The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "FPS"( http://dblp.L3S.de/Venues/FPS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/fps

Publication years (Num. hits)
2011 (20) 2012 (26) 2013 (27) 2014 (26) 2015 (23) 2016 (24) 2017 (21) 2018 (21) 2019 (29) 2020-2021 (41) 2022 (30) 2023 (1)
Publication types (Num. hits)
inproceedings(277) proceedings(12)
Venues (Conferences, Journals, ...)
FPS(289)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 289 publication records. Showing 289 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Ahmed Khoumsi, Wadie Krombi, Mohammed Erradi A Formal Approach to Verify Completeness and Detect Anomalies in Firewall Security Policies. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fariba Haddadi, Nur Zincir-Heywood Data Confirmation for Botnet Traffic Analysis. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wen Wen, Binod Vaidya, Dimitrios Makrakis, Carlisle Adams Decentralized CRT-Based Efficient Verifiable (n, t, n) Multi-secret Sharing Scheme. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Thomas Korak Location-Dependent EM Leakage of the ATxmega Microcontroller. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Raphaël Jamet, Pascal Lafourcade 0001 (In)Corruptibility of Routing Protocols. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ali Kassem 0001, Pascal Lafourcade 0001, Yassine Lakhnech Formal Verification of e-Reputation Protocols. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jean-Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquín García-Alfaro, Nur Zincir-Heywood (eds.) Foundations and Practice of Security - 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tim Waage, Lena Wiese Benchmarking Encrypted Data Storage in HBase and Cassandra with YCSB. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Vinh-Thong Ta 0001, Thibaud Antignac Privacy by Design: On the Conformance Between Protocols and Architectures. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Joe Portner, Joel Kerr, Bill Chu Moving Target Defense Against Cross-Site Scripting Attacks (Position Paper). Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lionel Rivière, Marie-Laure Potet, Thanh-Ha Le, Julien Bringer, Hervé Chabanne, Maxime Puys Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Peeter Laud, Jan Willemson Composable Oblivious Extended Permutations. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Naelah Alkhojandi, Ali Miri Privacy-Preserving Public Auditing in Cloud Computing with Data Deduplication. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Guillaume Bonfante, Jean-Yves Marion, Thanh Dinh Ta Malware Message Classification by Dynamic Analysis. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli A Formal Approach to Automatic Testing of Security Policies Specified in XACML. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch A Maximum Variance Approach for Graph Anonymization. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yi Lu 0002, Yvo Desmedt Improved Davies-Murphy's Attack on DES Revisited. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Erwan Le Malécot, Daisuke Inoue The Carna Botnet Through the Lens of a Network Telescope. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Brahim Hamid, Christian Percebois Model-Based Specification and Validation of Security and Dependability Patterns. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Vincenzo Ciancia, Fabio Martinelli, Ilaria Matteucci, Charles Morisset Quantitative Evaluation of Enforcement Strategies - Position Paper. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Huihui Yang, Lei Jiao 0001, Vladimir A. Oleshchuk A General Framework for Group Authentication and Key Exchange Protocols. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zheng Yang 0001 Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Matthias Wachs, Martin Schanzenbach, Christian Grothoff On the Feasibility of a Censorship Resistant Decentralized Name System. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jean Goubault-Larrecq, Julien Olivain On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christian Brandt, Michael Kasper Don't Push It: Breaking iButton Security. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hélène Le Bouder, Sylvain Guilley, Bruno Robisson, Assia Tria Fault Injection to Reverse Engineer DES-Like Cryptosystems. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Roberto Di Pietro, Flavio Lombardi, Fabio Martinelli, Daniele Sgandurra CheR: Cheating Resilience in the Cloud via Smart Resource Allocation. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis, Nikolaos L. Dellas, Joaquín García-Alfaro, Dimitra I. Kaklamani, Iakovos S. Venieris, Nora Cuppens-Boulahia, Frédéric Cuppens Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Thomas Korak Investigation of Parameters Influencing the Success of Optical Fault Attacks. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hideki Sakurada Computational Soundness of Symbolic Blind Signatures under Active Attacker. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ali Kassem 0001, Pascal Lafourcade 0001, Yassine Lakhnech A More Realistic Model for Verifying Route Validity in Ad-Hoc Networks. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alireza Sadighian, José M. Fernandez 0001, Antoine Lemay, Saman Taghavi Zargar ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yang Li 0001, Yu-ichi Hayashi, Arisa Matsubara, Naofumi Homma, Takafumi Aoki, Kazuo Ohta, Kazuo Sakiyama Yet Another Fault-Based Leakage in Non-uniform Faulty Ciphertexts. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Raphaël Jamet, Pascal Lafourcade 0001 Discovering Flaws in IDS Through Analysis of Their Inputs. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Andrew Bedford, Josée Desharnais, Théophane G. Godonou, Nadia Tawbi Enforcing Information Flow by Combining Static and Dynamic Analysis. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Firas Al Khalil, Alban Gabillon, Patrick Capolsini Collusion Resistant Inference Control for Cadastral Databases. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ashkan Rahimian, Raha Ziarati, Stere Preda, Mourad Debbabi On the Reverse Engineering of the Citadel Botnet. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bao Liu, Lei Zhang 0009, Josep Domingo-Ferrer On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi (eds.) Foundations and Practice of Security - 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sylvain Guilley, Damien Marion 0001, Zakaria Najm, Youssef Souissi, Antoine Wurcker Software Camouflage. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lukas Malina, Vlastimil Clupek, Zdenek Martinasek, Jan Hajny, Kimio Oguchi, Vaclav Zeman Evaluation of Software-Oriented Block Ciphers on Smartphones. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zeeshan Bilal, Keith Martin A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain Using RFIDs. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alessandro Armando, Sander Oudkerk, Silvio Ranise, Konrad S. Wrona Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tongbo Luo, Xing Jin, Ajai Ananthanarayanan, Wenliang Du Touchjacking Attacks on Web in Android, iOS, and Windows Phone. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jie Li 0005, Jianliang Zheng MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Joaquín García-Alfaro, Pascal Lafourcade 0001 (eds.) Foundations and Practice of Security - 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Leanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin Towards Modelling Adaptive Attacker's Behaviour. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Stijn Volckaert, Bjorn De Sutter, Tim De Baets, Koen De Bosschere GHUMVEE: Efficient, Effective, and Flexible Replication. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ahmad AlSa'deh, Hosnieh Rafiee, Christoph Meinel IPv6 Stateless Address Autoconfiguration: Balancing between Security, Privacy and Usability. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Darakhshan J. Mir Information-Theoretic Foundations of Differential Privacy. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona Scalable Deniable Group Key Establishment. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Cristina Pérez-Solà, Jordi Herrera-Joancomartí Classifying Online Social Network Users through the Social Graph. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lukas Malina, Jordi Castellà-Roca, Arnau Vives-Guasch, Jan Hajny Short-Term Linkable Group Signatures with Categorized Batch Verification. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tim Muller, Patrick Schweitzer A Formal Derivation of Composite Trust. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tahsin Arafat Reza, Michel Barbeau QoS Aware Adaptive Security Scheme for Video Streaming in MANETs. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sherif Saad, Issa Traoré Extracting Attack Scenarios Using Intrusion Semantics. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Colin O'Flynn, Zhizhang Chen A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sumanta Sarkar, Reihaneh Safavi-Naini Proofs of Retrievability via Fountain Code. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Houari Mahfoud, Abdessamad Imine On Securely Manipulating XML Data. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hadi Ahmadi, Reihaneh Safavi-Naini Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nick Mailloux, Ali Miri, Monica Nevins COMPASS: Authenticated Group Key Agreement from Signcryption. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ashkan Rahimian, Philippe Charland, Stere Preda, Mourad Debbabi RESource: A Framework for Online Matching of Assembly with Open Source Code. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Khair Eddin Sabri, Ridha Khédri A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jianliang Zheng, Jie Li 0005 MARC: Modified ARC4. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sandro Etalle, Timothy L. Hinrichs, Adam J. Lee, Daniel Trivellato, Nicola Zannone Policy Administration in Tag-Based Authorization. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Pawel Chwalinski, Roman V. Belavkin, Xiaochun Cheng Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens Enabling Dynamic Security Policy in the Java Security Manager. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Christophe Foket, Bjorn De Sutter, Bart Coppens 0001, Koen De Bosschere A Novel Obfuscation: Class Hierarchy Flattening. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Isaac Woungang, Sanjay Kumar Dhurandher, Rajender Dheeraj Peddi, Issa Traoré Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis, Joaquín García-Alfaro, Dimitra I. Kaklamani, Iakovos S. Venieris A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Fatemeh Raji, Ali Miri, Mohammad Davarpanah Jazi Preserving Privacy in Online Social Networks. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jun Ho Huh, Hyoungshick Kim Phishing Detection with Popular Search Engines: Simple and Effective. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Marina Pudovkina A Related-Key Attack on Block Ciphers with Weak Recurrent Key Schedules. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jannik Dreier, Pascal Lafourcade 0001, Yassine Lakhnech Vote-Independence: A Powerful Privacy Notion for Voting Protocols. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Martin Stanek Threshold Encryption into Multiple Ciphertexts. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Gimer Cervera, Michel Barbeau, Joaquín García-Alfaro, Evangelos Kranakis Preventing the Cluster Formation Attack against the Hierarchical OLSR Protocol. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michel Embe Jiague, Marc Frappier, Frédéric Gervais, Régine Laleau, Richard St-Denis A Metamodel for the Design of Access-Control Policy Enforcement Managers: Work in Progress. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michal Rjasko Black-Box Property of Cryptographic Hash Functions. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nicola Dragoni, Eduardo Lostal, Davide Papini, Javier Fabra SC 2: Secure Communication over Smart Cards - How to Secure Off-Card Matching in Security-by-Contract for Open Multi-application Smart Cards. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yu Chen 0003, Song Luo, Jian-bin Hu, Zhong Chen 0001 A Novel Commutative Blinding Identity Based Encryption Scheme. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Martin Gagné, Pascal Lafourcade 0001, Yassine Lakhnech, Reihaneh Safavi-Naini Automated Verification of Block Cipher Modes of Operation, an Improved Method. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tony Bourdier, Horatiu Cirstea, Mathieu Jaume, Hélène Kirchner Formal Specification and Validation of Security Policies. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Wiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Pierre Konopacki, Hakim Belhaouari, Marc Frappier, Régine Laleau Specification and Verification of Access Control Policies in EB3SEC: Work in Progress. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Gilles Barthe, Mathilde Duclos, Yassine Lakhnech A Computational Indistinguishability Logic for the Bounded Storage Model. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Behzad Malek, Ali Miri Private Identification of RFID Tags. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jordi Pujol Ahulló, Roger Jardí-Cedó, Jordi Castellà-Roca, Oriol Farràs TTP SmartCard-Based ElGamal Cryptosystem Using Threshold Scheme for Electronic Elections. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hadi Ahmadi, Reihaneh Safavi-Naini Secret Key Establishment over Noisy Channels. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jérémy Milhau, Marc Frappier, Régine Laleau A Metamodel of the B Modeling of Access-Control Policies: Work in Progress. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #289 of 289 (100 per page; Change: )
Pages: [<<][1][2][3]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license