|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1928 occurrences of 929 keywords
|
|
|
Results
Found 2507 publication records. Showing 2507 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
22 | Pardeep Kumar 0001, Sang il Cho, Hoon-Jae Lee 0001 |
PingPong-MAC: secure ubiquitous sensor network with authenticated encryption. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
PingPong-MAC, authentication, data integrity, stream cipher, confidentiality, ubiquitous sensor network |
22 | Jafar Haadi Jafarian, Morteza Amini, Rasool Jalili |
A Context-Aware Mandatory Access Control Model for Multilevel Security Environments. |
SAFECOMP |
2008 |
DBLP DOI BibTeX RDF |
Context-Awareness, Integrity, Confidentiality, Mandatory Access Control |
22 | Christopher Dilloway, Gavin Lowe |
Specifying Secure Transport Channels. |
CSF |
2008 |
DBLP DOI BibTeX RDF |
Confidentiality and authentication, Secure transport layers, Specification, Security protocols, Secure channels |
22 | Cédric Fournet, Tamara Rezk |
Cryptographically sound implementations for typed information-flow security. |
POPL |
2008 |
DBLP DOI BibTeX RDF |
probabilistic programs, cryptography, compilers, integrity, type systems, computational model, confidentiality, non-interference, secure information flow |
22 | Meiyappan Nagappan, Mladen A. Vouk |
A Model for Sharing of Confidential Provenance Information in a Query Based System. |
IPAW |
2008 |
DBLP DOI BibTeX RDF |
Workflow management tools, Confidentiality, Provenance |
22 | Mansoor Ahmed Khan, Ahmad Raza Cheema, Aamir Hasan 0001 |
Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
AES CCMP, Initial Counter, Key Length, TMTO, Integrity, Encryption, Confidentiality, Nonce, IEEE 802.11i |
22 | Christine M. O'Keefe, Norm M. Good |
A Remote Analysis Server - What Does Regression Output Look Like?. |
Privacy in Statistical Databases |
2008 |
DBLP DOI BibTeX RDF |
Remote access facilities, remote server, analysis server, model server, confidentiality |
22 | Joachim Biskup, Dominique Marc Burgard, Torben Weibert, Lena Wiese |
Inference Control in Logic Databases as a Constraint Satisfaction Problem. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
confidentiality, constraint satisfaction problems, Inference control, constraint hierarchies, logic databases |
22 | Lei Xia, Wei Huang, Hao Huang |
A Compositional Multiple Policies Operating System Security Model. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
multiple policy views, integrity assurance, confidentiality assurance, security model, separation of duties, least privilege |
22 | Reouven Elbaz, David Champagne, Ruby B. Lee, Lionel Torres, Gilles Sassatelli, Pierre Guillemin |
TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
Memory Integrity, Physical Attacks, Tamper Evidence, Parallelizability, Confidentiality, Replay Attacks, Merkle Trees |
22 | Torben Amtoft, Sruthi Bandhakavi, Anindya Banerjee 0001 |
A logic for information flow in object-oriented programs. |
POPL |
2006 |
DBLP DOI BibTeX RDF |
information flow, confidentiality, aliasing |
22 | Candelaria Hernández-Goya, Amparo Fúster-Sabater |
Deterministic Analysis of Balancedness in Symmetric Cryptography. |
ISCIS |
2006 |
DBLP DOI BibTeX RDF |
bit-string algorithm, cryptography, Confidentiality, balancedness |
22 | Joachim Biskup, Lena Wiese |
On Finding an Inference-Proof Complete Database for Controlled Query Evaluation. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
confidentiality of data, complete database systems, Branch and Bound, propositional logic, inference control, SAT solving, lying, Controlled Query Evaluation |
22 | Krishnamurty Muralidhar, Rathindra Sarathy, Ramesh A. Dandekar |
Why Swap When You Can Shuffle? A Comparison of the Proximity Swap and Data Shuffle for Numeric Data. |
Privacy in Statistical Databases |
2006 |
DBLP DOI BibTeX RDF |
Privacy, Confidentiality, Shuffling, Swapping, Data masking |
22 | Antonio Ruiz-Martínez, C. Inmaculada Marín-López, Laura Baño-López, Antonio Fernandez Gómez-Skarmeta |
A new fair non-repudiation protocol for secure negotiation and contract signing. |
PST |
2006 |
DBLP DOI BibTeX RDF |
abuse freeness, contract negotiation, contract signing protocol, security, e-commerce, confidentiality, fair-exchange |
22 | Amparo Fúster-Sabater, Pino Caballero-Gil |
A Simple Acceptance/Rejection Criterium for Sequence Generators in Symmetric Cryptography. |
ICCSA (3) |
2005 |
DBLP DOI BibTeX RDF |
bit-string algorithm, cryptography, stream cipher, Confidentiality |
22 | Jean Bacon, David M. Eyers, Ken Moody, Lauri I. W. Pesonen |
Securing Publish/Subscribe for Multi-domain Systems. |
Middleware |
2005 |
DBLP DOI BibTeX RDF |
attribute encryption, message confidentiality, trust, role-based access control, publish/subscribe, content- based routing, loosely coupled applications |
22 | Robert M. Coleman, Matthew D. Ralston, Alexander Szafran, David M. Beaulieu |
Multidimensional Analysis: A Management Tool for Monitoring HIPAA Compliance and Departmental Performance. |
J. Digit. Imaging |
2004 |
DBLP DOI BibTeX RDF |
security, OLAP, confidentiality, PACS, picture archiving and communications systems, HIPAA, RIS, audit logs, multidimensional analysis |
22 | Christine M. O'Keefe, Ming Yung, Lifang Gu, Rohan A. Baxter |
Privacy-preserving data linkage protocols. |
WPES |
2004 |
DBLP DOI BibTeX RDF |
privacy, confidentiality, data extraction, data linkage |
22 | Ashish P. Sanil, Alan F. Karr, Xiaodong Lin 0004, Jerome P. Reiter |
Privacy preserving regression modelling via distributed computation. |
KDD |
2004 |
DBLP DOI BibTeX RDF |
data integration, regression, secure multi-party computation, data confidentiality |
22 | Jun-Chou Chuang, Chin-Chen Chang 0001 |
Detection and Restoration of a Tampered Medical Image. |
MIAR |
2004 |
DBLP DOI BibTeX RDF |
Authentication, watermarking, medical imaging, confidentiality |
22 | Matteo Fischetti, Juan José Salazar González |
Partial cell suppression: A new methodology for statistical disclosure control. |
Stat. Comput. |
2003 |
DBLP DOI BibTeX RDF |
cell suppression, statistical data protection, linear programming, confidentiality, statistical disclosure control |
22 | Vijay N. V. Kallepalli, Sylvanus A. Ehikioya, Sergio Camorlinga, Jose A. Rueda |
Security Middleware Infrastructure for DICOM Images in Health Information Systems. |
J. Digit. Imaging |
2003 |
DBLP DOI BibTeX RDF |
log maintenance, PHIA, security, privacy, access control, middleware, confidentiality, infrastructure, health care, DICOM, policy management |
22 | Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers |
Secure program partitioning. |
ACM Trans. Comput. Syst. |
2002 |
DBLP DOI BibTeX RDF |
mutual distrust, distributed systems, integrity, type systems, security policies, Confidentiality, secrecy, declassification, downgrading |
22 | Silvia Polettini, Luisa Franconi, Julian Stander |
Model Based Disclosure Protection. |
Inference Control in Statistical Databases |
2002 |
DBLP DOI BibTeX RDF |
Business microdata, protection models, confidentiality, regression models, performance assessment |
22 | Alexander Brodsky 0001, Csilla Farkas, Sushil Jajodia |
Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures. |
IEEE Trans. Knowl. Data Eng. |
2000 |
DBLP DOI BibTeX RDF |
data-dependent disclosure, data-independent disclosure, constraints, completeness, decidability, soundness, Multilevel security, data confidentiality, inference algorithms, inference problem |
22 | Andrew C. Myers, Barbara Liskov |
Protecting privacy using the decentralized label model. |
ACM Trans. Softw. Eng. Methodol. |
2000 |
DBLP DOI BibTeX RDF |
principals, integrity, policies, lattice, confidentiality, roles, type checking, information flow controls, declassification, end-to-end, downgrading |
22 | Andrei Sabelfeld, David Sands 0001 |
Probabilistic Noninterference for Multi-Threaded Programs. |
CSFW |
2000 |
DBLP DOI BibTeX RDF |
probabilistic bisimulation, probabilistic scheduling, probabilistic covert channels, hook-up, type-system-based analysis, semantics, confidentiality, noninterference |
22 | Jorge Dávila, Javier López 0001, Antonio Mana, Juan J. Ortega, José M. Troya |
Development of Secure Internet Applications for Governmental Environments. |
DEXA Workshops |
2000 |
DBLP DOI BibTeX RDF |
secure Internet applications, governmental environments, public administrative procedures, economic benefits, citizen satisfaction, Project Alcance, Spanish R&D Programme, private transport companies, Andalucia regional government, Internet, authenticity, confidentiality, public administration, nonrepudiation |
22 | Petra Wohlmacher, Peter Pharow |
Applications in Health Care using Public-Key Certificates and Attribute Certificates. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures |
22 | John Patrick McGregor, Ruby B. Lee |
Performance Impact of Data Compression on Virtual Private Network Transactions. |
LCN |
2000 |
DBLP DOI BibTeX RDF |
virtual private network transactions, secure public network communications, host authentication, IP Security Protocol, IPsec transactions, network types, 1 Gbit/s, 10 Mbit/s, Internet, performance, authentication, cryptography, data integrity, data integrity, data compression, data compression, encryption, transport protocols, packet switching, cryptographic protocols, confidentiality, system model, IPsec, message authentication, data types, VPN, telecommunication networks, telecommunication security, business communication, compression algorithms, security services, cryptographic algorithms, packet sizes, 100 Mbit/s |
22 | Karsten Schulz, Zoran Milosevic |
Architecting Cross-Organisational B2B Interactions. |
EDOC |
2000 |
DBLP DOI BibTeX RDF |
cross-organisational B2B interaction architecting, business procedures, electronic interconnectivity, workflow standards bodies, competitive edge, inter-organisational aspects, private business processes, shared business processes, interaction points, shared processes, process tasks, modelling ideas, data structures, business processes, confidentiality, workflow management systems, IT systems, process automation, process orientation, workflow management software, internal structures |
22 | Ian T. Foster, Nicholas T. Karonis, Carl Kesselman, Greg Koenig, Steven Tuecke |
A Secure Communications Infrastructure for High-Performance Distributed Computing. |
HPDC |
1997 |
DBLP DOI BibTeX RDF |
security-enhanced version, Nexus communication library, security/performance tradeoffs, authenticating, distributed computing, integrity, confidentiality, high-performance, security of data, users, resources, secure communications, security mechanisms |
22 | T. F. Himdi, Ravi S. Sandhu |
Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj System. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
lattice based models, controlled sharing, confidential information, Saudi Hajj system, pilgrimage, annual event, Saudi Arabia, government ministries, trusted environment, Saudi ministries, no obligation access security, Chinese Wall security, information flow policy, interoperability, confidentiality, data sharing, security requirements, security requirement, government data processing, shared data, multi level security |
22 | Vijay Varadharajan, Rajan Shankaran, Michael Hitchens |
Security services and public key infrastructure for ATM networks. |
LCN |
1997 |
DBLP DOI BibTeX RDF |
ATM protocol stack, security layer, data origin authentication, user plane, key establishment protocol, ATM signaling protocol, call setup procedures, ATM nodes, public key certificate retrieval, public key certificate distribution, B-ISDN Protocol Reference Model, integrity, public key cryptography, confidentiality, ATM networks, public key infrastructure, Certification Authority, security services |
22 | Adrian Spalka |
The non-primitiveness of the simple-security property and its non-applicability to relational databases. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
simple-security property, secure environment, relational databases, relational databases, confidentiality, security of data |
22 | A. W. Roscoe 0001 |
Intensional specifications of security protocols. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
intensional specifications, formal specification, cryptography, security protocols, cryptographic protocols, confidentiality, access protocols |
22 | Riccardo Focardi, Roberto Gorrieri, V. Panini |
The security checker: a semantics-based tool for the verification of security properties. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
security checker, semantics-based tool, security properties verification, security process algebra, concurrency workbench, formal specification, formal verification, specifications, process algebra, confidentiality, security of data, automatic verification |
22 | Lawrence Chung, Brian A. Nixon, Eric S. K. Yu |
Using non-functional requirements to systematically support change. |
RE |
1995 |
DBLP DOI BibTeX RDF |
Barclays Bank, systematic change support, goal decomposition, goal achievement, historical record, banking policies, Barclays Bank, performance, software engineering, formal specification, software quality, evolution, systems analysis, confidentiality, system development, development process, software system, timeliness, banking, design decisions, management of change, quality requirement, nonfunctional requirements, design tradeoffs |
22 | Jean-Charles Fabre, Tanguy Pérennou |
Fragmentation of confidential objects for data processing security in distributed systems. |
FTDCS |
1995 |
DBLP DOI BibTeX RDF |
confidential objects, data processing security, untrusted shared computers, non shared trusted workstations, object fragmentation, distributed systems, distributed processing, confidentiality, security of data, object-oriented methods |
22 | Michelle M. Hugue, Richard C. Scalzo |
Specifying fault tolerance in large complex computing systems. |
ICECCS |
1995 |
DBLP DOI BibTeX RDF |
fault tolerance specification, large complex computing systems, requirements specification phase, fault hypothesis, partially correct system, system fault hypothesis, health management function, performance, real-time systems, reliability, formal specification, integrity, fault tolerant computing, software reliability, availability, safety, confidentiality, software performance evaluation, maintainability, timeliness, quality of service requirements, system behaviors, system life-cycle, dependability constraints |
22 | Jan Schlörer |
Disclosure from Statistical Databases: Quantitative Aspects of Trackers. |
ACM Trans. Database Syst. |
1980 |
DBLP DOI BibTeX RDF |
security, confidentiality, database security, statistical database, tracker |
21 | Adam Barth, Collin Jackson, John C. Mitchell |
Securing frame communication in browsers. |
Commun. ACM |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Derek P. Ditch, Bruce M. McMillin |
The Security Implication of Multiple Observers in a Distributed System. |
COMPSAC (2) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Hailun Tan, Diethelm Ostry, John Zic, Sanjay K. Jha |
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
code dissemination protocols, sensor network security, broadcast authentication, code distribution |
21 | Joachim Biskup, Torben Weibert |
Keeping secrets in incomplete databases. |
Int. J. Inf. Sec. |
2008 |
DBLP DOI BibTeX RDF |
Incomplete databases, Information systems, Inference control, Controlled query evaluation |
21 | Ashish Kundu, Elisa Bertino |
A New Model for Secure Dissemination of XML Content. |
IEEE Trans. Syst. Man Cybern. Part C |
2008 |
DBLP DOI BibTeX RDF |
|
21 | M. Amir Moulavi, Jalal A. Nasiri, Behnam Bahmani, Hossein Parvar, M. Sadeghizadeh, Mahmoud Naghibzadeh |
DHA-KD: Dynamic Hierarchical Agent Based Key Distribution in Group Communication. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
Agent, Group Communication, Bandwidth, Key Distribution, Hierarchical |
21 | Alejandro Russo, Koen Claessen, John Hughes 0001 |
A library for light-weight information-flow security in haskell. |
Haskell |
2008 |
DBLP DOI BibTeX RDF |
information-flow, library, monad, declassification |
21 | Ahmad Jalal, Mian Ahmad Zeb |
Security and QoS Optimization for Distributed Real Time Environment. |
CIT |
2007 |
DBLP DOI BibTeX RDF |
RIPEMD-160, IP Routing Protocol, Quality of Service (QoS), MARS |
21 | M. Amir Moulavi, Hossein Parvar |
Agent Based Bandwidth Reduction for Key Management in Hierarchical Group Communication. |
COMSWARE |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Jeffrey A. Vaughan, Steve Zdancewic |
A Cryptographic Decentralized Label Model. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Thomas Santen |
Stepwise Development of Secure Systems. |
SAFECOMP |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Lantian Zheng, Andrew C. Myers |
End-to-End Availability Policies and Noninterference. |
CSFW |
2005 |
DBLP DOI BibTeX RDF |
|
21 | David J. Power, Mark Slaymaker, Andrew C. Simpson |
On Deducibility and Anonymisation in Medical Databases. |
Secure Data Management |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Amihai Motro, Francesco Parisi-Presicce |
Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Daesung Moon, Yongwha Chung, Kiyoung Moon, Sung Bum Pan |
Secure and Efficient Transmissions of Fingerprint Images for Embedded Processors. |
ICIAR |
2005 |
DBLP DOI BibTeX RDF |
Biometrics, Embedded Processors, Fingerprint Verification |
21 | Vassilios S. Verykios, Ahmed K. Elmagarmid, Elisa Bertino, Yücel Saygin, Elena Dasseni |
Association Rule Hiding. |
IEEE Trans. Knowl. Data Eng. |
2004 |
DBLP DOI BibTeX RDF |
sensitive rule hiding, association rule mining, Privacy preserving data mining |
21 | Anindya Banerjee 0001, David A. Naumann |
History-Based Access Control and Secure Information Flow. |
CASSIS |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Andrei Sabelfeld, Heiko Mantel |
Securing Communication in a Concurrent Language. |
SAS |
2002 |
DBLP DOI BibTeX RDF |
|
21 | Giampaolo Bella |
Lack of Explicitness Strikes Back. |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Giampaolo Bella |
Lack of Explicitness Strikes Back (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Chii-Hwa Lee, Min-Shiang Hwang, Wei-Pang Yang |
Enhanced privacy and authentication for the global system for mobile communications. |
Wirel. Networks |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Frédéric Cuppens, Robert Demolombe |
A Modal Logical Framework for Security Policies. |
ISMIS |
1997 |
DBLP DOI BibTeX RDF |
|
21 | Marc Mehdi Ayadi, Dominique Bolignano |
Verification of Cryptographic Protocols: An Experiment. |
FME |
1997 |
DBLP DOI BibTeX RDF |
security, formal methods, cryptographic protocols, Coq |
21 | |
Data Confidentiality. |
Encyclopedia of Database Systems |
2009 |
DBLP DOI BibTeX RDF |
|
21 | |
Confidentiality Protection. |
Encyclopedia of Database Systems |
2009 |
DBLP DOI BibTeX RDF |
|
21 | |
Datawarehouses Confidentiality. |
Encyclopedia of Database Systems |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Adam J. Lee, Kazuhiro Minami, Nikita Borisov |
Confidentiality-preserving distributed proofs of conjunctive queries. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
distributed proof, pervasive computing, consistency |
21 | Karim M. El Defrawy, John Solis, Gene Tsudik |
Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks. |
COMPSAC (1) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Anders Moen Hagalisletto |
Automated detection of confidentiality goals. |
IPDPS |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Joachim Biskup, Lena Wiese |
Combining Consistency and Confidentiality Requirements in First-Order Databases. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Holger Schmidt 0001 |
Pattern-Based Confidentiality-Preserving Refinement. |
ESSoS |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Christian J. Eibl |
Privacy and Confidentiality in E-Learning Systems. |
ICIW |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Hui Zhang 0002, Abhishek B. Sharma, Haifeng Chen, Guofei Jiang, Xiaoqiao Meng, Kenji Yoshihira |
Enabling Information Confidentiality in Publish/Subscribe Overlay Services. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Jean-Marc Museux, Martine Peeters, Maria João Santos |
Legal, Political and Methodological Issues in Confidentiality in the European Statistical System. |
Privacy in Statistical Databases |
2008 |
DBLP DOI BibTeX RDF |
Statistical Disclosure Control (SDC), access researchers microdata, tabular and micro data protection |
21 | Lawrence H. Cox |
A Data Quality and Data Confidentiality Assessment of Complementary Cell Suppression. |
Privacy in Statistical Databases |
2008 |
DBLP DOI BibTeX RDF |
alternating cycle, releasing exact intervals, p/q-ambiguity rule |
21 | Aiwu Shi, Gleb Naumovich |
Field Escape Analysis for Data Confidentiality in Java Components. |
APSEC |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Gurvan Le Guernic |
Automaton-based Confidentiality Monitoring of Concurrent Programs. |
CSF |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Jamie Levy, Bilal Khan 0002 |
Hiding Your Wares: Transparently Retrofitting Memory Confidentiality into Legacy Applications. |
ICC |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Behnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili |
Improved User Identity Confidentiality for UMTS Mobile Networks. |
ECUMN |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Bhavani Thuraisingham |
Confidentiality, Privacy and Trust Policy Enforcement for the Semantic Web. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Elisa Bertino, Latifur R. Khan, Ravi S. Sandhu, Bhavani Thuraisingham |
Secure knowledge management: confidentiality, trust, and privacy. |
IEEE Trans. Syst. Man Cybern. Part A |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Christoph Sorge, Martina Zitterbart |
A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer Networks. |
iTrust |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Gurvan Le Guernic, Anindya Banerjee 0001, Thomas P. Jensen, David A. Schmidt |
Automata-Based Confidentiality Monitoring. |
ASIAN |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Barbara Carminati, Elena Ferrari |
Confidentiality Enforcement for XML Outsourced Data. |
EDBT Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Tetsu Iwata, Kaoru Kurosawa |
How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms. |
FSE |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Cristina L. Abad, Indranil Gupta, William Yurcik |
Adding Confidentiality to Application-Level Multicast by Leveraging the Multicast Overlay. |
ICDCS Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Susie J. Wee, John G. Apostolopoulos |
Secure transcoding with JPSEC confidentiality and authentication. |
ICIP |
2004 |
DBLP DOI BibTeX RDF |
|
21 | John M. Abowd, Julia Lane |
New Approaches to Confidentiality Protection: Synthetic Data, Remote Access and Research Data Centers. |
Privacy in Statistical Databases |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Peeter Laud |
Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries. |
S&P |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Adrian Dobra, Alan F. Karr, Ashish P. Sanil |
Preserving confidentiality of high-dimensional tabulated data: Statistical and computational issues. |
Stat. Comput. |
2003 |
DBLP DOI BibTeX RDF |
marginal bounds, shuttle algorithm, integer programming, branch and bound, contingency tables, disclosure limitation |
21 | Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov |
Verifying Confidentiality and Authentication in Kerberos 5. |
ISSS |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Tetsu Iwata, Kaoru Kurosawa |
On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson |
Concluding Discussion: When Does Confidentiality Harm Security? |
Security Protocols Workshop |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers |
Untrusted Hosts and Confidentiality: Secure Program Partitioning. |
SOSP |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Kostas Marinis, Nikos K. Moshopoulos, Fotis Karoubalis, Kiamal Z. Pekmestzi |
On the Hardware Implementation of the 3GPP Confidentiality and Integrity Algorithms. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
|
21 | T. C. Ting |
Privacy and Confidentiality in Healthcare Delivery Information System. |
CBMS |
1999 |
DBLP DOI BibTeX RDF |
|
21 | MohammadMahdi Jahanara, Vahid R. Asadi, Marco Carmosino, Akbar Rafiey, Bahar Salamatian |
Private Boosted Decision Trees via Smooth Re-Weighting. |
J. Priv. Confidentiality |
2023 |
DBLP DOI BibTeX RDF |
|
21 | John E. Marcotte, Sarah Rush, Kelly Ogden-Schuette |
Tiered Access to Research Data for Secondary Analysis. |
J. Priv. Confidentiality |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 2507 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|