The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Secure with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1970-1976 (16) 1977-1978 (16) 1979 (15) 1980-1981 (19) 1982-1983 (29) 1984 (34) 1985 (34) 1986 (23) 1987 (40) 1988 (49) 1989 (70) 1990 (84) 1991 (65) 1992 (80) 1993 (90) 1994 (113) 1995 (91) 1996 (177) 1997 (182) 1998 (287) 1999 (365) 2000 (389) 2001 (556) 2002 (688) 2003 (949) 2004 (1291) 2005 (1751) 2006 (2029) 2007 (2179) 2008 (2159) 2009 (2046) 2010 (1416) 2011 (1672) 2012 (1552) 2013 (1840) 2014 (1836) 2015 (2324) 2016 (2333) 2017 (2745) 2018 (3002) 2019 (3155) 2020 (3262) 2021 (3436) 2022 (3509) 2023 (3638) 2024 (875)
Publication types (Num. hits)
article(21303) book(77) data(3) incollection(392) inproceedings(29814) phdthesis(766) proceedings(156)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 14395 occurrences of 3839 keywords

Results
Found 52511 publication records. Showing 52511 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
24Hong Wang 0006, Hiroyuki Takizawa, Hiroaki Kobayashi A Performance Study of Secure Data Mining on the Cell Processor. Search on Bibsonomy CCGRID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Performance Evaluation, Data Clustering, Volunteer Computing
24Yvo Desmedt, Helger Lipmaa, Duong Hieu Phan Hybrid Damgård Is CCA1-Secure under the DDH Assumption. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CCA1-security, Damgård’s cryptosystem, DDH, hybrid cryptosystems
24Jiunn-Jye Lee, Chun-Ying Huang, Li-Yuan Lee, Chin-Laung Lei Design and Implementation of Secure Communication Channels over UPnP Networks. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Jake Wires, Michael J. Feeley Secure file system versioning at the block level. Search on Bibsonomy EuroSys The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Rahul Singh, Al Farooq Salam Semantic information assurance for secure distributed knowledge management: a business process perspective. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part A The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Jaimee Brown, Juan Manuel González Nieto, Colin Boyd Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RSA assumptions, public key encryption, chosen-ciphertext security
24Ran Canetti, Shai Halevi, Jonathan Katz Adaptively-Secure, Non-interactive Public-Key Encryption. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Guang-Lei Song, Kang Zhang 0001, Bhavani Thuraisingham, Jun Kong Secure Model Management Operations for the Web. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Chris Peikert, Abhi Shelat, Adam D. Smith Lower bounds for collusion-secure fingerprinting. Search on Bibsonomy SODA The full citation details ... 2003 DBLP  BibTeX  RDF
24Hao-Hua Chu, Lintian Qiao, Klara Nahrstedt, Hua Wang, Ritesh Jain A secure multicast protocol with copyright protection. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF watermark, copyright protection, key distribution, multicast security
24Albert Levi, Çetin Kaya Koç CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24George I. Davida, Yair Frankel, Brian J. Matt On Enabling Secure Applications Through Off-Line Biometric Identification. Search on Bibsonomy S&P The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
23Rongxing Lu, Xiaodong Lin 0001, Xiaohui Liang, Xuemin (Sherman) Shen Secure provenance: the essential of bread and butter of data forensics in cloud computing. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF data forensics, secure provenance, privacy, cloud computing, provable security, standard model
23Huaqun Guo, Fan Yu, Wai-Choong Wong, Vivy Suhendra, Yongdong Wu Secure wireless communication platform for EV-to-Grid research. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF secure wireless communication, authentication protocol, power grid, electric vehicle
23Erdal Cayirci, Son Thanh Nguyen, Chunming Rong Secure many to many routing for wireless sensor and actuator networks. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF sensor, actuator, secure routing
23Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee Improved Non-committing Encryption with Applications to Adaptively Secure Protocols. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF adaptive corruption, non-committing encryption, public-key encryption, secure multi-party computation
23Jinsu Kim, Seong-Yong Choi, Seungjin Han, Jun Hyeog Choi, Junghyun Lee, Keewook Rim Secure and Energy Efficient Key Management Scheme Using Authentication in Cluster Based Routing Protocol. Search on Bibsonomy FGIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Key Management Scheme, Secure Protocol, Cluster-based Routing
23Reza Shokri, Marcin Poturalski, Gael Ravot, Panos Papadimitratos, Jean-Pierre Hubaux A practical secure neighbor verification protocol for wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secure neighbor verification, wireless sensor networks
23Taejoon Park, Kang G. Shin Secure routing based on distributed key sharing in large-scale sensor networks. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Distributed key sharing and servers, attack tolerance, large-scale sensor networks, secure geographic forwarding, key establishment
23Shuhua Wu, Yuefei Zhu Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting. Search on Bibsonomy NPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF three-party, password, forward-secure
23Di Ma Practical forward secure sequential aggregate signatures. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF forward secure sequential aggregate authentication, quality of forward security, MAC, signature
23Assaf Ben-David, Noam Nisan, Benny Pinkas FairplayMP: a system for secure multi-party computation. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptography, secure multi-party computation
23Ionut Constandache, Aydan R. Yumerefendi, Jeffrey S. Chase Secure control of portable images in a virtual computing utility. Search on Bibsonomy VMSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF secure binding, virtual machines, control, contextualization
23Carmit Hazay, Yehuda Lindell Constructions of truly practical secure protocols using standard smartcards. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF provable security, smartcards, secure computation
23Bon K. Sy Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication. Search on Bibsonomy EuroISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Privacy preserving retrieval, Biometrics, Secure computation
23Andreas Sjöholm, Ludwig Seitz, Babak Sadighi Secure communication for ad-hoc, federated groups. Search on Bibsonomy IDtrust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF tree-based group, access control, authorization, XACML, secure group communication, Diffie-Hellman
23Yonglong Luo, Liusheng Huang, Hong Zhong 0001 Secure Two-Party Point-Circle Inclusion Problem. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF homomorphic encryption scheme, private comparison, computational geometry, secure multi-party computation
23G. Edward Suh, Charles W. O'Donnell, Srinivas Devadas Aegis: A Single-Chip Secure Processor. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Aegis, FPGA, architecture, secure processor, single chip
23Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. Gligor MiniSec: a secure sensor network communication architecture. Search on Bibsonomy IPSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secure communication architecture, sensor network security
23Marc Mouffron, Frederic Rousseau 0002, Huafei Zhu Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Squared Euclidean Distance, Stand-alone and simulation-based model, Secure two-party computation
23Juan A. Garay, Berry Schoenmakers, José Villegas Practical and Secure Solutions for Integer Comparison. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Millionaires’ problem, secure multi-party computation, homomorphic encryption
23Muhammad Shoaib Siddiqui, Syed Obaid Amin, Choong Seon Hong On a Low Security Overhead Mechanism for Secure Multi-path Routing Protocol in Wireless Mesh Network. Search on Bibsonomy APNOMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Secure multi-path routing, Security overhead, Wireless mesh networks, Public key cryptography, Security management
23Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai Zero-knowledge from secure multiparty computation. Search on Bibsonomy STOC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptography, zero-knowledge, secure computation, black-box reductions
23Li Jin, Zhengding Lu ASITL: Adaptive Secure Interoperation Using Trust-Level. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Trust-level, Access Control, Secure Interoperation
23Gergely Ács, Levente Buttyán, István Vajda Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Mobile ad hoc networks, provable security, secure routing
23Jing Deng 0002, Richard Han 0001, Shivakant Mishra Secure code distribution in dynamically programmable wireless sensor networks. Search on Bibsonomy IPSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secure reprogramming, security, sensor networks
23Geoffrey Smith 0001, Rafael Alpízar Secure information flow with random assignment and encryption. Search on Bibsonomy FMSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IND-CCA, IND-CPA, encryption, type systems, reductions, noninterference, secure information flow
23Víctor Torres, Jaime Delgado, Silvia Llorente An Implementation of a Trusted and Secure DRM Architecture. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Secure content management, multimedia content protection, digital rights management systems
23Hee-Un Park, Dong-Myung Shin Intelligent Anonymous Secure E-Voting Scheme. Search on Bibsonomy KES (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Anonymous Secure Selection, Intelligent Magic Sticker, Anonymous Authentication
23Nikolai Joukov, Harry Papaxenopoulos, Erez Zadok Secure deletion myths, issues, and solutions. Search on Bibsonomy StorageSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secure deletion, unintended data recovery, security, file systems
23James Walden, Charles E. Frank Secure software engineering teaching modules. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secure software engineering, software security, information security education
23Qingfeng Chen, Chengqi Zhang, Shichao Zhang 0001 ENDL: A Logical Framework for Verifying Secure Transaction Protocols. Search on Bibsonomy Knowl. Inf. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Secure transaction protocol, Security, Verification, Integrity, Electronic commerce, Confidentiality
23Hiroaki Inoue, Akihisa Ikeno, Masaki Kondo, Junji Sakai, Masato Edahiro FIDES: an advanced chip multiprocessor platform for secure next generation mobile terminals. Search on Bibsonomy CODES+ISSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF secure mobile terminal, chip multiprocessor, linux
23Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang Secure Multicast Using Proxy Encryption. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multicast key management, cipher sequences, proxy encryption, ElGamal cryptosystem, Secure multicast
23Danny Harnik, Moni Naor, Omer Reingold, Alon Rosen Completeness in two-party secure computation: a computational view. Search on Bibsonomy STOC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF oblivious tansfer, completeness, secure computation
23Eric Cronin, Sugih Jamin, Tal Malkin, Patrick D. McDaniel On the performance, feasibility, and use of forward-secure signatures. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF forward-secure signatures, digital signatures
23Michael Backes 0001, Christian Cachin, Reto Strobl Proactive secure message transmission in asynchronous networks. Search on Bibsonomy PODC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF secure communication, proactive security
23Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei Random key-assignment for secure Wireless Sensor Networks. Search on Bibsonomy SASN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF distributed wireless sensors networks, secure pair-wise communications, sensor-to-sensor authentication, key management protocols
23Ueli M. Maurer Secure Multi-party Computation Made Simple. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF adversary structures, secret-sharing, Secure multi-party computation, verifiable secret-sharing
23Claude Crépeau, Daniel Gottesman, Adam D. Smith Secure multi-party quantum computation. Search on Bibsonomy STOC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF distributed computing, quantum cryptography, secure function evaluation, multi-party protocols
23Byoungcheon Lee, Heesun Kim, Kwangjo Kim Secure Mobile Agent Using Strong Non-designated Proxy Signature. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Secure mobile agent, strong non-designated proxy signature, multi-proxy signature
23Bo Yang, Shixiong Zhu, Yumin Wang Unconditionally-Secure Oblivious Transfer. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Rnyi entropy, Unconditionally-secure, Oblivious transfer, Privacy amplification
23Koji Hashimoto, Tatsuhiro Tsuchiya, Tohru Kikuno Fault-Secure Scheduling of Arbitrary Task Graphs to Multiprocessor Systems. Search on Bibsonomy DSN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF fault-secure scheduling, tests, multiprocessors, task graphs, fault security
23Alain J. Mayer, Moti Yung Secure Protocol Transformation via "Expansion": From Two-Party to Groups. Search on Bibsonomy CCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF complexity theoretic proofs, key transport, protocol transformation, secure group protocols, authentication, protocol design, forward secrecy
23Dan Zhou, Joncheng C. Kuo, Susan Older, Shiu-Kai Chin Formal Development of Secure Email. Search on Bibsonomy HICSS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF high-assurance design and synthesis, secure email systems, formal methods, component-based design
23Vijay Varadharajan, Yi Mu 0001 On The Design Of Secure Electronic Payment Schemes For Internet. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF secure electronic payment schemes, commercial electronic credit card transactions, iKP, STT, SEPP, permission-based payment protocol, PBP protocol, purchase request phase, payment phase, secret private key, Internet, disputes, EFTS
23Danny Dolev, Cynthia Dwork, Orli Waarts, Moti Yung Perfectly Secure Message Transmission. Search on Bibsonomy J. ACM The full citation details ... 1993 DBLP  DOI  BibTeX  RDF perfectly secure communication, fault-tolerance, distributed computing
23Xinda Wang 0001, Kun Sun 0001, Archer L. Batcheller, Sushil Jajodia An Empirical Study of Secret Security Patch in Open Source Software. Search on Bibsonomy Adaptive Autonomous Secure Cyber Systems The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Jinyuan Jia, Neil Zhenqiang Gong Defending Against Machine Learning Based Inference Attacks via Adversarial Examples: Opportunities and Challenges. Search on Bibsonomy Adaptive Autonomous Secure Cyber Systems The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Erik Hemberg, Linda Zhang 0003, Una-May O'Reilly Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense. Search on Bibsonomy Adaptive Autonomous Secure Cyber Systems The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Marcus Gutierrez, Christopher Kiekintveld Online Learning Methods for Controlling Dynamic Cyber Deception Strategies. Search on Bibsonomy Adaptive Autonomous Secure Cyber Systems The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Chen Zhong, John Yen, Peng Liu 0005 Can Cyber Operations Be Made Autonomous? An Answer from the Situational Awareness Viewpoint. Search on Bibsonomy Adaptive Autonomous Secure Cyber Systems The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Paul Théron, Alexander Kott, Martin Drasar, Krzysztof Rzadca, Benoît Leblanc, Mauno Pihelgas, Luigi V. Mancini, Fabio De Gaspari Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems. Search on Bibsonomy Adaptive Autonomous Secure Cyber Systems The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Jiwon Hong, Taeri Kim, Jing Liu 0024, Noseong Park, Sang-Wook Kim Phishing URL Detection with Lexical Features and Blacklisted Domains. Search on Bibsonomy Adaptive Autonomous Secure Cyber Systems The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Linan Huang, Quanyan Zhu Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense. Search on Bibsonomy Adaptive Autonomous Secure Cyber Systems The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Tao Hou, Tao Wang 0026, Dakun Shen, Zhuo Lu, Yao Liu 0007 Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis. Search on Bibsonomy Adaptive Autonomous Secure Cyber Systems The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Aaron Schlenker, Omkar Thakoor, Haifeng Xu, Fei Fang 0001, Milind Tambe, Phebe Vayanos Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance. Search on Bibsonomy Adaptive Autonomous Secure Cyber Systems The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Sridhar Venkatesan, Shridatt Sugrim, Jason A. Youzwak, Cho-Yu Jason Chiang, Ritu Chadha A Framework for Studying Autonomic Computing Models in Cyber Deception. Search on Bibsonomy Adaptive Autonomous Secure Cyber Systems The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Yevgeniy Vorobeychik, Michael Pritchard Plan Interdiction Games. Search on Bibsonomy Adaptive Autonomous Secure Cyber Systems The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Mohammed Noraden Alsaleh, Ehab Al-Shaer Automated Cyber Risk Mitigation: Making Informed Cost-Effective Decisions. Search on Bibsonomy Adaptive Autonomous Secure Cyber Systems The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Willem Jonker, Milan Petkovic (eds.) Secure Data Management - 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings Search on Bibsonomy Secure Data Management The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Antonia Bertolino, Marianne Busch, Said Daoudagh, Francesca Lonetti, Eda Marchetti A Toolchain for Designing and Testing Access Control Policies. Search on Bibsonomy Engineering Secure Future Internet Services and Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Animesh Pathak, George Rosca, Valérie Issarny, Maarten Decat, Bert Lagaisse Privacy and Access Control in Federated Social Networks. Search on Bibsonomy Engineering Secure Future Internet Services and Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Marina Egea, Fabian Büttner Verification of Authorization Policies Modified by Delegation. Search on Bibsonomy Engineering Secure Future Internet Services and Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Riccardo Scandariato, Federica Paci, Le Minh Sang Tran, Katsiaryna Labunets, Koen Yskout, Fabio Massacci, Wouter Joosen Empirical Assessment of Security Requirements and Architecture: Lessons Learned. Search on Bibsonomy Engineering Secure Future Internet Services and Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Atle Refsdal, Øyvind Rideng, Bjørnar Solhaug, Ketil Stølen Divide and Conquer - Towards a Notion of Risk Model Encapsulation. Search on Bibsonomy Engineering Secure Future Internet Services and Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Riccardo Conti, Alessio Lunardelli, Ilaria Matteucci, Paolo Mori, Marinella Petrocchi Preserving Data Privacy in e-Health. Search on Bibsonomy Engineering Secure Future Internet Services and Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Kristian Beckers, Isabelle Côté, Stefan Fenz, Denis Hatebur, Maritta Heisel A Structured Comparison of Security Standards. Search on Bibsonomy Engineering Secure Future Internet Services and Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Marianne Busch, Nora Koch, Santiago Suppan Modeling Security Features of Web Applications. Search on Bibsonomy Engineering Secure Future Internet Services and Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Antonia Bertolino, Yves Le Traon, Francesca Lonetti, Eda Marchetti, Tejeddine Mouelhi Validation of Access Control Systems. Search on Bibsonomy Engineering Secure Future Internet Services and Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Elda Paja, Fabiano Dalpiaz, Paolo Giorgini STS-Tool: Security Requirements Engineering for Socio-Technical Systems. Search on Bibsonomy Engineering Secure Future Internet Services and Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Francisco Moyano, M. Carmen Fernández Gago, Benoit Baudry, Javier López 0001 Engineering Trust-Awareness and Self-adaptability in Services and Systems. Search on Bibsonomy Engineering Secure Future Internet Services and Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Kristian Beckers, Maritta Heisel, Bjørnar Solhaug, Ketil Stølen ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System. Search on Bibsonomy Engineering Secure Future Internet Services and Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Per Håkon Meland, Erkuden Rios, Vasilis Tountopoulos, Achim D. Brucker The Aniketos Platform. Search on Bibsonomy Secure and Trustworthy Service Composition The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Elke Beck, Sandra Trösterer, Alexander G. Mirnig, Manfred Tscheligi Characteristics and Addressed Challenges in Evaluating the Aniketos Project Outcome. Search on Bibsonomy Secure and Trustworthy Service Composition The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Per Håkon Meland, Muhammad Asim 0001, Dhouha Ayed, Fabiano Dalpiaz, Edith Felix, Paolo Giorgini, Susana Gonzáles, Brett Lempereur, John Ronan Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions. Search on Bibsonomy Secure and Trustworthy Service Composition The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Achim D. Brucker Using SecureBPMN for Modelling Security-Aware Service Compositions. Search on Bibsonomy Secure and Trustworthy Service Composition The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Per Håkon Meland Composite Services with Dynamic Behaviour. Search on Bibsonomy Secure and Trustworthy Service Composition The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Hisain Elshaafi, Jimmy McGibney, Dmitri Botvich Aggregation and Optimisation of Trustworthiness of Composite Services. Search on Bibsonomy Secure and Trustworthy Service Composition The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Konstantinos Giannakakis Adopting Existing Communication Platforms for Security Enabling Technologies. Search on Bibsonomy Secure and Trustworthy Service Composition The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Vasilis Tountopoulos, Ira Giannakoudaki, Konstantinos Giannakakis, Lefteris Korres, Leonidas Kallipolitis Supporting Security and Trust in Complex e-Government Services. Search on Bibsonomy Secure and Trustworthy Service Composition The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Muhammad Asim 0001, Artsiom Yautsiukhin, Achim D. Brucker, Brett Lempereur, Qi Shi 0001 Security Policy Monitoring of Composite Services. Search on Bibsonomy Secure and Trustworthy Service Composition The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Stéphane Paul, Alessandra Tedeschi, Erlend Andreas Gjære, Ivonne A. Herrera The Aniketos Design-Time Framework Applied - A Case in Air Traffic Management. Search on Bibsonomy Secure and Trustworthy Service Composition The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Elda Paja, Mauro Poggianella, Fabiano Dalpiaz, Pierluigi Roberti, Paolo Giorgini Security Requirements Engineering with STS-Tool. Search on Bibsonomy Secure and Trustworthy Service Composition The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Brett Lempereur, Dhouha Ayed, Muhammad Asim 0001, Madjid Merabti, Qi Shi 0001 Monitoring Threats to Composite Services within the Aniketos Run-Time Framework. Search on Bibsonomy Secure and Trustworthy Service Composition The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Wenhai Sun, Wenjing Lou, Y. Thomas Hou 0001, Hui Li 0006 Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing. Search on Bibsonomy Secure Cloud Computing The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Zhan Wang, Kun Sun 0001, Sushil Jajodia, Jiwu Jing Proof of Isolation for Cloud Storage. Search on Bibsonomy Secure Cloud Computing The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Kerim Yasin Oktay, Mahadevan Gomathisankaran, Murat Kantarcioglu, Sharad Mehrotra, Anoop Singhal Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing. Search on Bibsonomy Secure Cloud Computing The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Jakub Szefer, Ruby B. Lee Hardware-Enhanced Security for Cloud Computing. Search on Bibsonomy Secure Cloud Computing The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Dinghao Wu, Peng Liu 0005, Qiang Zeng 0001, Donghai Tian Software Cruising: A New Technology for Building Concurrent Software Monitor. Search on Bibsonomy Secure Cloud Computing The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 52511 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license