The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Secrecy with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1949-1985 (17) 1987-1990 (21) 1991-1993 (16) 1994-1997 (17) 1998-1999 (31) 2000 (25) 2001 (28) 2002 (38) 2003 (50) 2004 (71) 2005 (79) 2006 (114) 2007 (124) 2008 (144) 2009 (141) 2010 (89) 2011 (127) 2012 (126) 2013 (183) 2014 (216) 2015 (275) 2016 (260) 2017 (292) 2018 (308) 2019 (294) 2020 (242) 2021 (244) 2022 (219) 2023 (240) 2024 (39)
Publication types (Num. hits)
article(2093) book(2) data(1) incollection(4) inproceedings(1940) phdthesis(30)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 812 occurrences of 415 keywords

Results
Found 4070 publication records. Showing 4070 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Matthias Wilhelm 0001, Ivan Martinovic, Jens B. Schmitt Secret keys from entangled sensor motes: implementation and analysis. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF wsns, key generation
17Mark W. Storer, Kevin M. Greenan, Ethan L. Miller, Kaladhar Voruganti POTSHARDS - a secure, recoverable, long-term archival storage system. Search on Bibsonomy ACM Trans. Storage The full citation details ... 2009 DBLP  DOI  BibTeX  RDF approximate pointers, secret splitting, Archival storage
17Mark Manulis Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Hossein Ghodosi, Josef Pieprzyk Multi-Party Computation with Omnipresent Adversary. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Omnipresent Adversary, Proactive Secret Sharing, t-resilient Protocols, t-private Protocols, Multi-Party Computation
17Lucie Langer, Melanie Volkamer, Stefan G. Weber, Axel Schmidt 0001, Johannes Buchmann 0001 Towards long-term free and secret electronic elections providing voter-verifiability in the bulletin board model. Search on Bibsonomy ICEGOV The full citation details ... 2009 DBLP  DOI  BibTeX  RDF long-term anonymity, electronic voting, security requirements, verifiability
17Moreno Falaschi, Carlos Olarte, Catuscia Palamidessi A framework for abstract interpretation of timed concurrent constraint programs. Search on Bibsonomy PPDP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF timed concurrent constraint programming, abstract interpretation, reactive systems, denotational semantics, process calculi
17Wei Du, Mingxing He, Xiao Li A New Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Networks. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Self-healing Key Distribution, Constant Storage, Backward Security, Forward Security, WSNs
17Helmut Seidl, Kumar Neeraj Verma Flat and One-Variable Clauses for Single Blind Copying Protocols: The XOR Case. Search on Bibsonomy RTA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Helmut Seidl, Kumar Neeraj Verma Flat and one-variable clauses: Complexity of verifying cryptographic protocols with single blind copying. Search on Bibsonomy ACM Trans. Comput. Log. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF instantiation-based theorem proving, Cryptographic protocols, first-order logic, resolution, Horn clauses
17Matthieu R. Bloch, Rajesh Narasimha, Steven W. McLaughlin Network Security for Client-Server Architecture Using Wiretap Codes. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Alfred Menezes, Berkant Ustaoglu Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF NIST SP 800-56A, provable security, security models, key agreement protocols
17Michael Backes 0001, Stefan Lorenz, Matteo Maffei, Kim Pecina The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis. Search on Bibsonomy CAV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Anongporn Salaiwarakul, Mark Ryan 0001 Analysis of a Biometric Authentication Protocol for Signature Creation Application. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Maw-Jinn Tsaur, Wei-Chi Ku, Hao-Rung Chung An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Junzhou Luo, Ming Yang 0001 Analysis of security protocols based on challenge-response. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Strand Space Model, network security, protocol analysis, challenge-response
17Kohei Honda 0001, Nobuko Yoshida A uniform type structure for secure information flow. Search on Bibsonomy ACM Trans. Program. Lang. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF The ?-calculus, type-based program analysis, typing system, secure information flow
17Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees. Search on Bibsonomy SAFECOMP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF intrusion attacks, e-commerce protocols, model checking, SPIN
17Max I. Kanovich, Paul D. Rowe, Andre Scedrov Collaborative Planning With Privacy. Search on Bibsonomy CSF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Jan Nikodem, Maciej Nikodem Secure and Scalable Communication in Vehicle Ad Hoc Networks. Search on Bibsonomy EUROCAST The full citation details ... 2007 DBLP  DOI  BibTeX  RDF node exclusion, security, ad hoc networks, key distribution
17Woei-Jiunn Tsaur, Haw-Tyng Pai Dynamic Key Management Schemes for Secure Group Communication Based on Hierarchical Clustering in Mobile AdHocNetworks. Search on Bibsonomy ISPA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Ratna Dutta, Sourav Mukhopadhyay Designing Scalable Self-healing Key Distribution Schemes with Revocation Capability. Search on Bibsonomy ISPA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF session key distribution, self-healing, revocation, rekeying
17Chin-Chen Chang 0001, Yu-Wei Su, Iuon-Chang Lin A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress. Search on Bibsonomy Infoscale The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multicast key management, broadcast encryption
17Brian Rogers, Milos Prvulovic, Yan Solihin Efficient data protection for distributed shared memory multiprocessors. Search on Bibsonomy PACT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DSM multiprocessor, memory encryption and authentication, data security
17Florian Kerschbaum Practical Private Regular Expression Matching. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Goichiro Hanaoka, Yumiko Hanaoka, Manabu Hagiwara, Hajime Watanabe, Hideki Imai Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication. Search on Bibsonomy AAECC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Silvio Micali, Rafael Pass Local zero knowledge. Search on Bibsonomy STOC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptography, zero knowledge
17Liming Wang, Chuan-Kun Wu Authenticated Group Key Agreement for Multicast. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Seung Wook Jung, Souhwan Jung Secure Password Authentication for Distributed Computing. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Wei Wang 0105, Jianfeng Ma 0001, Sang-Jae Moon Ternary Tree Based Group Key Management in Dynamic Peer Networks. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Luo Yuan, Chaichana Mitrpant, A. J. Han Vinck, Kefei Chen Some new characters on the wire-tap channel of type II. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Naren Kodali, Csilla Farkas, Duminda Wijesekera Enforcing Semantics-Aware Security in Multimedia Surveillance. Search on Bibsonomy J. Data Semantics The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Peter P. Swire Security market: incentives for disclosure of vulnerabilities. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Iliano Cervesato, Catherine Meadows 0001, Dusko Pavlovic An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Peter Y. A. Ryan A variant of the Chaum voter-verifiable scheme. Search on Bibsonomy WITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Abdul Sahid Khan, Madhavan Mukund, S. P. Suresh Generic Verification of Security Protocols. Search on Bibsonomy SPIN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Véronique Cortier, Bogdan Warinschi Computationally Sound, Automated Proofs for Security Protocols. Search on Bibsonomy ESOP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Markus Hinkelmann, Andreas Jakoby Communications in Unknown Networks: Preserving the Secret of Topology. Search on Bibsonomy SIROCCO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Helmut Seidl, Kumar Neeraj Verma Flat and One-Variable Clauses: Complexity of Verifying Cryptographic Protocols with Single Blind Copying. Search on Bibsonomy LPAR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Eun-Kyung Ryu, Eun-Jun Yoon, Kee-Young Yoo An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Roberto Zunino, Pierpaolo Degano A Note on the Perfect Encryption Assumption in a Process Calculus. Search on Bibsonomy FoSSaCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee 0001 One-Round Protocols for Two-Party Authenticated Key Exchange. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Luke McAven, Reihaneh Safavi-Naini, Moti Yung Unconditionally Secure Encryption Under Strong Attacks. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Christian Cachin, Reto Strobl Asynchronous group key exchange with failures. Search on Bibsonomy PODC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF provable security, group communication, universal composability, group key exchange
17Eun-Kyung Ryu, Kee-Won Kim, Kee-Young Yoo An Authenticated Key Agreement Protocol Resistant to a Dictionary Attack. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Jeremy W. Bryans, Maciej Koutny, Peter Y. A. Ryan Modelling Dynamic Opacity Using Petri Nets with Silent Actions. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2004 DBLP  DOI  BibTeX  RDF non-deducibility, observable behaviour, silent actions, Petri nets, anonymity, opacity
17Liqun Chen 0002, Caroline Kudla Identity Based Authenticated Key Agreement Protocols from Pairings. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Joseph Y. Halpern, Kevin R. O'Neill Anonymity and Information Hiding in Multiagent Systems. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Peter Thiemann 0001 A Prototype Dependency Calculus. Search on Bibsonomy ESOP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Kevin Driscoll 0001 BeepBeep: Embedded Real-Time Encryption. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Lih-Chyau Wuu, Hui-Chun Chen A Scalable Framework for Secure Group Communication. Search on Bibsonomy ICN (2) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Peter Y. A. Ryan Mathematical Models of Computer Security. Search on Bibsonomy FOSAD The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Andrew C. Myers, Barbara Liskov Complete, Safe Information Flow with Decentralized Labels. Search on Bibsonomy S&P The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Peter Gemmell, Moni Naor Codes for Interactive Authentication. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
17Hugo Krawczyk Secret Sharing Made Short. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
17Siva Anantharaman, Hai Lin 0005, Christopher Lynch, Paliath Narendran, Michaël Rusinowitch Cap unification: application to protocol security modulo homomorphic encryption. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF secrecy analysis, protocol, rewriting, unification
17Hani Alzaid, DongGook Park, Juan Manuel González Nieto, Ernest Foo Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF sandwich attack, forward and backward secrecy, supervisory control and data acquisition, wireless sensor network, key management, node, process control systems
17Chung-Fu Lu, Tzong-Chen Wu, Tzay-Farn Shih Authenticated Group Key Agreement Protocol for Unbalanced Wireless Mobile Networks. Search on Bibsonomy CISIS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Unbalanced wireless networks, Mutual authentication, Group key agreement, Forward secrecy
17Mengbo Hou, Qiuliang Xu Secure and Efficient Two-Party Authenticated Key Agreement Protocol from Certificateless Public Key Encryption Scheme. Search on Bibsonomy NCM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF key replicating attack, identity-based cryptography, authenticated key agreement, perfect forward secrecy, certificateless public key cryptography
17Annabelle McIver, Carroll C. Morgan Sums and Lovers: Case Studies in Security, Compositionality and Refinement. Search on Bibsonomy FM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Refinement of security, formalised secrecy, hierarchical security reasoning, compositional semantics
17Zhiyao Liang, Rakesh M. Verma Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF insecurity, Cryptographic protocols, secrecy, NP
17Reiner Dojen, Vladimir Pasca, Tom Coffey Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications. Search on Bibsonomy MobiSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mobile end-to-end communication, analysis of security protocols, authentication and secrecy protocol, impersonation attack
17Chunyong Yin, Ruxia Sun, Shuoben Bi A Method of Automatic Key Generation Based on Handwriting. Search on Bibsonomy SNPD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF personal characteristic, algorithm, handwriting, secrecy, key generation
17Hua Guo, Yi Mu 0001, Xiyong Zhang, Zhoujun Li 0001 Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings. Search on Bibsonomy UIC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Master key forward secrecy, Provable security, Weil pairing, Authenticated key agreement
17Hongfeng Zhu, Tianhua Liu, Jie Liu Robust and Simple Multi-server Authentication Protocol without Verification Table. Search on Bibsonomy HIS (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF password authentication protocol, Smart card, Forward Secrecy, multi-server
17Mengbo Hou, Qiuliang Xu, Tao Ban Perfect Forward Secure Two-Party Key Agreement Protocol with Key Escrow. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF key control, identity-based encryption, key escrow, authenticated key agreement, perfect forward secrecy
17Eun-Jun Yoon, Kee-Young Yoo Two Security Problems of RFID Security Method with Ownership Transfer. Search on Bibsonomy NPC Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, RFID, Cryptanalysis, Forward secrecy, DoS attack
17Bin Dai 0003, Yuan Luo 0003, A. J. Han Vinck Wiretap Channel with Side Information from Part of Encoder. Search on Bibsonomy NPC Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF wiretap channel, perfect secrecy, side information
17Karthikeyan Bhargavan, Cédric Fournet, Ricardo Corin, Eugen Zalinescu Cryptographically verified implementations for TLS. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF verified implementations, authentication, cryptographic protocols, SSL, TLS, secrecy
17Diana Berbecaru, Luca Albertalli An Optimized Double Cache Technique for Efficient Use of Forward-secure Signature Schemes. Search on Bibsonomy PDP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF generic FSS schemes, double cache technique, backward secrecy
17Trent Jaeger, Reiner Sailer, Yogesh Sreenivasan Managing the risk of covert information flows in virtual machine systems. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF chinese wall policy, information flow secrecy, covert channels
17Yi-Hwa Chen, Jinn-ke Jan Enhancement of digital signature with message recovery using self-certified public keys and its variants. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF self-certified public key, authenticated encryption, forward secrecy
17Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk Secure off-the-record messaging. Search on Bibsonomy WPES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, instant messaging, deniability, perfect forward secrecy
17Alfred Kobsa, Jörg Schreck Privacy through pseudonymity in user-adaptive systems. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Chaum mix, security, privacy, access control, personalization, User modeling, anonymity, encryption, reference model, pseudonymity, secrecy, personal information, KQML, user-adaptive systems
17Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers Secure program partitioning. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF mutual distrust, distributed systems, integrity, type systems, security policies, Confidentiality, secrecy, declassification, downgrading
17Michael Steiner 0001, Peter Buhler, Thomas Eirich, Michael Waidner Secure password-based cipher suite for TLS. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF transport layer security, weak secret, password, key agreement, dictionary attack, Authenticated key exchange, perfect forward secrecy, secure channel
17Danny Dolev, Cynthia Dwork, Orli Waarts, Moti Yung Perfectly Secure Message Transmission Search on Bibsonomy FOCS The full citation details ... 1990 DBLP  DOI  BibTeX  RDF faulty communication lines, secure message transmission, perfectly secure communication, perfect secrecy, perfect resiliency, connectivity, efficient algorithms, network diameter, faulty processors, general network, worst case time
17Dennie Van Tassel Advanced cryptographic techniques for computer. Search on Bibsonomy Commun. ACM The full citation details ... 1969 DBLP  DOI  BibTeX  RDF confidential information processing, secrecy systems, cryptanalysis, security systems, ciphers, cryptographic
11Shashi Bhushan Kotwal, Chinmoy Kundu, Sudhakar Modem, Mark F. Flanagan Transmitter Selection for Secrecy in Frequency-Selective Fading With Multiple Eavesdroppers and Wireless Backhaul Links. Search on Bibsonomy IEEE Trans. Veh. Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Himanshu Sharma, Neeraj Kumar 0001, Rajkumar Tekchandani SecBoost: Secrecy-Aware Deep Reinforcement Learning Based Energy-Efficient Scheme for 5G HetNets. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Dawei Wang 0001, Menghan Wu, Zhongxiang Wei, Keping Yu, Lingtong Min, Shahid Mumtaz Uplink Secrecy Performance of RIS-Based RF/FSO Three-Dimension Heterogeneous Networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Naeem Uz Zaman, Khalid Munawar, Muhammad Moinuddin, Ahmad Kamal Hassan, Ubaid M. Al-Saggaf Sum Capacity-Based Modeling and Secrecy Analysis of MISO-NOMA Cooperative IoT Framework. Search on Bibsonomy IEEE Open J. Commun. Soc. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Kiran Kumar Godugu, Suseela Vappangi Investigations on Secrecy Performance of Downlink Overlay CR-NOMA System With SIC Imperfections. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11P. P. Hema, A. V. Babu 0001 Physical Layer Secrecy Performance Analysis of Jamming-Assisted Overlay Cognitive NOMA Networks With Hardware Impairments and Multiple Non-Colluding Eavesdroppers. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Li Ping Qian 0001, Mingqing Li, Ping Ye, Qian Wang, Bin Lin 0001, Yuan Wu 0001, Xiaoniu Yang Secrecy-Driven Energy Minimization in Federated-Learning-Assisted Marine Digital Twin Networks. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Zhisheng Yin, Nan Cheng, Yunchao Song, Yilong Hui, Yunhan Li, Tom H. Luan, Shui Yu 0001 UAV-Assisted Secure Uplink Communications in Satellite-Supported IoT: Secrecy Fairness Approach. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Huihui Wu, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang 0001, Tarik Taleb Achieving Covertness and Secrecy: The Interplay Between Detection and Eavesdropping Attacks. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Jianchao Zheng, Qi Zhang 0002 Secrecy Outage Probability of Multiple-Input-Multiple-Output Secure Internet of Things Communication Systems. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Yanyan Shen, Chun-Jie Wang, Weilin Zang, Liang Xue, Bo Yang 0006, Xinping Guan Outage Constrained Max-Min Secrecy Rate Optimization for IRS-Aided SWIPT Systems With Artificial Noise. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Mohamed Seifelnasr, Riham AlTawy, Amr M. Youssef, Essam Ghadafi Privacy-Preserving Mutual Authentication Protocol With Forward Secrecy for IoT-Edge-Cloud. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Haitham S. Khallaf, Sherief Hashima, Mohamed Rihan, Ehab Mahmoud Mohamed, Hossam M. Kasem Quantifying Impact of Pointing Errors on Secrecy Performance of UAV-Based Relay-Assisted FSO Links. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Mohamed Seifelnasr, Riham AlTawy, Amr M. Youssef SKAFS: Symmetric Key Authentication Protocol With Forward Secrecy for Edge Computing. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Masoud Kaveh, Zheng Yan 0002, Riku Jäntti Secrecy Performance Analysis of RIS-Aided Smart Grid Communications. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Yebo Gu, Tao Shen 0004, Jian Song, Qingbo Wang Enhancing Secrecy Capacity With Non-Orthogonal Artificial Noise Based on Pilot Information Codebook. Search on Bibsonomy IEEE Wirel. Commun. Lett. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Toan-Van Nguyen, Thai-Hoc Vu, Thien Huynh-The, Daniel Benevides da Costa Secrecy Performance of Short-Packet Communications in MultiHop IoT Networks With Imperfect CSI. Search on Bibsonomy IEEE Wirel. Commun. Lett. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Shaobo Jia, Rong Wang, Yao Xu, Yi Lou, Di Zhang 0002, Takuro Sato Secrecy Analysis of ABCom-Based Intelligent Transportation Systems With Jamming. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Sergey Loyka, Neri Merhav The Secrecy Capacity of the Wiretap Channel With Additive Noise and Rate-Limited Help. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Maiara F. Bollauf, Hsuan-Yin Lin, Øyvind Ytrehus Secrecy Gain of Formally Unimodular Lattices From Codes Over the Integers Modulo 4. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Krati Dubey, Sudhakar Pandey, Sanjay Kumar Secrecy-enabled resource allocation in cloud-assisted IoT networks. Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Muhammad Farooq, Le-Nam Tran, Fatemeh Golpayegani, Nima Afraz On the Sum Secrecy Rate Maximisation for Wireless Vehicular Networks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Yingjie Pei, Xinwei Yue, Chongwen Huang, Zhiping Lu Secrecy Performance Analysis of RIS Assisted Ambient Backscatter Communication Networks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 4070 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license