The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "DBSec"( http://dblp.L3S.de/Venues/DBSec )

URL (DBLP): http://dblp.uni-trier.de/db/conf/dbsec

Publication years (Num. hits)
1987 (22) 1988 (20) 1989 (28) 1990 (28) 1991 (21) 1992 (26) 1993 (21) 1994 (28) 1995 (25) 1996 (20) 1997 (25) 1998 (19) 1999 (22) 2000 (35) 2001 (24) 2002 (26) 2003 (29) 2004 (27) 2005 (26) 2006 (23) 2007 (21) 2008 (26) 2009 (23) 2010 (30) 2011 (27) 2012 (25) 2013 (23) 2014 (27) 2015 (25) 2016 (25) 2017 (31) 2018 (22) 2019 (22) 2020 (23) 2021 (24) 2022 (19) 2023 (25)
Publication types (Num. hits)
inproceedings(876) proceedings(37)
Venues (Conferences, Journals, ...)
DBSec(913)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 78 occurrences of 64 keywords

Results
Found 913 publication records. Showing 913 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Prachi Kumari, Alexander Pretschner Automated Translation of End User Policies for Usage Control Enforcement. Search on Bibsonomy DBSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Abhrajit Ghosh Privacy-Preserving Range Queries from Keyword Queries. Search on Bibsonomy DBSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mingyi Zhao, Peng Liu 0005, Jorge Lobo 0001 Towards Collaborative Query Planning in Multi-party Database Networks. Search on Bibsonomy DBSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Milica Milutinovic, Koen Decroix, Vincent Naessens, Bart De Decker Privacy-Preserving Public Transport Ticketing System. Search on Bibsonomy DBSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Daniel Ricardo dos Santos, Silvio Ranise, Luca Compagna, Serena Elisa Ponta Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios. Search on Bibsonomy DBSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jamuna Gopal, Shu Huang, Bo Luo FamilyID: A Hybrid Approach to Identify Family Information from Microblogs. Search on Bibsonomy DBSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Johannes Sänger, Christian Richthammer, André Kremser, Günther Pernul Personalized Composition of Trustful Reputation Systems. Search on Bibsonomy DBSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Amin FaizKhademi, Mohammad Zulkernine, Komminist Weldemariam FPGuard: Detection and Prevention of Browser Fingerprinting. Search on Bibsonomy DBSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pierangela Samarati (eds.) Data and Applications Security and Privacy XXIX - 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings Search on Bibsonomy DBSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hu Chun, Kui Ren 0001, Wei Jiang Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid. Search on Bibsonomy DBSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Stephen R. Tate, Roopa Vishwanathan Expiration and Revocation of Keys for Attribute-Based Signatures. Search on Bibsonomy DBSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Assane Gueye, Peter Mell, Richard E. Harang, Richard J. La Defensive Resource Allocations with Security Chokepoints in IPv6 Networks. Search on Bibsonomy DBSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones 0001 Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies. Search on Bibsonomy DBSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Emre Uzun, David Lorenzi, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural Migrating from DAC to RBAC. Search on Bibsonomy DBSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ibrahim Lazrig, Tarik Moataz, Indrajit Ray, Indrakshi Ray, Toan Ong, Michael G. Kahn, Frédéric Cuppens, Nora Cuppens-Boulahia Privacy Preserving Record Matching Using Automated Semi-trusted Broker. Search on Bibsonomy DBSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Qasim Mahmood Rajpoot, Christian Damsgaard Jensen, Ram Krishnan Integrating Attributes into Role-Based Access Control. Search on Bibsonomy DBSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1David Derler, Christian Hanser, Daniel Slamanig Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michal Davidson, Ehud Gudes, Tamir Tassa Efficient and Enhanced Solutions for Content Sharing in DRM Systems. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati Optimizing Integrity Checks for Join Queries in the Cloud. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tarik Moataz, Benjamin Justus, Indrakshi Ray, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Silvio Ranise, Anh Tuan Truong Incremental Analysis of Evolving Administrative Role Based Access Control Policies. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Meixing Le, Krishna Kant 0001, Sushil Jajodia Consistent Query Plan Generation in Secure Cooperative Data Access. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rasib Khan, Shams Zawoad, Md Munirul Haque, Ragib Hasan 'Who, When, and Where?' Location Proof Assertion for Mobile Devices. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sokratis Vavilis, Milan Petkovic, Nicola Zannone Data Leakage Quantification. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Pooya Mehregan, Philip W. L. Fong Design Patterns for Multiple Stakeholders in Social Computing. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zhongyuan Xu, Scott D. Stoller Mining Attribute-Based Access Control Policies from Logs. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard Specification and Deployment of Integrated Security Policies for Outsourced Data. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yuan Hong, Jaideep Vaidya, Haibing Lu, Lingyu Wang 0001 Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Vijay Atluri, Günther Pernul (eds.) Data and Applications Security and Privacy XXVIII - 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, David Shallcross On Minimizing the Size of Encrypted Databases. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Elisa Costante, Jerry den Hartog, Milan Petkovic, Sandro Etalle, Mykola Pechenizkiy Hunting the Unknown - White-Box Database Leakage Detection. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yury Zhauniarovich, Olga Gadyatskaya, Bruno Crispo, Francesco La Spina, Ermanno Moser FSquaDRA: Fast Detection of Repackaged Applications. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Vikas G. Ashok, Ravi Mukkamala A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation Using Bloom Filters. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tahmineh Sanamrad, Lucas Braun, Donald Kossmann, Ramarathnam Venkatesan Randomly Partitioned Encryption for Cloud Databases. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wonkyu Han, Hongxin Hu, Gail-Joon Ahn LPM: Layered Policy Management for Software-Defined Networks. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wei Wei, Ting Yu 0001 Integrity Assurance for Outsourced Databases without DBMS Modification. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Haibing Lu, Yuan Hong, Yanjiang Yang, Yi Fang 0008, Lian Duan Dynamic Workflow Adjustment with Security Constraints. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Debra L. Cook, Allen McIntosh, Euthimios Panagos Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Samira Barouti, Feras Aljumah, Dima Alhadidi, Mourad Debbabi Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yuan Cheng 0002, Jaehong Park, Ravi S. Sandhu Attribute-Aware Relationship-Based Access Control for Online Social Networks. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michael G. Solomon, Vaidy S. Sunderam, Li Xiong 0001 Towards Secure Cloud Database with Fine-Grained Access Control. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tarik Moataz, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray, Indrakshi Ray ELITE: zEro Links Identity managemenT systEm. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Chu Huang, Sencun Zhu, Robert F. Erbacher Toward Software Diversity in Heterogeneous Networked Systems. Search on Bibsonomy DBSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, Nazia Badar Towards User-Oriented RBAC Model. Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ronald Petrlic, Stephan Sekula Unlinkable Content Playbacks in a Multiparty DRM System. Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Boxiang Dong, Ruilin Liu, Wendy Hui Wang Result Integrity Verification of Outsourced Frequent Itemset Mining. Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bechara al Bouna, Chris Clifton, Qutaibah M. Malluhi Using Safety Constraint for Transactional Dataset Anonymization. Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Benjamin Justus, Frédéric Cuppens, Nora Cuppens-Boulahia, Julien Bringer, Hervé Chabanne, Olivier Cipiere Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase. Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zhan Wang, Kun Sun 0001, Sushil Jajodia, Jiwu Jing TerraCheck: Verification of Dedicated Cloud Storage. Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Indrajit Ray, Dieudonne Mulamba, Indrakshi Ray, Keesook J. Han A Model for Trust-Based Access Control and Delegation in Mobile Clouds. Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert B. France Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations. Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Le Minh Sang Tran, Bjørnar Solhaug, Ketil Stølen An Approach to Select Cost-Effective Risk Countermeasures. Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rohit Jain, Sunil Prabhakar Access Control and Query Verification for Untrusted Databases. Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yang Wang, Jun Zheng 0003, Chen Sun, Srinivas Mukkamala Quantitative Security Risk Assessment of Android Permissions and Applications. Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Joachim Biskup, Marcel Preuß Database Fragmentation with Encryption: Under Which Semantic Constraints and A Priori Knowledge Can Two Keep a Secret? Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Florian Kerschbaum, Martin Härterich, Patrick Grofig, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert Optimal Re-encryption Strategy for Joins in Encrypted Databases. Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lingyu Wang 0001, Basit Shafiq (eds.) Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Meixing Le, Krishna Kant 0001, Sushil Jajodia Rule Enforcement with Third Parties in Secure Cooperative Data Access. Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya Toward Mining of Temporal Roles. Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Changyu Dong, Liqun Chen 0002, Jan Camenisch, Giovanni Russello Fair Private Set Intersection with a Semi-trusted Arbiter. Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ping Yang 0002, Mikhail I. Gofman, Zijiang Yang 0006 Policy Analysis for Administrative Role Based Access Control without Separate Administration. Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hiroaki Kikuchi, Jun Sakuma Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection. Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati Extending Loose Associations to Multiple Fragments. Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Liyue Fan, Li Xiong 0001, Vaidy S. Sunderam Differentially Private Multi-dimensional Time Series Release for Traffic Monitoring. Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Emre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural Analysis of TRBAC with Dynamic Temporal Role Hierarchies. Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Attila Altay Yavuz Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases. Search on Bibsonomy DBSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga Enforcing Subscription-Based Authorization Policies in Cloud Scenarios. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ding Wang 0002, Chunguang Ma, Peng Wu Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Rami Sharon, Ehud Gudes Code Type Revealing Using Experiments Framework. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Robert Nix, Murat Kantarcioglu, Keesook J. Han Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Abhijith Shastry, Murat Kantarcioglu, Yan Zhou 0001, Bhavani Thuraisingham Randomizing Smartphone Malware Profiles against Statistical Mining Techniques. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Takao Takenouchi, Takahiro Kawamura, Akihiko Ohsuga Distributed Data Federation without Disclosure of User Existence. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Rosa Karimi Adl, Mina Askari, Ken Barker 0001, Reihaneh Safavi-Naini Privacy Consensus in Anonymization Systems via Game Theory. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alessandro Armando, Silvio Ranise Automated and Efficient Analysis of Role-Based Access Control with Attributes. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hamed Saljooghinejad, Wilson Naik Bhukya Layered Security Architecture for Masquerade Attack Detection. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Smitha Sundareswaran, Anna Cinzia Squicciarini XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nikolay Yakovets, Jarek Gryz, Stephanie Hazlewood, Paul van Run From MDM to DB2: A Case Study of Security Enforcement Migration. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Abbas Taheri Soodejani, Mohammad Ali Hadavi, Rasool Jalili k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tiana Razafindralambo, Guillaume Bouffard, Jean-Louis Lanet A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jonathan L. Dautrich Jr., Chinya V. Ravishankar Security Limitations of Using Secret Sharing for Data Outsourcing. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Gianluca Dini, Pericle Perazzo Uniform Obfuscation for Location Privacy. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Leendert W. N. van der Torre Logics for Security and Privacy. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sébastien Gambs, Ahmed Gmati, Michel Hurfin Reconstruction Attack through Classifier Analysis. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Wuqiong Pan, Yulong Zhang, Meng Yu 0001, Jiwu Jing Improving Virtualization Security by Splitting Hypervisor into Smaller Components. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xin Jin, Ram Krishnan, Ravi S. Sandhu A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yuan Cheng 0002, Jaehong Park, Ravi S. Sandhu A User-to-User Relationship-Based Access Control Model for Online Social Networks. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Danish Mehmood, Basit Shafiq, Jaideep Vaidya, Yuan Hong, Nabil R. Adam, Vijayalakshmi Atluri Privacy-Preserving Subgraph Discovery. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Simon N. Foley, William M. Fitzgerald Decentralized Semantic Threat Graphs. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro (eds.) Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner, Torsten Schlotmann Signature-Based Inference-Usability Confinement for Relational Databases under Functional and Join Dependencies. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ravi Singh Pippal, Jaidhar C. D., Shashikala Tapaswi Security Vulnerabilities of User Authentication Scheme Using Smart Card. Search on Bibsonomy DBSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Chun-Ta Li, Cheng-Chi Lee, Chen-Ju Liu, Chin-Wen Lee A Robust Remote User Authentication Scheme against Smart Card Security Breach. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Wenliang Du, Xi Tan, Tongbo Luo, Karthick Jayaraman, Zutao Zhu Re-designing the Web's Access Control System - (Extended Abstract). (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yingjiu Li (eds.) Data and Applications Security and Privacy XXV - 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings Search on Bibsonomy DBSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Haitham S. Al-Sinani, Chris J. Mitchell Enhancing CardSpace Authentication Using a Mobile Device. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1R. Sekar 0001 Information Flow Containment: A Practical Basis for Malware Defense. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Florian Kerschbaum Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Solomon Berhe, Steven A. Demurjian, Swapna S. Gokhale, Jaime A. Pavlich-Mariscal, Rishi Saripalle Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Aaron Steele, Keith B. Frikken An Index Structure for Private Data Outsourcing. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 913 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license