The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for CSS with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-1998 (15) 1999-2000 (22) 2001-2003 (21) 2004 (27) 2005 (26) 2006 (29) 2007 (36) 2008 (37) 2009 (32) 2010 (23) 2011 (34) 2012 (57) 2013 (57) 2014 (236) 2015 (320) 2016 (59) 2017 (65) 2018 (36) 2019 (121) 2020 (43) 2021 (28) 2022 (56) 2023 (17) 2024 (3)
Publication types (Num. hits)
article(151) book(24) data(1) incollection(2) inproceedings(1204) phdthesis(2) proceedings(16)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 453 occurrences of 275 keywords

Results
Found 1400 publication records. Showing 1400 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
35Xingguang Zhou, Jie Chen 0038, Zongyang Zhang, Jianwei Liu 0001, Qianhong Wu Secure Role-Based Access Control over Outsourced EMRs Against Unwanted Leakage. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Jianmin Han, Juan Yu 0002, Jianfeng Lu 0002, Hao Peng 0002, Jiandang Wu An Anonymization Method to Improve Data Utility for Classification. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Bin Xiong, Guangli Xiang, Tianyu Du, Jing (Selena) He, Shouling Ji Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Wenqi Shi, Xiangyang Luo, Fan Zhao 0002, Ziru Peng, Yong Gan A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Jing He 0001, Yiming Wu, Guangli Xiang, Zhendong Wu, Shouling Ji Efficient Privacy-Preservation Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Jian Shen 0001, Jun Shen 0006, Chen Wang 0015, Anxi Wang A Fibonacci Based Batch Auditing Protocol for Cloud Data. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Hui Huang 0010, Kuan-Ching Li, Xiaofeng Chen 0001 A Fair Three-Party Contract Singing Protocol Based on Blockchain. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Yuxia Cheng, Qing Wu, Bei Wang, Wenzhi Chen Protecting In-memory Data Cache with Secure Enclaves in Untrusted Cloud. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Yun Zhou 0003, Alexander Raake, Tao Xu 0008, Xuyun Zhang Users' Perceived Control, Trust and Expectation on Privacy Settings of Smartphone. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Jianfeng Lu 0002, Yun Xin, Hao Peng 0002, Jianmin Han, Feilong Lin Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Jun Xie, Sha Wu, Yansong Li, Jun Guo, Wen Sun 0004, Jiajia Liu 0001 My Smartphone Knows Your Health Data: Exploiting Android-Based Deception Attacks Against Smartbands. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Dawei Li, Jie Chen 0038, Jianwei Liu 0001, Qianhong Wu, Weiran Liu Efficient CCA2 Secure Revocable Multi-authority Large-Universe Attribute-Based Encryption. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu, Junjie Zeng Accountable Multi-authority Ciphertext-Policy Attribute-Based Encryption Without Key Escrow and Key Abuse. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Flora Amato, Aniello Castiglione, Vincenzo Moscato, Antonio Picariello, Giancarlo Sperlì Detection of Lurkers in Online Social Networks. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Lianyong Qi, Wanchun Dou, Xuyun Zhang Two-Phase Locality-Sensitive Hashing for Privacy-Preserving Distributed Service Recommendation. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Wei Wang 0130, Rong Jiang 0001, Yan Jia 0001, Aiping Li, Yi Chen KGBIAC: Knowledge Graph Based Intelligent Alert Correlation Framework. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Lei Zhang, Dongjin Yu, Hongsheng Zheng Optimization of Cloud Workflow Scheduling Based on Balanced Clustering. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Liangliang Wang, Mi Wen, Kefei Chen, Zhongqin Bi, Yu Long 0001 An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of RSA. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Binxuan Xu, Zhongyun Hua, Hejiao Huang A Novel Image Encryption Scheme Using Josephus Permutation and Image Filtering. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Qian Meng, Jianfeng Ma 0001, Kefei Chen, Yinbin Miao, Tengfei Yang Privacy-Preserving Comparable Encryption Scheme in Cloud Computing. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Jiameng Sun, Jing Qin 0002, Jixin Ma 0001 Securely Outsourcing Decentralized Multi-authority Attribute Based Signature. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Chao Shen 0001, Ziqiang Ren, Yufei Chen 0001, Zhao Wang On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Zbigniew Kotulski, Bogdan Ksiezopolski, Katarzyna Mazur (eds.) Cryptography and Security Systems - Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings Search on Bibsonomy CSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
35Ferucio Laurentiu Tiplea A Lightweight Authentication Protocol for RFID. Search on Bibsonomy CSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
35Katarzyna Mazur, Bogdan Ksiezopolski Comparison and Assessment of Security Modeling Approaches in Terms of the QoP-ML. Search on Bibsonomy CSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
35Nicolas T. Courtois, Marek Grajek, Rahul Naik Optimizing SHA256 in Bitcoin Mining. Search on Bibsonomy CSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
35Marek Parfieniuk, Piotr Jankowski Encrypting Huffman-Encoded Data by Substituting Pairs of Code Words without Changing the Bit Count of a Pair. Search on Bibsonomy CSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
35Marek R. Ogiela, Piotr Sulkowski Protocol for Detection of Counterfeit Transactions in Electronic Currency Exchange. Search on Bibsonomy CSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
35Wit Forys, Lukasz Jeda, Piotr Oprocha On a Cipher Based on Pseudo-random Walks on Graphs. Search on Bibsonomy CSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
35Monika Polak, Vasyl Ustimenko On LDPC Codes Based on Families of Expanding Graphs of Increasing Girth without Edge-Transitive Automorphism Groups. Search on Bibsonomy CSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
35Kashi Neupane Long-Term Secure Two-Round Group Key Establishment from Pairings. Search on Bibsonomy CSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
35Marina Pudovkina, Alexander Toktarev Numerical Semigroups and Bounds on Impossible Differential Attacks on Generalized Feistel Schemes. Search on Bibsonomy CSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
35Imed El Fray, Tomasz Hyla, Miroslaw Kurkowski, Witold Mackow, Jerzy Pejas Practical Authentication Protocols for Protecting and Sharing Sensitive Information on Mobile Devices. Search on Bibsonomy CSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
35Grzegorz Orynczak, Zbigniew Kotulski Context-Aware Secure Routing Protocol for Real-Time Services. Search on Bibsonomy CSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
35Kimmo Halunen, Mirko Sailio Identity-Based Cryptography in Credit Card Payments. Search on Bibsonomy CSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
35Ismail Mansour, Gérard Chalhoub, Pascal Lafourcade 0001 Secure Multihop Key Establishment Protocols for Wireless Sensor Networks. Search on Bibsonomy CSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
35Jakub Muszynski, Sébastien Varrette, Juan Luis Jiménez Laredo, Pascal Bouvry Analysis of the Data Flow in the Newscast Protocol for Possible Vulnerabilities. Search on Bibsonomy CSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
35Appala Naidu Tentu, Allam Appa Rao Efficient Verifiable Multi-Secret Sharing Based on Y.C.H Scheme. Search on Bibsonomy CSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
35Omar Reyad, Zbigniew Kotulski Statistical Analysis of the Chaos-Driven Elliptic Curve Pseudo-random Number Generators. Search on Bibsonomy CSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
35Urszula Romanczuk-Polubiec, Vasyl Ustimenko On Multivariate Cryptosystems Based on Polynomially Compressed Maps with Invertible Decomposition. Search on Bibsonomy CSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
35Guojun Wang 0001, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan (eds.) Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Cai Fu, Deliang Xu, Lansheng Han, Jingfang Xu, Zhicun Fang Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Lin-Bo Qiao, Bo-Feng Zhang, Rui-Yuan Zhao, Jinshu Su Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Chong Fu, Tao Wang 0061, Zhao-yu Meng, Jun-Xin Chen, Hong-feng Ma A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Jiangxiao Zhang, Zhoujun Li 0001, Hua Guo Multiple-Bank E-Cash without Random Oracles. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Christian Callegari, Stefano Giordano, Susanna Mannella, Michele Pagano Design and Implementation of a Testbed for the Security Assessment of MANETs. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Shaoyin Cheng, Shengmei Luo, Zifeng Li, Wei Wang, Yan Wu, Fan Jiang 0005 Static Detection of Dangerous Behaviors in Android Apps. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Baosheng Ge, Wen Tao Zhu Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Qing Wu 0005, Leyou Zhang Hierarchical Identity-Based Signature with Short Public Keys. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Natsuki Kimura, Noriaki Yoshiura Construction and Verification of Mobile Ad Hoc Network Protocols. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Changji Wang, Wentao Li, Yuan Li, Xi-Lei Xu A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Nizar Kheir, Xiao Han PeerViewer: Behavioral Tracking and Classification of P2P Malware. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Wencheng Yang, Jiankun Hu, Song Wang 0003, Jucheng Yang 0001 Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Jun Zhang 0010, Xiao Chen 0002, Yang Xiang 0001, Wanlei Zhou 0001 Zero-Day Traffic Identification. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Ronghua Shi, Ye Kang, Zhaoyuan Zhang Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Zemin Cai, Yi Wang 0016, Renfa Li An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Jingping Song, Zhiliang Zhu 0001, Peter Scully 0001, Chris J. Price Selecting Features for Anomaly Intrusion Detection: A Novel Method using Fuzzy C Means and Decision Tree Classification. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Jan-Min Chen A Crawler Guard for Quickly Blocking Unauthorized Web Robot. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Layal Samarji, Frédéric Cuppens, Nora Cuppens-Boulahia, Wael Kanoun, Samuel Dubus Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Leyou Zhang, Qing Wu 0005, Yi Mu 0001 Anonymous Identity-Based Broadcast Encryption with Adaptive Security. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Haichang Gao, Wei Jia, Ning Liu, Kaisheng Li The Hot-Spots Problem in Windows 8 Graphical Password Scheme. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Javier González 0006, Philippe Bonnet Towards an Open Framework Leveraging a Trusted Execution Environment. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Juan Wang 0006, Yong Wang, Hongxin Hu, Qingxin Sun, He Shi, Longjie Zeng Towards a Security-Enhanced Firewall Application for OpenFlow Networks. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Zhenyu Wang, Yanqiu Ye, Ruimin Wang An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Robert Koch 0002, Mario Golling, Gabi Dreo Rodosek Geolocation and Verification of IP-Addresses with Specific Focus on IPv6. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Tao Peng 0011, Qin Liu 0001, Guojun Wang 0001 Privacy Preserving for Location-Based Services Using Location Transformation. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Kok-Seng Wong, Myung Ho Kim Secure Re-publication of Dynamic Big Data. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Seyed Ali Mirheidari, Sajjad Arshad, Rasool Jalili Alert Correlation Algorithms: A Survey and Taxonomy. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Ang Mi, Weiping Wang 0003, Shigeng Zhang, Hong Song Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Youssou Faye, Hervé Guyennet, Ibrahima Niang, Yanbo Shou Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Cheng-Chi Lee, Chun-Ta Li, Chi-Yao Weng, Jian-Jhong Jheng, Xiao-Qian Zhang, Yi-Rui Zhu Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Shuhong Chen, Guojun Wang 0001, Weijia Jia 0001 A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Fangfang Zhou, Ronghua Shi, Ying Zhao 0001, Yezi Huang, Xing Liang NetSecRadar: A Visualization System for Network Security Situational Awareness. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Aihua Peng, Lansheng Han, Yanan Yu, Nan Du, Mingquan Li Algebra-Based Behavior Identification of Trojan Horse. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Qiang Liu 0004, Jianping Yin, Shui Yu 0001 A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Sheng Wen, Ping Li 0019, Di Wu 0050, Yang Xiang 0001, Wanlei Zhou 0001 Detecting Stepping Stones by Abnormal Causality Probability. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Pieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Yang Xiang 0001, Javier López 0001, C.-C. Jay Kuo, Wanlei Zhou 0001 (eds.) Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Eduardo B. Fernández, Anton V. Uzunov Secure Middleware Patterns. Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Huawei Zhao, Jing Qin 0002, Minglei Shu, Jiankun Hu A Hash Chains Based Key Management Scheme for Wireless Sensor Networks. Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Satoru Akimoto, Yoshiaki Hori, Kouichi Sakurai Collaborative Behavior Visualization and Its Detection by Observing Darknet Traffic. Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Xin-Wen Wu, Alan Wee-Chung Liew Near-Optimal Collusion-Secure Fingerprinting Codes for Efficiently Tracing Illegal Re-distribution. Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Max-Emanuel Maurer, Lukas Höfer Sophisticated Phishers Make More Spelling Mistakes: Using URL Similarity against Phishing. Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Avinash Srinivasan, Lashidhar Chennupati Robust Authentication of Public Access Points Using Digital Certificates - A Novel Approach. Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Ferdous A. Barbhuiya, Tonmoy Saikia, Sukumar Nandi An Anomaly Based Approach for HID Attack Detection Using Keystroke Dynamics. Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Yuxin Meng 0001, Lam-for Kwok Intrusion Detection Using Disagreement-Based Semi-supervised Learning: Detection Enhancement and False Alarm Reduction. Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Jan Muhammad, Thomas Doherty, Sardar Hussain, Richard O. Sinnott Policy-Based Vulnerability Assessment for Virtual Organisations. Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Younchan Jung, Enrique Festijo Secure Mobility Management Based on Session Key Agreements. Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Paul A. Watters, Nigel Phair Detecting Illicit Drugs on Social Media Using Automated Social Media Intelligence Analysis (ASMIA). Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Luca Ferretti, Michele Colajanni, Mirco Marchetti Supporting Security and Consistency for Cloud Database. Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Nimalaprakasan Skandhakumar, Farzad Salim, Jason Reid, Ed Dawson Physical Access Control Administration Using Building Information Models. Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Kaleb Lee, Juan Manuel González Nieto, Colin Boyd A State-Aware RFID Privacy Model with Reader Corruption. Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Yang Liu, Hongda Li 0001, Qihua Niu A Leakage-Resilient Zero Knowledge Proof for Lattice Problem. Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Anderson Nunes Paiva Morais, Ana R. Cavalli An Event-Based Packet Dropping Detection Scheme for Wireless Mesh Networks. Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Michael N. Johnstone, Andrew Woodward Towards Effective Algorithms for Intelligent Defense Systems. Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Geng Yang, Qiang Zhou, Xiaolong Xu 0002, Jian Xu, Chunming Rong A Novel Identity-Based Key Management and Encryption Scheme for Distributed System. Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Alexandre Melo Braga, Rafael Cividanes, Ismael M. A. Ávila, Cláudia de Andrade Tambascia Protection Aspects of Iconic Passwords on Mobile Devices. Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor Improving Content Availability in the I2P Anonymous File-Sharing Environment. Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Avinash Srinivasan, Jie Wu 0001 SafeCode - Safeguarding Security and Privacy of User Data on Stolen iOS Devices. Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Leyi Shi, Xiaorui Wang, Wenjing Fu, Xin Liu 0022, Zhen Qin An Improved Anti-collision Algorithm for ISO15693 RFID Systems. Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 1400 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license