The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for fps with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1971-1988 (15) 1989-1997 (18) 1998-2001 (20) 2002-2003 (18) 2004 (27) 2005 (45) 2006 (56) 2007 (59) 2008 (80) 2009 (38) 2010 (20) 2011 (32) 2012 (45) 2013 (42) 2014 (62) 2015 (41) 2016 (36) 2017 (44) 2018 (40) 2019 (46) 2020 (35) 2021 (40) 2022 (52) 2023 (68) 2024 (9)
Publication types (Num. hits)
article(177) book(2) incollection(3) inproceedings(788) phdthesis(3) proceedings(15)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 386 occurrences of 306 keywords

Results
Found 988 publication records. Showing 988 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
38Sylvain Hallé, Raphaël Khoury Runtime Monitoring of Stream Logic Formulae. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Mina Sheikhalishahi, Andrea Saracino, Mohamed Mejri, Nadia Tawbi, Fabio Martinelli Fast and Effective Clustering of Spam Emails Based on Structural Similarity. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Tim Waage, Ramaninder Singh Jhajj, Lena Wiese Searchable Encryption in Apache Cassandra. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Toomas Krips, Jan Willemson Point-Counting Method for Embarrassingly Parallel Evaluation in Secure Computation. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Adrian Antunez-Veas, Guillermo Navarro-Arribas Onion Routing in Deterministic Delay Tolerant Networks. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38François Gagnon, Marc-Antoine Ferland, Marc-Antoine Fortier, Simon Desloges, Jonathan Ouellet, Catherine Boileau AndroSSL: A Platform to Test Android Applications Connection Security. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Paolo Modesti AnBx: Automatic Generation and Verification of Security Protocols Implementations. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Fariba Haddadi, Nur Zincir-Heywood A Closer Look at the HTTP and P2P Based Botnets from a Detector's Perspective. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Geoffroy Couteau, Thomas Peters, David Pointcheval Secure Distributed Computation on Private Inputs. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Agnès Brelurut, David Gérault, Pascal Lafourcade 0001 Survey of Distance Bounding Protocols and Threats. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Raphaël Khoury, Sylvain Hallé Runtime Enforcement with Partial Control. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard Security Mechanisms Planning to Enforce Security Policies. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Masaya Yasuda, Takeshi Shimoyama, Narishige Abe, Shigefumi Yamada, Takashi Shinzaki, Takeshi Koshiba Privacy-Preserving Fuzzy Commitment for Biometrics via Layered Error-Correcting Codes. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Fabio Bellini, Roberto Chiodi, Isabella Mastroeni MIME: A Formal Approach to (Android) Emulation Malware Analysis. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Rabih Mohsen, Alexandre Miranda Pinto Evaluating Obfuscation Security: A Quantitative Approach. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Erik Bergström, Rose-Mharie Åhlfeldt Information Classification Enablers. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Jean-Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquín García-Alfaro, Nur Zincir-Heywood (eds.) Foundations and Practice of Security - 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Brent Carrara, Carlisle Adams On Acoustic Covert Channels Between Air-Gapped Systems. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Serguei A. Mokhov, Michael J. Assels, Joey Paquet, Mourad Debbabi Automating MAC Spoofer Evidence Gathering and Encoding for Investigations. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Luigi Logrippo Logical Method for Reasoning About Access Control and Data Flow Control Models. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray A Responsive Defense Mechanism Against DDoS Attacks. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Sachini S. Weerawardhana, Subhojeet Mukherjee, Indrajit Ray, Adele E. Howe Automated Extraction of Vulnerability Information for Home Computer Security. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Daniel Servos, Sylvia L. Osborn HGABAC: Towards a Formal Model of Hierarchical Attribute-Based Access Control. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Myria Bouhaddi, Mohammed Said Radjef, Kamel Adi A Game Approach for an Efficient Intrusion Detection System in Mobile Ad Hoc Networks. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Fabio Martinelli, Francesco Santini 0001 Debating Cybersecurity or Securing a Debate? - (Position Paper). Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Diego A. Ortiz-Yepes Optimizing TLS for Low Bandwidth Environments. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Ahmed Khoumsi, Wadie Krombi, Mohammed Erradi A Formal Approach to Verify Completeness and Detect Anomalies in Firewall Security Policies. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Fariba Haddadi, Nur Zincir-Heywood Data Confirmation for Botnet Traffic Analysis. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Wen Wen, Binod Vaidya, Dimitrios Makrakis, Carlisle Adams Decentralized CRT-Based Efficient Verifiable (n, t, n) Multi-secret Sharing Scheme. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Thomas Korak Location-Dependent EM Leakage of the ATxmega Microcontroller. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Raphaël Jamet, Pascal Lafourcade 0001 (In)Corruptibility of Routing Protocols. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Ali Kassem 0001, Pascal Lafourcade 0001, Yassine Lakhnech Formal Verification of e-Reputation Protocols. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Tim Waage, Lena Wiese Benchmarking Encrypted Data Storage in HBase and Cassandra with YCSB. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Vinh-Thong Ta 0001, Thibaud Antignac Privacy by Design: On the Conformance Between Protocols and Architectures. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Joe Portner, Joel Kerr, Bill Chu Moving Target Defense Against Cross-Site Scripting Attacks (Position Paper). Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Lionel Rivière, Marie-Laure Potet, Thanh-Ha Le, Julien Bringer, Hervé Chabanne, Maxime Puys Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Peeter Laud, Jan Willemson Composable Oblivious Extended Permutations. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Naelah Alkhojandi, Ali Miri Privacy-Preserving Public Auditing in Cloud Computing with Data Deduplication. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Guillaume Bonfante, Jean-Yves Marion, Thanh Dinh Ta Malware Message Classification by Dynamic Analysis. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli A Formal Approach to Automatic Testing of Security Policies Specified in XACML. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Hiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch A Maximum Variance Approach for Graph Anonymization. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
38Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi (eds.) Foundations and Practice of Security - 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Yi Lu 0002, Yvo Desmedt Improved Davies-Murphy's Attack on DES Revisited. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Erwan Le Malécot, Daisuke Inoue The Carna Botnet Through the Lens of a Network Telescope. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Brahim Hamid, Christian Percebois Model-Based Specification and Validation of Security and Dependability Patterns. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Vincenzo Ciancia, Fabio Martinelli, Ilaria Matteucci, Charles Morisset Quantitative Evaluation of Enforcement Strategies - Position Paper. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Huihui Yang, Lei Jiao 0001, Vladimir A. Oleshchuk A General Framework for Group Authentication and Key Exchange Protocols. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Zheng Yang 0001 Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Matthias Wachs, Martin Schanzenbach, Christian Grothoff On the Feasibility of a Censorship Resistant Decentralized Name System. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Jean Goubault-Larrecq, Julien Olivain On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Christian Brandt, Michael Kasper Don't Push It: Breaking iButton Security. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Hélène Le Bouder, Sylvain Guilley, Bruno Robisson, Assia Tria Fault Injection to Reverse Engineer DES-Like Cryptosystems. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Roberto Di Pietro, Flavio Lombardi, Fabio Martinelli, Daniele Sgandurra CheR: Cheating Resilience in the Cloud via Smart Resource Allocation. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis, Nikolaos L. Dellas, Joaquín García-Alfaro, Dimitra I. Kaklamani, Iakovos S. Venieris, Nora Cuppens-Boulahia, Frédéric Cuppens Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Thomas Korak Investigation of Parameters Influencing the Success of Optical Fault Attacks. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Hideki Sakurada Computational Soundness of Symbolic Blind Signatures under Active Attacker. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Ali Kassem 0001, Pascal Lafourcade 0001, Yassine Lakhnech A More Realistic Model for Verifying Route Validity in Ad-Hoc Networks. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Alireza Sadighian, José M. Fernandez 0001, Antoine Lemay, Saman Taghavi Zargar ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Yang Li 0001, Yu-ichi Hayashi, Arisa Matsubara, Naofumi Homma, Takafumi Aoki, Kazuo Ohta, Kazuo Sakiyama Yet Another Fault-Based Leakage in Non-uniform Faulty Ciphertexts. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Raphaël Jamet, Pascal Lafourcade 0001 Discovering Flaws in IDS Through Analysis of Their Inputs. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Andrew Bedford, Josée Desharnais, Théophane G. Godonou, Nadia Tawbi Enforcing Information Flow by Combining Static and Dynamic Analysis. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Firas Al Khalil, Alban Gabillon, Patrick Capolsini Collusion Resistant Inference Control for Cadastral Databases. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Ashkan Rahimian, Raha Ziarati, Stere Preda, Mourad Debbabi On the Reverse Engineering of the Citadel Botnet. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Bao Liu, Lei Zhang 0009, Josep Domingo-Ferrer On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Sylvain Guilley, Damien Marion 0001, Zakaria Najm, Youssef Souissi, Antoine Wurcker Software Camouflage. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Lukas Malina, Vlastimil Clupek, Zdenek Martinasek, Jan Hajny, Kimio Oguchi, Vaclav Zeman Evaluation of Software-Oriented Block Ciphers on Smartphones. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Zeeshan Bilal, Keith Martin A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain Using RFIDs. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Alessandro Armando, Sander Oudkerk, Silvio Ranise, Konrad S. Wrona Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations. Search on Bibsonomy FPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Joaquín García-Alfaro, Pascal Lafourcade 0001 (eds.) Foundations and Practice of Security - 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Tongbo Luo, Xing Jin, Ajai Ananthanarayanan, Wenliang Du Touchjacking Attacks on Web in Android, iOS, and Windows Phone. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Jie Li 0005, Jianliang Zheng MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Leanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin Towards Modelling Adaptive Attacker's Behaviour. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Stijn Volckaert, Bjorn De Sutter, Tim De Baets, Koen De Bosschere GHUMVEE: Efficient, Effective, and Flexible Replication. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Ahmad AlSa'deh, Hosnieh Rafiee, Christoph Meinel IPv6 Stateless Address Autoconfiguration: Balancing between Security, Privacy and Usability. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Darakhshan J. Mir Information-Theoretic Foundations of Differential Privacy. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona Scalable Deniable Group Key Establishment. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Cristina Pérez-Solà, Jordi Herrera-Joancomartí Classifying Online Social Network Users through the Social Graph. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Lukas Malina, Jordi Castellà-Roca, Arnau Vives-Guasch, Jan Hajny Short-Term Linkable Group Signatures with Categorized Batch Verification. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Tim Muller, Patrick Schweitzer A Formal Derivation of Composite Trust. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Tahsin Arafat Reza, Michel Barbeau QoS Aware Adaptive Security Scheme for Video Streaming in MANETs. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Sherif Saad, Issa Traoré Extracting Attack Scenarios Using Intrusion Semantics. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Colin O'Flynn, Zhizhang Chen A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Sumanta Sarkar, Reihaneh Safavi-Naini Proofs of Retrievability via Fountain Code. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Houari Mahfoud, Abdessamad Imine On Securely Manipulating XML Data. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Hadi Ahmadi, Reihaneh Safavi-Naini Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Nick Mailloux, Ali Miri, Monica Nevins COMPASS: Authenticated Group Key Agreement from Signcryption. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Ashkan Rahimian, Philippe Charland, Stere Preda, Mourad Debbabi RESource: A Framework for Online Matching of Assembly with Open Source Code. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Khair Eddin Sabri, Ridha Khédri A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Jianliang Zheng, Jie Li 0005 MARC: Modified ARC4. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Sandro Etalle, Timothy L. Hinrichs, Adam J. Lee, Daniel Trivellato, Nicola Zannone Policy Administration in Tag-Based Authorization. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Pawel Chwalinski, Roman V. Belavkin, Xiaochun Cheng Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens Enabling Dynamic Security Policy in the Java Security Manager. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Christophe Foket, Bjorn De Sutter, Bart Coppens 0001, Koen De Bosschere A Novel Obfuscation: Class Hierarchy Flattening. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Isaac Woungang, Sanjay Kumar Dhurandher, Rajender Dheeraj Peddi, Issa Traoré Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
38Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis, Joaquín García-Alfaro, Dimitra I. Kaklamani, Iakovos S. Venieris A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
38Fatemeh Raji, Ali Miri, Mohammad Davarpanah Jazi Preserving Privacy in Online Social Networks. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
38Jun Ho Huh, Hyoungshick Kim Phishing Detection with Popular Search Engines: Simple and Effective. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
38Marina Pudovkina A Related-Key Attack on Block Ciphers with Weak Recurrent Key Schedules. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
38Jannik Dreier, Pascal Lafourcade 0001, Yassine Lakhnech Vote-Independence: A Powerful Privacy Notion for Voting Protocols. Search on Bibsonomy FPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 988 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license