The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICICS"( http://dblp.L3S.de/Venues/ICICS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/IEEEicics

Publication years (Num. hits)
1997 (49) 1999 (27) 2001 (57) 2002 (42) 2003 (38) 2004 (43) 2005 (41) 2006 (40) 2007 (38) 2008 (30) 2009 (40) 2010 (33) 2011 (267) 2012 (50) 2013 (234) 2014 (22) 2015 (224) 2016 (38) 2017 (57) 2018 (52) 2019 (47) 2020 (35) 2022 (35) 2023 (45)
Publication types (Num. hits)
inproceedings(1557) proceedings(27)
Venues (Conferences, Journals, ...)
ICICS(1584)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 355 occurrences of 253 keywords

Results
Found 1584 publication records. Showing 1584 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Mingjiang Huang, Liming Wang, Yan Zhang Improved Automatic Search Algorithm for Differential and Linear Cryptanalysis on SIMECK and the Applications. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Lisa Bahler, Brian A. Coan Cryptographic Password Obfuscation. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xiaohui Han, Lianhai Wang, Shujiang Xu, Dawei Zhao, Guangqi Liu Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shakirah Hashim, Mohammed Benaissa Accelerating Integer Based Fully Homomorphic Encryption Using Frequency Domain Multiplication. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Carsten Baum, Huang Lin, Sabine Oechsner Towards Practical Lattice-Based One-Time Linkable Ring Signatures. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1George Teseleanu Random Number Generators Can Be Fooled to Behave Badly. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xiaoshu Ji, Gurvan Le Guernic, Nora Cuppens-Boulahia, Frédéric Cuppens USB Packets Filtering Policies and an Associated Low-Cost Simulation Framework. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Carlos Andres Lara-Nino, Arturo Diaz-Perez, Miguel Morales-Sandoval FPGA-Based Assessment of Midori and Gift Lightweight Block Ciphers. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kelly Yun, Xin Wang, Rui Xue 0001 Identity-Based Functional Encryption for Quadratic Functions from Lattices. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ping Wang 0003, Zijian Zhang 0003, Ding Wang 0002 Revisiting Anonymous Two-Factor Authentication Schemes for Multi-server Environment. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yun Guo, Daniel Sun 0004, Guoqiang Li 0001, Shiping Chen 0001 Examine Manipulated Datasets with Topology Data Analysis: A Case Study. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lin Wang, Min Zhu, Qing Li, Bibo Tu Simau: A Dynamic Privilege Management Mechanism for Host in Cloud Datacenters. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu 0001 On Security in Encrypted Computing. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Min Zhu, Kun Zhang 0016, Bibo Tu PCA: Page Correlation Aggregation for Memory Deduplication in Virtualized Environments. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Weijin Wang, Jingbin Liu, Yu Qin, Dengguo Feng Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jiahui Shen, Tianyu Chen, Lei Wang 0135, Yuan Ma An Efficiency Optimization Scheme for the On-the-Fly Statistical Randomness Test. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jianing Liu, Kewei Lv Solving Discrete Logarithm Problem in an Interval Using Periodic Iterates. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rong Fan, Yaoyao Chang Machine Learning for Black-Box Fuzzing of Network Protocols. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mingyue Liang, Zhoujun Li 0001, Qiang Zeng 0001, Zhejun Fang Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Huorong Li, Wuqiong Pan, Jingqiang Lin, Wangzhao Cheng, Bingyu Li SSUKey: A CPU-Based Solution Protecting Private Keys on Untrusted OS. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng 0005 A PUF and Software Collaborative Key Protection Scheme. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wenjie Yang, Jian Weng 0001, Futai Zhang New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xueping Liang, Sachin Shetty, Deepak K. Tosh, Peter Foytik, Lingchen Zhang Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Feng Xiao, Enhong Chen, Qiang Xu S7commTrace: A High Interactive Honeypot for Industrial Control System Based on S7 Protocol. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zied Trifa, Jalel Eddine Hajlaoui, Maher Khemakhem Pollution Attacks Identification in Structured P2P Overlay Networks. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daode Zhang, Bao Li 0001, Yamin Liu, Haiyang Xue, Xianhui Lu, Dingding Jia Towards Tightly Secure Deterministic Public Key Encryption. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1XiaoXuan Bai, Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen 0007, Jingjing Liu, Tong Wu A Cross-Modal CCA-Based Astroturfing Detection Approach. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kang Li, Rupeng Yang, Man Ho Au, Qiuliang Xu Practical Range Proof for Cryptocurrency Monero with Provable Security. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zhi Wang 0014, Meiqi Tian, Chunfu Jia An Active and Dynamic Botnet Detection Approach to Track Hidden Concept Drift. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zhedong Wang, Xiong Fan, Mingsheng Wang Compact Inner Product Encryption from LWE. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yuntao Wang 0002, Yoshinori Aono, Tsuyoshi Takagi An Experimental Study of Kannan's Embedding Technique for the Search LWE Problem. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jing Yang 0032, Liming Wang, Zhen Xu 0009 A Novel Semantic-Aware Approach for Detecting Malicious Web Traffic. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Feiyang Peng, Zhihong Liu, Yong Zeng 0002, Jialei Wang Modeling Key Infection in Large-Scale Sensor Networks. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bei Liang, Aikaterini Mitrokotsa Distributed Pseudorandom Functions for General Access Structures in NP. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kanika Gupta, S. Sharmila Deva Selvi, C. Pandu Rangan, Shubham Sopan Dighe Identity-Based Group Encryption Revisited. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xueqing Wang, Biao Wang, Rui Xue 0001 Two Efficient Tag-Based Encryption Schemes on Lattices. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xinyu Feng 0002, Cancan Jin, Cong Li, Yuejian Fang, Qingni Shen, Zhonghai Wu Practical Large Universe Attribute-Set Based Encryption in the Standard Model. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li High-Performance Symmetric Cryptography Server with GPU Acceleration. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ming Yuan, Ye Li, Zhoujun Li 0001 Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web Interfaces. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wenwen Wang, Kewei Lv The Reductions for the Approximating Covering Radius Problem. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wenjun Qian, Qingni Shen, Yizhe Yang, Yahui Yang, Zhonghai Wu Statically Defend Network Consumption Against Acker Failure Vulnerability in Storm. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tianying Chen, Haiyan Kang Research on Clustering-Differential Privacy for Express Data Release. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng 0005 A Plausibly Deniable Encryption Scheme Utilizing PUF's Thermo-Sensitivity. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daode Zhang, Fuyang Fang, Bao Li 0001, Haiyang Xue, Bei Liang Compact Hierarchical IBE from Lattices in the Standard Model. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gaurav Sharma 0006, Rajeev Anand Sahu, Veronika Kuchta, Olivier Markowitch, Suman Bala Authenticated Group Key Agreement Protocol Without Pairing. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Juan Wang 0006, Feng Xiao, Jianwei Huang, Daochen Zha, Chengyang Fan, Wei Hu, Huanguo Zhang A Security-Enhanced vTPM 2.0 for Cloud Computing. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Qingsong Zhao, Qingkai Zeng 0002, Ximeng Liu Efficient Inner Product Encryption with Simulation-Based Security. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lei Xu 0019, Chungen Xu, Joseph K. Liu, Cong Zuo, Peng Zhang 0029 A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu, Guang Zeng Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zhenyu Chen, Yanyan Fu, Min Zhang, Zhenfeng Zhang, Hao Li The De-anonymization Method Based on User Spatio-Temporal Mobility Trace. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shuang Qiu 0004, Rui Zhang 0002, Yongbin Zhou, Hailong Zhang 0001 Reducing Randomness Complexity of Mask Refreshing Algorithm. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kazuki Yoneyama, Shogo Kimura Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption with Storage Efficiency. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Soyoung Ahn, Hyang-Sook Lee, Seongan Lim, Ikkwon Yie A Lattice Attack on Homomorphic NTRU with Non-invertible Public Keys. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Dali Zhu, Wenjing Rong, Di Wu 0004, Na Pang Multi-attribute Counterfeiting Tag Identification Protocol in Large-Scale RFID System. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anirban Basu 0001, Rui Xu 0006, Juan Camilo Corena, Shinsaku Kiyomoto Hypercubes and Private Information Retrieval. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jun Zhang 0049, Linru Zhang, Meiqi He, Siu-Ming Yiu Privacy-Preserving Disease Risk Test Based on Bloom Filters. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ruo Mo, Jianfeng Ma 0001, Ximeng Liu, Qi Li 0011 FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Meigen Huang, Bin Yu 0003 SDN-Based Secure Localization in Heterogeneous WSN. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jie Li, Daode Zhang, Xianhui Lu, Kunpeng Wang Compact (Targeted Homomorphic) Inner Product Encryption from LWE. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jingjing Liu, Wenjia Niu, Jiqiang Liu, Jia Zhao 0005, Tong Chen 0007, Yinqi Yang, Yingxiao Xiang, Lei Han A Method to Effectively Detect Vulnerabilities on Path Planning of VIN. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA Attacks. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ying Xia, Yu Huang, Xu Zhang 0019, Hae-Young Bae Frequent Itemset Mining with Differential Privacy Based on Transaction Truncation. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xueping Liang, Sachin Shetty, Juan Zhao 0003, Daniel Bowden, Danyi Li, Jihong Liu Towards Decentralized Accountability and Self-sovereignty in Healthcare Systems. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zhiqiang Xu, Debiao He, Xinyi Huang 0001 Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Guangli Xiang, Lu Yu, Beilei Li, Mengsen Xia A Self-healing Key Distribution Scheme for Mobile Ad Hoc Networks. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ruan He, Montida Pattaranantakul, Zonghua Zhang, Thomas Duval SDAC: A New Software-Defined Access Control Paradigm for Cloud-Based Systems. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yu Li, Yazhe Wang, Yuan Zhang 0004 SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xinyu Feng 0002, Cong Li, Dan Li, Yuejian Fang, Qingni Shen Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hai Liu 0007, Zhenqiang Wu, Changgen Peng, Shuangyue Zhang, Feng Tian 0004, Laifeng Lu Perturbation Paradigms of Maintaining Privacy-Preserving Monotonicity for Differential Privacy. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lingchen Li, Wenling Wu, Lei Zhang 0012 Improved Automatic Search Tool for Bit-Oriented Block Ciphers and Its Applications. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Changji Wang, Yuan Yuan, Shengyi Jiang P3ASC: Privacy-Preserving Pseudonym and Attribute-Based Signcryption Scheme for Cloud-Based Mobile Healthcare System. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chuntao Dong, Qingni Shen, Lijing Cheng, Yahui Yang, Zhonghai Wu SECapacity: A Secure Capacity Scheduler in YARN. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Changhai Ou, Zhu Wang 0005, Degang Sun, Xinping Zhou, Juan Ai Group Verification Based Multiple-Differential Collision Attack. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dali Zhu, Renjun Zhang, Xiaozhuo Gu, Haitao Zhu A Practical Scheme for Data Secure Transport in VoIP Conferencing. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Thomas Hütter, Mario Preishuber, Jutta Hämmerle-Uhl, Andreas Uhl Weaknesses in Security Considerations Related to Chaos-Based Image Encryption. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wei Fan, Zhujun Zhang, Tingting Wang, Bo Hu, Sihan Qing, Degang Sun Research on Security Algorithm of Virtual Machine Live Migration for KVM Virtualization System. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kwok-Yan Lam, Chi-Hung Chi Identity in the Internet-of-Things (IoT): New Challenges and Opportunities. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Viktor Monarev, Ilja Duplischev, Andrey Pestunov Compression-Based Integral Prior Classification for Improving Steganalysis. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nan Yao, Yu Yu 0001, Xiangxue Li, Dawu Gu On the Robustness of Learning Parity with Noise. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sumit Kumar Debnath, Ratna Dutta How to Meet Big Data When Private Set Intersection Realizes Constant Communication Complexity. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Robert Buhren, Julian Vetter, Jan Nordholz The Threat of Virtualization: Hypervisor-Based Rootkits on the ARM Architecture. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shen Yan, Shiran Pan, Wen Tao Zhu, Keke Chen DynaEgo: Privacy-Preserving Collaborative Filtering Recommender System Based on Social-Aware Differential Privacy. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Thanh Nghia Ho, Wee Keong Ng Application of Stylometry to DarkWeb Forum User Identification. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lei Lei, Quanwei Cai 0001, Bo Chen, Jingqiang Lin Towards Efficient Re-encryption for Secure Client-Side Deduplication in Public Clouds. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wenwen Wang, Kewei Lv, Jianing Liu The Variant of Remote Set Problem on Lattices. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Christoph Frädrich, Henrich C. Pöhls, Wolfgang Popp, Noëlle Rakotondravony, Kai Samelin Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoT. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Martin Draschl, Jutta Hämmerle-Uhl, Andreas Uhl Assessment of Efficient Fingerprint Image Protection Principles Using Different Types of AFIS. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yuan Ma, Qinglong Zhang, Zongbin Liu, Chenyang Tu, Jingqiang Lin Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1M. W. David, C. R. Yerkes, M. E. Simmons, W. Franceschini Towards Trustworthy Smart Cyber-Physical Systems. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1B. S. Vidyalakshmi, Raymond K. Wong 0001 Is it Good or Bad? Disclosure of Medical Ailments on Twitter. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yang Luo, Tian Puyang, Wu Luo, Qingni Shen, Anbang Ruan, Zhonghai Wu MultiPol: Towards a Multi-policy Authorization Framework for RESTful Interfaces in the Cloud. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Raymond K. Wong 0001, B. S. Vidyalakshmi Privacy Leakage via Attribute Inference in Directed Social Networks. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Peeter Laud, Alisa Pankova Optimizing Secure Computation Programs with Private Conditionals. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Da-Zhi Sun, Xiao-Hong Li 0001 Vulnerability and Enhancement on Bluetooth Pairing and Link Key Generation Scheme for Security Modes 2 and 3. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yaowen Zheng, Kai Cheng, Zhi Li 0018, Shiran Pan, Hongsong Zhu, Limin Sun A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Duohe Ma, Cheng Lei, Liming Wang, Hongqi Zhang, Zhen Xu 0009, Meng Li 0015 A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Peizhi Shao, Jiuming Lu, Raymond K. Wong 0001, Wenzhuo Yang A Transparent Learning Approach for Attack Prediction Based on User Behavior Analysis. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu (eds.) Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bo Song, Yiming Zhao Provably Secure Identity-Based Identification and Signature Schemes with Parallel-PVR. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Paul Tak Shing Liu Medical Record System Using Blockchain, Big Data and Tokenization. Search on Bibsonomy ICICS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 1584 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license