The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SecureComm"( http://dblp.L3S.de/Venues/SecureComm )

URL (DBLP): http://dblp.uni-trier.de/db/conf/securecomm

Publication years (Num. hits)
2005 (51) 2006 (56) 2007 (62) 2008 (43) 2009 (27) 2010 (29) 2011 (36) 2012 (22) 2013 (28) 2015 (49) 2016 (49) 2017 (47) 2018-2022 (44) 2023 (1)
Publication types (Num. hits)
inproceedings(531) proceedings(13)
Venues (Conferences, Journals, ...)
SecureComm(544)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 544 publication records. Showing 544 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Yuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai Detection of Android API Call Using Logging Mechanism within Android Framework. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ryan Farley, Xinyuan Wang 0005 Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xiang Cui, Binxing Fang, Jinqiao Shi, Chaoge Liu Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Md. Anwar Hossain Masud, Md. Rafiqul Islam 0001, Jemal H. Abawajy Security Concerns and Remedy in a Cloud Based E-learning System. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hui Cui 0001, Yi Mu 0001, Man Ho Au Public-Key Encryption Resilient to Linear Related-Key Attacks. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tanveer A. Zia, Albert Y. Zomaya, Vijay Varadharajan, Zhuoqing Morley Mao (eds.) Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yousra Aafer, Wenliang Du, Heng Yin 0001 DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ibrahim F. Elashry, Yi Mu 0001, Willy Susilo Generic Mediated Encryption. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Belal Chowdhury, Morshed U. Chowdhury, Jemal H. Abawajy Securing a Web-Based Anti-counterfeit RFID System. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ting Zhou, Yaping Lin, Wei Zhang 0074, Sheng Xiao, Jinguo Li Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mengjun Xie, Liang Hao, Kenji Yoshigoe, Jiang Bian 0001 CamTalk: A Bidirectional Light Communications Framework for Secure Communications on Smartphones. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Silvio Cesare, Yang Xiang 0001, Jun Zhang 0010 Clonewise - Detecting Package-Level Clones Using Machine Learning. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Quazi Mamun, Md. Rafiqul Islam 0001, Mohammed Kaosar Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li 0009, Lynn Margaret Batten Contrasting Permission Patterns between Clean and Malicious Android Applications. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mohammed Kaosar, Quazi Mamun, Md. Rafiqul Islam 0001, Xun Yi (k - n) Oblivious Transfer Using Fully Homomorphic Encryption System. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Angelos D. Keromytis, Roberto Di Pietro (eds.) Security and Privacy in Communication Networks - 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, Al-Sakib Khan Pathan Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jin B. Hong, Dong Seong Kim 0001 Scalable Security Model Generation and Analysis Using k-importance Measures. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jiangxiao Zhang, Zhoujun Li 0001, Hua Guo Anonymous Transferable Conditional E-cash. Search on Bibsonomy SecureComm The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis (eds.) Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers Search on Bibsonomy SecureComm The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Govind Sreekar Shenoy, Jordi Tubella, Antonio González 0001 Improving the Resilience of an IDS against Performance Throttling Attacks. Search on Bibsonomy SecureComm The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sarshad Abubaker, Kui Wu 0001 DAFA - A Lightweight DES Augmented Finite Automaton Cryptosystem. Search on Bibsonomy SecureComm The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam BINSPECT: Holistic Analysis and Detection of Malicious Web Pages. Search on Bibsonomy SecureComm The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Peng Zhou 0002, Xiapu Luo, Rocky K. C. Chang More Anonymity through Trust Degree in Trust-Based Onion Routing. Search on Bibsonomy SecureComm The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jan Jusko, Martin Rehák Revealing Cooperating Hosts by Connection Graph Analysis. Search on Bibsonomy SecureComm The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yuxin Meng 0001, Lam-for Kwok, Wenjuan Li 0001 Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion Detection. Search on Bibsonomy SecureComm The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xiaokui Shu, Danfeng (Daphne) Yao Data Leak Detection as a Service. Search on Bibsonomy SecureComm The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Chunhua Chen 0002, Shaohua Tang, Chris J. Mitchell Building General-Purpose Security Services on EMV Payment Cards. Search on Bibsonomy SecureComm The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ehab Al-Shaer, Qi Duan, Jafar Haadi Jafarian Random Host Mutation for Moving Target Defense. Search on Bibsonomy SecureComm The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tom Chothia, Marco Cova, Chris Novakovic, Camilo González Toro The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent. Search on Bibsonomy SecureComm The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Eun-Kyoung Kim, Patrick D. McDaniel, Thomas La Porta A Detection Mechanism for SMS Flooding Attacks in Cellular Networks. Search on Bibsonomy SecureComm The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Seyed Amir Iranmanesh, Hemant Sengar, Haining Wang A Voice Spam Filter to Clean Subscribers' Mailbox. Search on Bibsonomy SecureComm The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Boxuan Gu, Wenbin Zhang 0005, Xiaole Bai, Adam C. Champion, Feng Qin, Dong Xuan JSGuard: Shellcode Detection in JavaScript. Search on Bibsonomy SecureComm The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ryan M. Gerdes, Mani Mina, Thomas E. Daniels Towards a Framework for Evaluating the Security of Physical-Layer Identification Systems. Search on Bibsonomy SecureComm The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Matteo Maria Casalino, Michele Mangili, Henrik Plate, Serena Elisa Ponta Detection of Configuration Vulnerabilities in Distributed (Web) Environments. Search on Bibsonomy SecureComm The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jiawei Yuan, Shucheng Yu Privacy Preserving Back-Propagation Learning Made Practical with Cloud Computing. Search on Bibsonomy SecureComm The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Zhiwei Wang Improvement on Ahn et al.'s RSA P-Homomorphic Signature Scheme. Search on Bibsonomy SecureComm The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Abdun Naser Mahmood, Md. Enamul Kabir, Abdul K. Mustafa New Multi-dimensional Sorting Based K-Anonymity Microaggregation for Statistical Disclosure Control. Search on Bibsonomy SecureComm The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jirí Kur, Vashek Matyás, Petr Svenda Two Improvements of Random Key Predistribution for Wireless Sensor Networks. Search on Bibsonomy SecureComm The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tulio de Souza, Joss Wright, Piers O'Hanlon, Ian Brown Set Difference Attacks in Wireless Sensor Networks. Search on Bibsonomy SecureComm The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Zhi Xu 0004, Kun Bai, Sencun Zhu, Leslie S. Liu 0002, Randy Moulic Context-Related Access Control for Mobile Caching. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michael Beye, Thijs Veugen Anonymity for Key-Trees with Adaptive Adversaries. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Wojciech Mostowski, Pim Vullers Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sarbari Mitra, Ratna Dutta, Sourav Mukhopadhyay Towards a Deterministic Hierarchical Key Predistribution for WSN Using Complementary Fano Plane. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Manuel Crotti, Diego Ferri, Francesco Gringoli, Manuel Peli, Luca Salgarelli PP2db: A Privacy-Preserving, P2P-Based Scalable Storage System for Mobile Networks. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Harald Lampesberger, Philipp Winter, Markus Zeilinger, Eckehard Hermann An On-Line Learning Statistical Model to Detect Malicious Web Requests. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Deepa Srinivasan, Xuxian Jiang Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Vojtech Krmicek, Jan Vykopal NetFlow Based Network Protection. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Huijun Xiong, Xinwen Zhang, Wei Zhu, Danfeng Yao CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Saeed Al-Haj, Padmalochan Bera, Ehab Al-Shaer Build and Test Your Own Network Configuration. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Stephen Mark Glass, Vallipuram Muthukkumarasamy, Marius Portmann, Matthew Robert Insecurity in Public-Safety Communications: APCO Project 25. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Cristina Romero-Tris, Jordi Castellà-Roca, Alexandre Viejo Multi-party Private Web Search with Untrusted Partners. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Chowdhury Sayeed Hyder, Brendan Grebur, Li Xiao 0001 Defense against Spectrum Sensing Data Falsification Attacks in Cognitive Radio Networks. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tieyan Li, Yingjiu Li, Guilin Wang Secure and Practical Key Distribution for RFID-Enabled Supply Chains. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Thomas Plos, Martin Feldhofer Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID Tag. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Rinku Dewri Location Privacy and Attacker Knowledge: Who Are We Fighting against? Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Seyed Ali Ahmadzadeh, Gordon B. Agnew Behavioral Mimicry Covert Communication. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Albert Levi, Peng Liu 0005, Refik Molva (eds.) 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008 Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hanjun Gao, Lina Wang, Wei Liu, Yang Peng, Hao Zhang Preventing Secret Data Leakage from Foreign Mappings in Virtual Machines. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jin Han, Qiang Yan 0001, Robert H. Deng, Debin Gao On Detection of Erratic Arguments. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Viet Pham, Tuomas Aura Security Analysis of Leap-of-Faith Protocols. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Amir Herzberg, Haya Schulmann Unilateral Antidotes to DNS Poisoning. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Benedikt Westermann, Pern Hui Chia, Dogan Kesdogan Analyzing the Gold Star Scheme in a Split Tor Network. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Gaspar Modelo-Howard, Jevin Sweval, Saurabh Bagchi Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shimrit Tzur-David, Kiril Lashchiver, Danny Dolev, Tal Anker Delay Fast Packets (DFP): Prevention of DNS Cache Poisoning. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Akshay Dua, Nirupama Bulusu, Wu-chang Feng Privacy-Preserving Online Mixing of High Integrity Mobile Multi-user Data. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Meixing Le, Zhaohui Wang, Quan Jia, Angelos Stavrou, Anup K. Ghosh, Sushil Jajodia Trading Elephants for Ants: Efficient Post-attack Reconstitution. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Lie Qu, Guilin Wang, Yi Mu 0001 Optimistic Fair Exchange of Ring Signatures. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Steffen Wagner, Christoph Krauß, Claudia Eckert 0001 T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hemant Sengar, Xinyuan Wang 0005, Arthur Nichols Call Behavioral Analysis to Thwart SPIT Attacks on VoIP Networks. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Saman Zarandioon, Danfeng (Daphne) Yao, Vinod Ganapathy K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zhiyun Qian, Zhuoqing Morley Mao, Ammar Rayes, David Jaffe Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Deguang Kong, Donghai Tian, Peng Liu 0005, Dinghao Wu SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Amiya Kumar Maji, Saurabh Bagchi v-CAPS: A Confidentiality and Anonymity Preserving Routing Protocol for Content-Based Publish-Subscribe Networks. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sandeep Yadav, A. L. Narasimha Reddy Winning with DNS Failures: Strategies for Faster Botnet Detection. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Chunyu Tang, David A. Naumann, Susanne Wetzel Symbolic Analysis for Security of Roaming Protocols in Mobile Networks - [Extended Abstract]. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mihaela Ion, Giovanni Russello, Bruno Crispo Supporting Publication and Subscription Confidentiality in Pub/Sub Networks. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jingqiang Lin, Peng Liu 0005, Jiwu Jing, Qiongxiao Wang Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem A. Beyah Attacking Beacon-Enabled 802.15.4 Networks. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dongho Kim, Yih-Chun Hu A Study on False Channel Condition Reporting Attacks in Wireless Networks. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Andrew J. Kalafut, Minaxi Gupta, Pairoj Rattadilok, Pragneshkumar Patel Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ralf Küsters, Henning Schnoor, Tomasz Truderung A Formal Definition of Online Abuse-Freeness. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jinguang Han, Yi Mu 0001, Willy Susilo, Jun Yan 0005 A Generic Construction of Dynamic Single Sign-on with Strong Security. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Youngsang Shin, Steven A. Myers, Minaxi Gupta Saving Energy on WiFi with Required IPsec. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu, Ravi S. Sandhu Analyzing and Exploiting Network Behaviors of Malware. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nabil Ajam, Nora Cuppens-Boulahia, Frédéric Cuppens Privacy Administration in Distributed Service Infrastructure. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jihyuk Choi, Jerry T. Chiang, Dongho Kim, Yih-Chun Hu Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Smitha Sundareswaran, Anna Cinzia Squicciarini DeCore: Detecting Content Repurposing Attacks on Clients' Systems. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Raoul Strackx, Frank Piessens, Bart Preneel Efficient Isolation of Trusted Subsystems in Embedded Systems. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Aram Yegenian, Tassos Dimitriou Inexpensive Email Addresses An Email Spam-Combating System. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Toby Ehrenkranz, Jun Li 0001, Patrick D. McDaniel Realizing a Source Authentic Internet. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ming Li 0003, Shucheng Yu, Kui Ren 0001, Wenjing Lou Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sooel Son, Vitaly Shmatikov The Hitchhiker's Guide to DNS Cache Poisoning. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sean Whalen, Matt Bishop, James P. Crutchfield Hidden Markov Models for Automated Protocol Learning. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Luciana Marconi, Mauro Conti, Roberto Di Pietro CED2: Communication Efficient Disjointness Decision. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Guangdong Bai, Liang Gu, Tao Feng, Yao Guo 0001, Xiangqun Chen Context-Aware Usage Control for Android. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Omar I. Al-Bataineh, Ron van der Meyden Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sami Zhioua A New Information Leakage Measure for Anonymity Protocols. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia J. Perlman FADE: Secure Overlay Cloud Storage with File Assured Deletion. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ee-Chien Chang, Liming Lu, Yongzheng Wu, Roland H. C. Yap, Jie Yu 0008 Enhancing Host Security Using External Environment Sensors. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 544 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license