The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "NordSec"( http://dblp.L3S.de/Venues/NordSec )

URL (DBLP): http://dblp.uni-trier.de/db/conf/nordsec

Publication years (Num. hits)
2009 (21) 2010 (20) 2011 (18) 2012 (19) 2013 (22) 2014 (17) 2015 (17) 2016 (17) 2017 (19) 2018 (30) 2019 (18) 2020 (15) 2021-2022 (34) 2023 (18) 2024 (1)
Publication types (Num. hits)
inproceedings(271) proceedings(15)
Venues (Conferences, Journals, ...)
NordSec(286)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 28 occurrences of 27 keywords

Results
Found 286 publication records. Showing 286 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Hanne Riis Nielson, Dieter Gollmann (eds.) Secure IT Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings Search on Bibsonomy NordSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tero Hasu, Anya Helene Bagge, Magne Haveraaen Inferring Required Permissions for Statically Composed Programs. Search on Bibsonomy NordSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Pablo Buiras, Alejandro Russo Lazy Programs Leak Secrets. Search on Bibsonomy NordSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Fabian van den Broek, Ronny Wichers Schreur Femtocell Security in Theory and Practice. Search on Bibsonomy NordSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Roberto Vigo, Alessandro Bruni, Ender Yüksel Security Games for Cyber-Physical Systems. Search on Bibsonomy NordSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson High-Performance Qualified Digital Signatures for X-Road. Search on Bibsonomy NordSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Musard Balliu A Logic for Information Flow Analysis of Distributed Programs. Search on Bibsonomy NordSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nicolae Paladi, Christian Gehrmann, Fredric Morenius Domain-Based Storage Protection (DBSP) in Public Infrastructure Clouds. Search on Bibsonomy NordSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jason W. Clark Everything But the Kitchen Sink: Determining the Effect of Multiple Attacks on Privacy Preserving Technology Users. Search on Bibsonomy NordSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dimiter Milushev, Dave Clarke 0001 Coinductive Unwinding of Security-Relevant Hyperproperties. Search on Bibsonomy NordSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Peeter Laud (eds.) Information Security Technology for Applications - 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers Search on Bibsonomy NordSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Torben Jensen, Heine Pedersen, Mads Chr. Olesen, René Rydhof Hansen THAPS: Automated Vulnerability Scanning of PHP Applications. Search on Bibsonomy NordSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kirsi Helkala, Nils Kalstad Svendsen, Per Thorsheim, Anders Wiehe Cracking Associative Passwords. Search on Bibsonomy NordSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tobias Pulls Privacy-Friendly Cloud Storage for the Data Track - An Educational Transparency Tool. Search on Bibsonomy NordSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Job Noorman, Nick Nikiforakis, Frank Piessens There Is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication. Search on Bibsonomy NordSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Teodor Sommestad, Jonas Hallberg Cyber Security Exercises and Competitions as a Platform for Cyber Security Experiments. Search on Bibsonomy NordSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Fabio Massacci, Federica Paci How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners. Search on Bibsonomy NordSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Benjamin Adolphi, Hanno Langweg Security Add-Ons for Mobile Platforms. Search on Bibsonomy NordSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Arjan Blom, Gerhard de Koning Gans, Erik Poll, Joeri de Ruiter, Roel Verdult Designed to Fail: A USB-Connected Reader for Online Banking. Search on Bibsonomy NordSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Behrooz Sangchoolie, Mazdak Rajabi Nasab, Tomas Olovsson, Wolfgang John Assessing the Quality of Packet-Level Traces Collected on Internet Backbone Links. Search on Bibsonomy NordSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tony Proctor The Development of Cyber Security Warning, Advice and Report Points. Search on Bibsonomy NordSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Björn Ståhl, Per Mellstrand Retooling and Securing Systemic Debugging. Search on Bibsonomy NordSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jan Zibuschka, Lothar Fritsch A Hybrid Approach for Highly Available and Secure Storage of Pseudo-SSO Credentials. Search on Bibsonomy NordSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Audun Jøsang, Bengt Carlsson (eds.) Secure IT Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings Search on Bibsonomy NordSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Huiying Duan, Cäcilia Zirn Can We Identify Manipulative Behavior and the Corresponding Suspects on Review Websites Using Supervised Learning? Search on Bibsonomy NordSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ramona Groner, Philipp Brune Towards an Empirical Examination of IT Security Infrastructures in SME. Search on Bibsonomy NordSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tuomas Aura, Kimmo Järvinen 0001, Kaisa Nyberg (eds.) Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers Search on Bibsonomy NordSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kazutomo Hamamoto, Yasuyuki Tahara, Akihiko Ohsuga Methods for Privacy Protection Considering Status of Service Provider and User Community. Search on Bibsonomy NordSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Arne Ansper Designing a Governmental Backbone. Search on Bibsonomy NordSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Károly Boda, Ádám Máté Földes, Gábor György Gulyás, Sándor Imre User Tracking on the Web via Cross-Browser Fingerprinting. Search on Bibsonomy NordSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Frédérick Lemay, Raphaël Khoury, Nadia Tawbi Optimized Inlining of Runtime Monitors. Search on Bibsonomy NordSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Assem Nazar, Mark M. Seeger, Harald Baier Rooting Android - Extending the ADB by an Auto-connecting WiFi-Accessible Service. Search on Bibsonomy NordSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Erich Wenger, Michael Hutter Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations. Search on Bibsonomy NordSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kirsi Helkala, Nils Kalstad Svendsen The Security and Memorability of Passwords Generated by Using an Association Element and a Personal Factor. Search on Bibsonomy NordSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Inger Anne Tøndel Visualization Control for Event-Based Public Display Systems Used in a Hospital Setting. Search on Bibsonomy NordSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jérôme Dossogne, Frédéric Lafitte Mental Voting Booths. Search on Bibsonomy NordSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hakem Beitollahi, Geert Deconinck A Ring Based Onion Circuit for Hidden Services. Search on Bibsonomy NordSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Priit Vinkel Internet Voting in Estonia. Search on Bibsonomy NordSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Elahe Kani-Zabihi, Martin Helmhout Increasing Service Users' Privacy Awareness by Introducing On-Line Interactive Privacy Features. Search on Bibsonomy NordSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mathias Claes, Vincent van der Leest, An Braeken Comparison of SRAM and FF PUF in 65nm Technology. Search on Bibsonomy NordSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jaydip Sen, Subhamoy Maitra An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks. Search on Bibsonomy NordSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jordi Cucurull, Simin Nadjm-Tehrani, Massimiliano Raciti Modular Anomaly Detection for Smartphone Ad Hoc Communication. Search on Bibsonomy NordSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Veelasha Moonsamy, Ronghua Tian, Lynn Margaret Batten Feature Reduction to Speed Up Malware Classification. Search on Bibsonomy NordSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Radu Lupu, Eugen Borcoci, Tinku Rasheed Identity-Based Key Derivation Method for Low Delay Inter-domain Handover Re-authentication Service. Search on Bibsonomy NordSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Deian Stefan, Alejandro Russo, David Mazières, John C. Mitchell Disjunction Category Labels. Search on Bibsonomy NordSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Elahe Kani-Zabihi, Lizzie Coles-Kemp Service Users' Requirements for Tools to Support Effective On-line Privacy and Consent Practices. Search on Bibsonomy NordSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Erka Koivunen "Why Wasn't I Notified?": Information Security Incident Reporting Demystified. Search on Bibsonomy NordSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Markku-Juhani O. Saarinen The PASSERINE Public Key Encryption and Authentication Mechanism. Search on Bibsonomy NordSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Miika Komu, Sasu Tarkoma, Andrey Lukyanenko Mitigation of Unsolicited Traffic across Domains with Host Identities and Puzzles. Search on Bibsonomy NordSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Pern Hui Chia, Andreas P. Heiner, N. Asokan Use of Ratings from Personalized Communities for Trustworthy Application Installation. Search on Bibsonomy NordSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Filippo Del Tedesco, Alejandro Russo, David Sands 0001 Implementing Erasure Policies Using Taint Analysis. Search on Bibsonomy NordSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Juan José Conti, Alejandro Russo A Taint Mode for Python via a Library. Search on Bibsonomy NordSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mikko Särelä, Christian Esteve Rothenberg, András Zahemszky, Pekka Nikander, Jörg Ott BloomCasting: Security in Bloom Filter Based Multicast. Search on Bibsonomy NordSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kari Kostiainen, N. Asokan, Jan-Erik Ekberg Credential Disabling from Trusted Execution Environments. Search on Bibsonomy NordSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Billy Bob Brumley Secure and Fast Implementations of Two Involution Ciphers. Search on Bibsonomy NordSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jonas Magazinius, Phu H. Phung, David Sands 0001 Safe Wrappers and Sane Policies for Self Protecting JavaScript. Search on Bibsonomy NordSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Olga Gadyatskaya, Fabio Massacci, Federica Paci, Sergey A. Stankevich Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications. Search on Bibsonomy NordSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sanna Suoranta, Jani Heikkinen, Pekka Silvekoski Authentication Session Migration. Search on Bibsonomy NordSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dominik Herrmann, Christoph Gerber, Christian Banse, Hannes Federrath Analyzing Characteristic Host Access Patterns for Re-identification of Web User Sessions. Search on Bibsonomy NordSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Philippe De Ryck, Maarten Decat, Lieven Desmet, Frank Piessens, Wouter Joosen Security of Web Mashups: A Survey. Search on Bibsonomy NordSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ravishankar Borgaonkar, Kevin Redon, Jean-Pierre Seifert Experimental Analysis of the Femtocell Location Verification Techniques. Search on Bibsonomy NordSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Gunnar Kreitz, Mads Dam, Douglas Wikström Practical Private Information Aggregation in Large Networks. Search on Bibsonomy NordSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Magnus Almgren, Wolfgang John Tracking Malicious Hosts on a 10Gbps Backbone Link. Search on Bibsonomy NordSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jason Crampton, Michael Huth 0001 A Framework for the Modular Specification and Orchestration of Authorization Policies. Search on Bibsonomy NordSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jose Quaresma, Christian W. Probst Protocol Implementation Generator. Search on Bibsonomy NordSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Md. Sadek Ferdous, Audun Jøsang, Kuldeep Singh, Ravishankar Borgaonkar Security Usability of Petname Systems. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Lander Casado, Philippas Tsigas ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks Security, Link Layer Security
1Mikko Kiviharju, Teijo Venäläinen, Suna Kinnunen Towards Modelling Information Security with Key-Challenge Petri Nets. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Modelling, Petri nets, Information security, Attack Graphs
1Benedikt Westermann Security Analysis of AN.ON's Payment Scheme. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Peeter Laud, Meelis Roos Formal Analysis of the Estonian Mobile-ID Protocol. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Heiko Roßnagel, Jan Zibuschka, Lexi Pimenidis, Thomas Deselaers Facilitating the Adoption of Tor by Focusing on a Promising Target Group. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anonymity services, privacy, business models, Adoption
1Thomas Vilarinho, Kjetil Haslum, Josef Noll Advanced SIM Capabilities Supporting Trust-Based Applications. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SIM cards, social networks, context-awareness, trust, pervasive computing, networked embedded systems, Sun SPOT
1Arne Ansper, Sven Heiberg, Helger Lipmaa, Tom André Øverland, Filip van Laenen Security and Trust for the Norwegian E-Voting Pilot Project E-valg 2011. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Electronic Voting Schemes, E-valg 2011, Norway, Open source, E-voting
1Igor Margasinski A Parallelism-Based Approach to Network Anonymization. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anonymous network architectures, privacy, anonymity, Communication system security
1Jan Muntermann, Heiko Roßnagel On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock Market. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Privacy Breaches, Privacy Disclosure Regulation, Event Study
1Jan Bouda, Jan Krhovjak, Vashek Matyas, Petr Svenda Towards True Random Number Generation in Mobile Environments. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF random number generator, randomness extractor, min-entropy
1Naveed Ahmed 0005, Christian Damsgaard Jensen A Mechanism for Identity Delegation at Authentication Level. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Identity Delegation, Usability of Security, Nomadic User, Practical Security
1Audun Jøsang, Torleiv Maseng, Svein J. Knapskog (eds.) Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nataliia Bielova, Fabio Massacci, Andrea Micheletti Towards Practical Enforcement Theories. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Heiko Roßnagel, Jan Muntermann Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mobile Real-time Service, SIM-based Security Tokens, Security Requirements
1Hugues Chabot, Raphaël Khoury, Nadia Tawbi Generating In-Line Monitors for Rabin Automata. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Monitoring Software Safety, Computer Security, Dynamic Analysis
1Jason Crampton Trade-Offs in Cryptographic Implementations of Temporal Access Control. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Riccardo Focardi, Flaminia L. Luccio, Graham Steel Blunting Differential Attacks on PIN Processing APIs. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Financial Cryptography, PIN Verification, Security APIs
1Ejaz Ahmed, Andrew J. Clark, George M. Mohay Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Finn Michael Halvorsen, Olav Haugen, Martin Eian, Stig Fr. Mjølsnes An Improved Attack on TKIP. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Karsten Peder Holth, Do van Thuan 0001, Ivar Jørstad, Do Van Thanh 0001 An Analysis of Widget Security. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Widget security, widget vulnerability, widget threat, Web 2.0 security
Displaying result #201 - #286 of 286 (100 per page; Change: )
Pages: [<<][1][2][3]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license