The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SECRYPT"( http://dblp.L3S.de/Venues/SECRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/secrypt

Publication years (Num. hits)
2006 (73) 2007 (67) 2008 (83) 2009 (62) 2010 (71) 2011 (68) 2012 (67) 2013 (71) 2014 (64) 2015 (53) 2016 (52) 2017 (67) 2021 (96) 2022 (85) 2023 (100)
Publication types (Num. hits)
inproceedings(1064) proceedings(15)
Venues (Conferences, Journals, ...)
SECRYPT(1079)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 1079 publication records. Showing 1079 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Milan Cermák, Denisa Sramkova GRANEF: Utilization of a Graph Database for Network Forensics. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Stephan Seifermann, Robert Heinrich, Dominik Werle, Ralf H. Reussner A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Stefano Berlato, Roberto Carbone, Silvio Ranise Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jennifer Bellizzi, Mark Vella, Christian Colombo 0001, Julio C. Hernandez-Castro Responding to Living-Off-the-Land Tactics using Just-In-Time Memory Forensics (JIT-MF) for Android. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Chloe Tartan, Craig Wright, Michaella Pettit, Wei Zhang A Scalable Bitcoin-based Public Key Certificate Management System. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Mitsuhiro Mabuchi, Koji Hasebe C2RBAC: An Extended Capability-Role-Based Access Control with Context Awareness for Dynamic Environments. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Héloïse Maurel, Santiago A. Vidal, Tamara Rezk Statically Identifying XSS using Deep Learning. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Marino Miculan, Nicola Vitacolonna Automated Symbolic Verification of Telegram's MTProto 2.0. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Kees Leune, Sung Kim Supporting Cyber Threat Analysis with Service-Oriented Enterprise Modeling. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Benoît Fournier, Valérie Viet Triem Tong, Gilles Guette Accurate Measurement of the Energy Consumption of Security Functions. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Aslí Bay, Zeki Erkin, Mina Alishahi, Jelle Vos Multi-Party Private Set Intersection Protocols for Practical Applications. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Thomas Marchioro, Andrei Kazlouski, Evangelos P. Markatos User Identification from Time Series of Fitness Data. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ratna Dutta, Sumit Kumar Debnath, Chinmoy Biswas Storage Friendly Provably Secure Multivariate Identity-Based Signature from Isomorphism of Polynomials Problem. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Milan Lopuhaä-Zwakenberg, Mina Alishahi, Jeroen Kivits, Jordi Klarenbeek, Gert-Jan van der Velde, Nicola Zannone Comparing Classifiers' Performance under Differential Privacy. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Rosangela Casolare, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone Mobile Family Detection through Audio Signals Classification. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Efe Ulas Akay Seyitoglu, Attila Altay Yavuz, Thang Hoang Proof-of-Useful-Randomness: Mitigating the Energy Waste in Blockchain Proof-of-Work. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Denis Migdal, Ilaria Magotti, Christophe Rosenberger Classifying Biometric Systems Users among the Doddington Zoo: Application to Keystroke Dynamics. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Mark Dockendorf, Ram Dantu, Kirill Morozov, Sanjukta Bhowmick Investing Data with Untrusted Parties using HE. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Wojciech Wodo, Damian Stygar, Przemyslaw Blaskiewicz Security Issues of Electronic and Mobile Banking. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Pritam Pallab, Abhijit Das 0004 AVX-512-based Parallelization of Block Sieving and Bucket Sieving for the General Number Field Sieve Method. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yosra Fraiji, Lamia Ben Azzouz, Wassim Trojet, Ghaleb Hoblos, Leïla Azouz Saïdane RICAV: RIsk based Context-Aware Security Solution for the Intra-Electric Vehicle Network. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Md. Morshedul Islam, Reihaneh Safavi-Naini Model Inversion for Impersonation in Behavioral Authentication Systems. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Salimeh Dashti, Anderson Santana de Oliveira, Caelin Kaplan, Manuel Dalcastagné, Silvio Ranise Can Data Subject Perception of Privacy Risks Be Useful in a Data Protection Impact Assessment? Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Hiral S. Trivedi, Sankita J. Patel Privacy Preserving Scalable Authentication Protocol with Partially Trusted Third Party for Distributed Internet-of-Things. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Cyrius Nugier, Diane Leblanc-Albarel, Agathe Blaise, Simon Masson, Paul Huynh, Yris Brice Wandji Piugie An Upcycling Tokenization Method for Credit Card Numbers. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Mujahid Muhammad, Paul Kearney, Adel Aneiba, Junaid Arshad, Andreas Kunz RMCCS: RSSI-based Message Consistency Checking Scheme for V2V Communications. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1I Wayan Budi Sentana, Muhammad Ikram 0001, Mohamed Ali Kâafar, Shlomo Berkovsky Empirical Security and Privacy Analysis of Mobile Symptom Checking Apps on Google Play. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Marius Schlegel Trusted Enforcement of Application-specific Security Policies. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Erwin Hoogerwerf, Daphne van Tetering, Aslí Bay, Zekeriya Erkin Efficient Joint Random Number Generation for Secure Multi-party Computation. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jaideep Vaidya Privacy-Preserving Analytics in the Big Data Environment. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  BibTeX  RDF
1Thomas Groß 0001 Hashing to Prime in Zero-Knowledge. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Basant Subba, Ayushi Singh A Novel Security Framework for Minimization of False Information Dissemination in VANETs: Bayesian Game Formulation. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Michael Tunstall, Louiza Papachristodoulou, Kostas Papagiannopoulos Boolean Exponent Splitting. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Sara Foresti, Giovanni Livraga Selective Owner-side Encryption in Digital Data Markets: Strategies for Key Derivation. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Anass Sbai, Cyril Drocourt, Gilles Dequen A New Delegated Authentication Protocol based on PRE. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Christophe Nègre Side Channel Counter-measures based on Randomized AMNS Modular Multiplication. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Grzegorz J. Blinowski, Pawel Piotrowski, Michal Wisniewski Comparing Support Vector Machine and Neural Network Classifiers of CVE Vulnerabilities. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Gustavo Gonzalez Granadillo, Alejandro G. Bedoya, Rodrigo Diaz An Improved Live Anomaly Detection System (I-LADS) based on Deep Learning Algorithms. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Mario Lilli, Chiara Braghin, Elvinia Riccobene Formal Proof of a Vulnerability in Z-Wave IoT Protocol. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1I Wayan Budi Sentana, Muhammad Ikram 0001, Mohamed Ali Kâafar BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-domain Routing via Blockchain. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Wisnu Uriawan, Omar Hasan, Youakim Badr, Lionel Brunie Collateral-Free Trustworthiness-based Personal Lending on a Decentralized Application (DApp). Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Sourav Roy, Dipnarayan Das, Anindan Mondal, Mahabub Hasan Mahalat, Suchismita Roy, Bibhash Sen PUF based Lightweight Authentication and Key Exchange Protocol for IoT. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Takoua Guiga, Jean-Jacques Schwartzmann, Christophe Rosenberger Privacy Aura for Transparent Authentication on Multiple Smart Devices. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Karl Norrman, Vaishnavi Sundararajan, Alessandro Bruni Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Felix Hörandner, Bernd Prünster Armored Twins: Flexible Privacy Protection for Digital Twins through Conditional Proxy Re-Encryption and Multi-Party Computation. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Marius Schlegel, Peter Amthor 0001 The Missing Piece of the ABAC Puzzle: A Modeling Scheme for Dynamic Analysis. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1George Teseleanu Signer and Message Ambiguity from a Variety of Keys. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1V. S. Subrahmanian VEST: An Early Warning System for Future Cyber-Attacks. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  BibTeX  RDF
1Ravi S. Sandhu Access Control Convergence: Challenges and Opportunities. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  BibTeX  RDF
1Sabrina De Capitani di Vimercati, Pierangela Samarati (eds.) Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, July 6-8, 2021. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jeffrey Todd McDonald, Ramya Manikyam, Sébastien Bardin, Richard Bonichon, Todd R. Andel Program Protection through Software-based Hardware Abstraction. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Vasilios Koutsokostas, Constantinos Patsakis Python and Malware: Developing Stealth and Evasive Malware without Obfuscation. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Hiroki Okada 0001, Shinsaku Kiyomoto, Carlos Cid A Comparison of GKE Protocols based on SIDH. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Sofiane Lounici, Mohamed Njeh, Orhan Ermis, Melek Önen, Slim Trabelsi Preventing Watermark Forging Attacks in a MLaaS Environment. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Parjanya Vyas, R. K. Shyamasundar SecSDN: A Novel Architecture for a Secure SDN. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Pascal Lafourcade 0001, Léo Robert, Demba Sow Fast Cramer-Shoup Cryptosystem. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Navoda Senavirathne, Vicenç Torra Systematic Evaluation of Probabilistic k-Anonymity for Privacy Preserving Micro-data Publishing and Analysis. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ferucio Laurentiu Tiplea, Cristian Hristea Practically Efficient RFID Scheme with Constant-time Identification. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jacek Cichon, Krzysztof Majcher, Miroslaw Kutylowski Fair Mutual Authentication. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Julius Hekkala, Sara Nikula, Outi-Marja Latvala, Kimmo Halunen Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Nadia Hocine, Ismail Bokhari Dynamic Access Control Framework for Enterprise Content Management Systems. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Hannah Keller, Helen Möllering, Thomas Schneider 0003, Hossein Yalame Balancing Quality and Efficiency in Private Clustering with Affinity Propagation. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Kaspar Hageman, Egon Kidmose, René Rydhof Hansen, Jens Myrup Pedersen Can a TLS Certificate Be Phishy? Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Pål Ellingsen, Constanza Riera, Pantelimon Stanica, Anton Tkachenko An Extension of the Avalanche Criterion in the Context of c-Differentials. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Raul Casanova Marques, Pavel Pascacio, Jan Hajny, Joaquín Torres-Sospedra Anonymous Attribute-based Credentials in Collaborative Indoor Positioning Systems. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Nazim Uddin Sheikh, Zhigang Lu 0001, Hassan Asghar 0001, Mohamed Ali Kâafar Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Marinos Tsantekidis, Vassilis Prevelakis MMU-based Access Control for Libraries. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yaw Frempong, Yates Snyder, Erfan Al-Hossami, Meera Sridhar, Samira Shaikh HIJaX: Human Intent JavaScript XSS Generator. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Sara Ricci, Petr Jedlicka, Peter Cíbik, Petr Dzurenda, Lukas Malina, Jan Hajny Towards CRYSTALS-Kyber VHDL Implementation. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Daniel Demmler, Stefan Katzenbeisser 0001, Thomas Schneider 0003, Tom Schuster, Christian Weinert Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal Secure Computation by Secret Sharing using Input Encrypted with Random Number. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Anne V. D. M. Kayem, Nikolai J. Podlesny, Christoph Meinel On Chameleon Pseudonymisation and Attribute Compartmentation-as-a-Service. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Piotr Kawa, Piotr Syga Verify It Yourself: A Note on Activation Functions' Influence on Fast DeepFake Detection. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Christophe Ponsard, Valéry Ramon, Jean-Christophe Deprez Goal and Threat Modelling for Driving Automotive Cybersecurity Risk Analysis Conforming to ISO/SAE 21434. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jaouhara Bouamama, Mustapha Hedabou, Mohammed Erradi Cloud Key Management using Trusted Execution Environment. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Muhammad I. H. Sukmana, Kai-Oliver Kohlen, Carl Gödecken, Pascal Schulze, Christoph Meinel Are You There, Moriarty? Feasibility Study of Internet-based Location for Location-based Access Control Systems. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Florian Thaeter, Rüdiger Reischuk Scalable k-anonymous Microaggregation: Exploiting the Tradeoff between Computational Complexity and Information Loss. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ibifubara Iganibo, Massimiliano Albanese, Marc Mosko, Eric Bier, Alejandro E. Brito Vulnerability Metrics for Graph-based Configuration Security. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Carlos Villarán, Marta Beltrán Protecting End User's Privacy When using Social Login through GDPR Compliance. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Fabien Herbaut, Nicolas Méloni, Pascal Véron Compact Variable-base ECC Scalar Multiplication using Euclidean Addition Chains. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Colby Parker, Jeffrey Todd McDonald, Dimitrios Damopoulos Machine Learning Classification of Obfuscation using Image Visualization. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Gamze Tillem, Zekeriya Erkin, Reginald L. Lagendijk Mining Encrypted Software Logs using Alpha Algorithm. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Giulio Aliberti, Roberto Di Pietro, Stefano Guarino SLAP: Secure Lightweight Authentication Protocol for Resource-constrained Devices. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jonghwan Im, Jongwon Yoon, Minsik Jin Interaction Platform for Improving Detection Capability of Dynamic Application Security Testing. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ashutosh Dhar Dwivedi, Pawel Morawiecki, Sebastian Wójtowicz Differential-linear and Impossible Differential Cryptanalysis of Round-reduced Scream. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bernd Prünster, Florian Reimair, Andreas Reiter The Net Rat - Rethinking Connected Services for Increased Security. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gerardo Canfora, Giovanni Cappabianca, Pasquale Carangelo, Fabio Martinelli, Francesco Mercaldo, Ernesto Rosario Russo, Corrado Aaron Visaggio Mobile Silent and Continuous Authentication using Apps Sequence. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ashutosh Dhar Dwivedi, Pawel Morawiecki, Sebastian Wójtowicz Differential and Rotational Cryptanalysis of Round-reduced MORUS. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mouhebeddine Berrima, Pascal Lafourcade 0001, Matthieu Giraud, Narjes Ben Rajeb Formal Analyze of a Private Access Control Protocol to a Cloud Storage. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Vishwas T. Patil, R. K. Shyamasundar Privacy as a Currency: Un-regulated?. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Salah S. Harb, Moath H. A. Jarrah Accelerating Square Root Computations Over Large GF (2m). Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Venesa Watson, Xinxin Lou, Yuan Gao A Review of PROFIBUS Protocol Vulnerabilities - Considerations for Implementing Authentication and Authorization Controls. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sana Hamdi 0001, Alda Lopes Gançarski, Amel Bouzeghoub, Sadok Ben Yahia Reputation Management in Online Social Networks - A New Clustering-based Approach. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Debanjan Sadhya, Bodhi Chakraborty, Sanjay Kumar Singh Capturing the Effects of Attribute based Correlation on Privacy in Micro-databases. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Peter Amthor 0001 Efficient Heuristic Safety Analysis of Core-based Security Policies. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1James Howe, Máire O'Neill GLITCH: A Discrete Gaussian Testing Suite for Lattice-based Cryptography. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray Using a History-based Profile to Detect and Respond to DDoS Attacks. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ashutosh Dhar Dwivedi, Milos Kloucek, Pawel Morawiecki, Ivica Nikolic, Josef Pieprzyk, Sebastian Wójtowicz SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Florian Reimair, Johannes Feichtner, Dominik Ziegler 0001, Sandra Kreuzhuber, Thomas Zefferer Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Cyrielle Feron, Vianney Lapotre, Loïc Lagadec PAnTHErS: A Prototyping and Analysis Tool for Homomorphic Encryption Schemes. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 1079 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license