hübner (eds.) Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings Search on Bibsonomy NordSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Julio Angulo, Erik Wästlund, Johan Högberg What Would It Take for You to Tell Your Secrets to a Cloud? - Studying Decision Factors When Disclosing Information to Cloud Services. Search on Bibsonomy NordSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dan Bogdanov, Sven Laur, Riivo Talviste A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation. Search on Bibsonomy NordSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Markku Antikainen, Tuomas Aura, Mikko Särelä Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch. Search on Bibsonomy NordSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Frédéric Besson, Nataliia Bielova, Thomas P. Jensen Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach. Search on Bibsonomy NordSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ahto Buldas, Ahto Truu, Risto Laanoja, Rainer Gerhards Efficient Record-Level Keyless Signatures for Audit Logs. Search on Bibsonomy NordSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Liangyu Xu, Armin B. Cremers Patients' Privacy Protection against Insurance Companies in eHealth Systems. Search on Bibsonomy NordSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dimiter Milushev, Dave Clarke 0001 Incremental Hyperproperty Model Checking via Games. Search on Bibsonomy NordSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alessio Antonini, Alessandro Barenghi, Gerardo Pelosi Security Analysis of Building Automation Networks - Threat Model and Viable Mitigation Techniques. Search on Bibsonomy NordSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Thierry Sans, Iliano Cervesato, Soha Hussein Controlling Data Flow with a Policy-Based Programming Language for the Web. Search on Bibsonomy NordSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bastian Braun, Christian v. Pollak, Joachim Posegga A Survey on Control-Flow Integrity Means in Web Application Frameworks. Search on Bibsonomy NordSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ahto Buldas, Andres Kroonmaa, Risto Laanoja Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees. Search on Bibsonomy NordSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nabil Hachem, Joaquín García-Alfaro, Hervé Debar An Adaptive Mitigation Framework for Handling Suspicious Network Flows via MPLS Policies. Search on Bibsonomy NordSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marina Krotofil, Alvaro A. Cárdenas Resilience of Process Control Systems to Cyber-Physical Attacks. Search on Bibsonomy NordSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mike Ter Louw, Phu H. Phung, Rohini Krishnamurti, Venkat N. Venkatakrishnan SafeScript: JavaScript Transformation for Policy Enforcement. Search on Bibsonomy NordSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Martin Pettai, Peeter Laud Dynamics and Secure Information Flow for a Higher-Order Pi-Calculus. Search on Bibsonomy NordSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marcin Nagy, N. Asokan, Jörg Ott PeerShare: A System Secure Distribution of Sensitive Data among Social Contacts. Search on Bibsonomy NordSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Willem Burgers, Roel Verdult, Marko C. J. D. van Eekelen Prevent Session Hijacking by Binding the Session to the Cryptographic Network Credentials. Search on Bibsonomy NordSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alessio Di Mauro, Xenofon Fafoutis, Sebastian Mödersheim, Nicola Dragoni Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs. Search on Bibsonomy NordSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tigist Ayalew, Tigist Kidane, Bengt Carlsson Identification and Evaluation of Security Activities in Agile Projects. Search on Bibsonomy NordSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Klara Stokes Graph k-Anonymity through k-Means and as Modular Decomposition. Search on Bibsonomy NordSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 286 (100 per page; Change: )
Pages: [<<][1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license