The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SECURWARE"( http://dblp.L3S.de/Venues/SECURWARE )

URL (DBLP): http://dblp.uni-trier.de/db/conf/securware

Publication years (Num. hits)
2007 (37) 2008 (66) 2009 (51) 2010 (46)
Publication types (Num. hits)
inproceedings(196) proceedings(4)
Venues (Conferences, Journals, ...)
SECURWARE(200)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 125 occurrences of 103 keywords

Results
Found 200 publication records. Showing 200 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Daniel J. Martinez, Juan M. Marin, Jorge Bernal Bernabé, Manuel Gil Pérez, Antonio Fernandez Gómez-Skarmeta Design-Time Learning for Operational Planning Improvement. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Dariusz Caban, Wojciech Zamojski Dependability Analysis of Information Systems with Hierarchical Reconfiguration of Services. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Nuno Amálio, George Spanoudakis From Monitoring Templates to Security Monitoring and Threat Detection. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sandhya Khurana, Neelima Gupta FEEPVR: First End-to-End Protocol to Secure Ad Hoc Networks with Variable Ranges against Wormhole Attacks. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Wilson Goudalo, Dominique Seret Toward the Engineering of Security of Information Systems (ESIS): UML and the IS Confidentiality. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Carlos Aguilar Melchor, Benoît Crespin, Philippe Gaborit, Vincent Jolivet, Pierre Rousseau High-Speed Private Information Retrieval Computation on GPU. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Thomas Gamer, Christoph P. Mayer, Martina Zitterbart Distack -- A Framework for Anomaly-Based Large-Scale Attack Detection. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ilkka Norros, Pirkko Kuusela, Pekka Savola A Dependability Case Approach to the Assessment of IP Networks. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ioannis G. Askoxylakis, Damien Sauveron, Constantinos Markantonakis, Theodore Tryfonas, Apostolos Traganitis A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Maite Avelino, Francisco de la Torre Advanced Rule-Based Techniques in Mission Critical Systems. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jesús J. Martinez Molina, Miguel A. Hernández Ruíz, Manuel Gil Pérez, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta Event-Driven Architecture for Intrusion Detection Systems Based on Patterns. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Antonio San Martino, Xavier Perramon Defending E-Banking Services: Antiphishing Approach. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Masaru Takesue A Protection Scheme against the Attacks Deployed by Hiding the Violation of the Same Origin Policy. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Aleksandar Kircanski, Amr M. Youssef A Related-Key Attack on TREYFER. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Cynthia Y. Lester, Frank Jamerson Designing an Undergraduate Software Security Course. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Cynthia Y. Lester, Hira N. Narang, Chung-Han Chen Infusing Information Assurance into an Undergraduate CS Curriculum. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Vasile Florian Pais, Viorica Stancalie Providing Secure Access to Unsecure Web Services. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Oluwafemi O. Ajayi, Richard O. Sinnott, Anthony Stell Towards Decentralised Security Policies for e-Health Collaborations. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1André Cotton, Maurice Israël, Julien Borgel Molecular Approach Paves the Way towards High Resilience for Large Mission-Critical Information Systems. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Roland Schmitz Public Key Cryptography: A Dynamical Systems Perspective. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Fatiha Benali, Stéphane Ubéda, Véronique Legrand Collaborative Approach to Automatic Classification of Heterogeneous Information Security. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ian Castle, Eimear Buckley The Automatic Discovery, Identification and Measurement of Botnets. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1André Cotton, Oana Dini, Antonio Fernandez Gómez-Skarmeta, Mihaela Ion, Manuela Popescu, Masaru Takesue (eds.) Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  BibTeX  RDF
1Imre Kocsis, György Csertán, Péter László Pásztor, András Pataricza Dependability and Security Metrics in Controlling Infrastructure. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Giacomo Verticale On the Portability of Trained Machine Learning Classifiers for Early Application Identification. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Gasca, Angel Jesus Varela-Vaca Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Rafael Bosse Brinhosa, Carlos Becker Westphall, Carla Merkle Westphall A Security Framework for Input Validation. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Przemyslaw Rodwald, Janusz Stoklosa Family of Parameterized Hash Algorithms. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sarosh Hashmi, John Brooke Authentication Mechanisms for Mobile Ad-Hoc Networks and Resistance to Sybil Attack. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Shu-Lin Chen, Stanley Chow, Christophe Gustave, Dmitri Vinokurov Prototyping a New Identity Authentication Framework for IP Telephony. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yannick Carlinet, Ludovic Mé, Hervé Debar, Yvon Gourhant Analysis of Computer Infection Risk Factors Based on Customer Network Usage. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1HwanJin Lee, InKyung Jeun, Kilsoo Chun, Junghwan Song A New Anti-phishing Method in OpenID. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Pedro R. M. Inácio, Mário M. Freire, Manuela Pereira, Paulo P. Monteiro Analysis of the Impact of Intensive Attacks on the Self-Similarity Degree of the Network Traffic. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Khaled Gaaloul, Andreas Schaad, Ulrich Flegel, François Charoy A Secure Task Delegation Model for Workflows. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ángel Cuevas, Paul El Khoury, Laurent Gomez, Annett Laube Security Patterns for Capturing Encryption-Based Access Control to Sensor Data. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Eric Y. Chen, Mitsutaka Itoh Scalable Detection of SIP Fuzzing Attacks. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Marco Domenico Aime, Paolo Carlo Pomi, Marco Vallini Policy-Driven System Configuration for Dependability. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Nikolaos Chatzis, Enric Pujol Email Worm Mitigation by Controlling the Name Server Response Rate. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Frederic Stumpf, Claudia Eckert 0001 Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Martin Floeck, Lothar Litz Activity- and Inactivity-BasedApproaches to Analyze an Assisted Living Environment. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Imad M. Abbadi, Muntaha Alawneh Preventing Insider Information Leakage for Enterprises. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Fuwen Liu, Hartmut König Security Policy Management for Peer Group Meetings. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Artur Hecker On System Security Metrics and the Definition Approaches. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Marco Domenico Aime, Andrea S. Atzeni Generation of Diagnostic Plans for Large ICT Systems. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Xiaoming Lu, Matt Spear, Karl N. Levitt, Norman S. Matloff, Shyhtsun Felix Wu A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ayesha Altaf, Rabia Sirhindi, Attiq Ahmed A Novel Approach against DoS Attacks in WiMAX Authentication Using Visual Cryptography. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yuka Ikebe, Takehiro Nakayama, Masaji Katagiri, Satoshi Kawasaki, Hirotake Abe, Takahiro Shinagawa, Kazuhiko Kato Efficient Anomaly Detection System for Mobile Handsets. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Anders Moen Hagalisletto Proving Trust Locally. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jean-Michel Sahut Security and Adoption of Internet Payment. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Marek Woda, Tomasz Walkowiak Agent Based Approach to Events Monitoring in Complex Information Systems. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Rainer Falk, Steffen Fries Security Governance for Enterprise VoIP Communication. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Gasca, Angel Jesus Varela-Vaca Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Juan Manuel Marín Pérez, Jorge Bernal Bernabé, Daniel J. Martínez-Manzano, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta Towards the Definition of a Web Service Based Management Framework. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sameerchand Pudaruth, Nevin Vunka Jungum, Soulakshmee D. Ghurbhurrun, Leckraj Nagowah Controlling Access to Location-Based Services in Vehicular Mobile Pervasive Environments. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Anders Moen Hagalisletto, Lars Strand Formal Modeling of Authentication in SIP Registration. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Audun Jøsang, Touhid Bhuiyan Optimal Trust Network Analysis with Subjective Logic. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Cheun Ngen Chong, Dan Jiang, Jiagang Zhang, Long Guo Anti-counterfeiting with a Random Pattern. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Mihaela Ion, Hristo Koshutanski, Volker Hoyer, Luigi Telesca Rating Agencies Interoperation for Peer-to-Peer Online Transactions. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1H. Rezaei Ghaleh, M. A. Doustari A New Approach for Secure and Portable OS. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Kreetta Askola, Rauli Puuperä, Pekka Pietikäinen, Juhani Eronen, Marko Laakso, Kimmo Halunen, Juha Röning Vulnerability Dependencies in Antivirus Software. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Maurice Israël, Julien Borgel, André Cotton Heuristics to Perform Molecular Decomposition of Large Mission-Critical Information Systems. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Marcin Dabrowski, Piotr Pacyna Generic and Complete Three-Level Identity Management Model. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jan Feyereisl, Uwe Aickelin ToLeRating UR-STD. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Lari Iso-Anttila, Jorma Ylinen, Pekka Loula A Proposal to Improve IKEv2 negotiation. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Vukasin Pejovic, Slobodan Bojanic, Carlos Carreras Adding Value to TCP/IP Based Information exchange Security by Specialized Hardware. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Daniel-Ioan Curiac, Daniel T. Iercan, Octavian Dranga, Florin Dragan 0002, Ovidiu Banias Chaos-Based Cryptography: End of the Road? Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Monia Loulou, Mohamed Tounsi 0001, Ahmed Hadj Kacem, Mohamed Jmaiel A Formal Approach to prevent Attacks on Mobile Agent Systems. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Vukasin Pejovic, Ivana Kovacevic, Slobodan Bojanic, Corado Leita, Jelena Popovic, Octavio Nieto-Taladriz Migrating a HoneyDepot to Hardware. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Adam Wierzbicki Evaluating a New Reputation Algorithm With Consideration For Fairness. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jens Heider, Julian Schütte Security made easy: Achieving user-friendly communication protection in ad-hoc situations. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Lourdes López-Santidrián, Luis Redondo, José-Fernán Martínez, Manuel Ramiro, Vicente Hernández, Francisco A. B. Bonilla, Fermín Bretón SECUAREA: Security in physical and logical areas. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Hristo Koshutanski, Mihaela Ion, Luigi Telesca Distributed Identity Management Model for Digital Ecosystems. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Xiaomeng Su, Damiano Bolzoni, Pascal van Eck Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Han-Shik Kim, Byung-Seok Kang, Sangheon Pack, Chul-Hee Kang Route Investigation for Secure Routing in Mobile Ad-hoc Networks. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Pierre Parrend, Samuel Galice, Stéphane Frénot, Stéphane Ubéda Identity-Based Cryptosystems for Enhanced Deployment of OSGi Bundles. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Josef Noll, Mohammad M. R. Chowdhury, György Kálmán, Juan Miguel Gómez 0001 Semantically supported Authentication and Privacy in Social Networks. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Lourdes Peñalver, Oana Andreea Dini, Judie Mulholland, Octavio Nieto-Taladriz (eds.) Proceedings of the First International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2007, October 14-20, 2007, Valencia, Spain Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  BibTeX  RDF
1Sergejus Sosunovas, Olegas Vasilecas Four security certification levels for IT Managers and Staff in the Public Sector. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jorge Belenguer, Carlos Miguel Tavares Calafate A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Noura A. Saleh, Hoda N. Boghdady, Samir I. Shaheen, Ahmed M. Darwish 0001 A Quasi-Lossless Data Embedding Technique Based on Euclidean Distance Calculation. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Pedro Malagón, Juan Carlos Vallejo, José Manuel Moya Dynamic environment evaluation for reliable AmI applications based on untrusted sensor. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Zorana Bankovic, Slobodan Bojanic, Octavio Nieto-Taladriz, Atta Badii Increasing Detection Rate of User-to-Root Attacks Using Genetic Algorithms. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Haiyong Chen, Hongwei Sun, Kwok-Yan Lam A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jacques Saraydaryan, Véronique Legrand, Stéphane Ubéda Evaluation of Deviating Alerts coming from Behavioral Intrusion Detection System. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Marga Nácher, Carlos Miguel Tavares Calafate, Juan-Carlos Cano, Pietro Manzoni Evaluation of the Impact of Multipath Data Dispersion for Anonymous TCP Connections. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ignacio Blanquer, Vicente Hernández, Damià Segrelles, Erik Torres Long-term storage and management of encrypted biomedical data in real scenarios. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Masaru Takesue A Scheme for Protecting the Information Leakage Via Portable Devices. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Carlos Nuno da Cruz Ribeiro Robust sensor self-initialization: Whispering to avoid intruders. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Arnaud Dury, Sergiy Boroday, Alexandre Petrenko, Volkmar Lotz Formal Verification of Business Workflows and Role Based Access Control Systems. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Tewfiq El Maliki, Jean-Marc Seigneur A Survey of User-centric Identity Management Technologies. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Mehrez Essafi, Lamia Labed Jilani, Henda Hajjami Ben Ghézala Towards a Comprehensive View of Secure Software Engineering. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Yeonjung Kang, Hyangjin Lee, Kilsoo Chun, Junghwan Song Classification of Privacy Enhancing Technologies on Life-cycle of Information. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Nikolaos Chatzis Motivation for Behaviour-Based DNS Security: A Taxonomy of DNS-Related Internet Threats. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Raquel Lacuesta Gilaberte, Lourdes Peñalver Herrero Automatic Configuration of Ad-Hoc Networks: Establishing unique IP Link-Local Addresses. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Olivier Powell, Jean-Marc Seigneur, Luminita Moraru Trustworthily Forwarding Sensor Networks Information to the Internet. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Benjamin Fontan, Sara Mota, Pierre de Saqui-Sannes, Thierry Villemur Temporal Verification in Secure Group Communication System Design. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Marek Kumpost Data Preparation for User Profiling from Traffic Log. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Mohammad M. R. Chowdhury, Juan Miguel Gómez 0001, Josef Noll, Ángel García-Crespo SemID: Combining Semantics with Identity Management. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Hédi Hamdi, Adel Bouhoula, Mohamed Mosbah 0001 A Software Architecture for Automatic Security Policy Enforcement in Distributed Systems. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 200 (100 per page; Change: )
Pages: [<<][1][2]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license