The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CODASPY"( http://dblp.L3S.de/Venues/CODASPY )

URL (DBLP): http://dblp.uni-trier.de/db/conf/codaspy

Publication years (Num. hits)
2011 (29) 2012 (32) 2013 (43) 2014 (44) 2015 (43) 2016 (41) 2017 (43) 2018 (48) 2019 (36) 2020 (45) 2021 (41) 2022 (48) 2023 (33)
Publication types (Num. hits)
inproceedings(513) proceedings(13)
Venues (Conferences, Journals, ...)
CODASPY(526)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 526 publication records. Showing 526 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Mansour Ahmadi, Dmitry Ulyanov, Stanislav Semenov, Mikhail Trofimov, Giorgio Giacinto Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Daren Fadolalkarim, Asmaa Sallam, Elisa Bertino PANDDE: Provenance-based ANomaly Detection of Data Exfiltration. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  BibTeX  RDF
1Nick Christoulakis, George Christou, Elias Athanasopoulos, Sotiris Ioannidis HCFI: Hardware-enforced Control-Flow Integrity. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Maliheh Monshizadeh, Prasad Naldurg, V. N. Venkatakrishnan Patching Logic Vulnerabilities for Web Applications using LogicPatcher. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jason Crampton, James Sellwood ARPPM: Administration in the RPPM Model. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  BibTeX  RDF
1Gustavo Grieco, Guillermo Luis Grinblat, Lucas C. Uzal, Sanjay Rawat 0001, Josselin Feist, Laurent Mounier Toward Large-Scale Vulnerability Discovery using Machine Learning. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mahdi Alizadeh, Nicola Zannone Risk-based Analysis of Business Process Executions. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Noriko Tomuro, Steven L. Lytinen, Kurt Hornsburg Automatic Summarization of Privacy Policies using Ensemble Learning. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Iberia Medeiros, Miguel Beatriz, Nuno Ferreira Neves, Miguel Correia 0001 Hacking the DBMS to Prevent Injection Attacks. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  BibTeX  RDF
1John Knight DIVERSITY. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jeffrey M. Voas Decoding the Mystery of the Internet of Things. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ryan Stevens, Jonathan Crussell, Hao Chen 0003 On the Origin of Mobile Apps: Network Provenance for Android Applications. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xing Gao 0001, Dachuan Liu, Daiping Liu, Haining Wang On Energy Security of Smartphones. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Johannes Hoffmann, Teemu Rytilahti, Davide Maiorca, Marcel Winandy, Giorgio Giacinto, Thorsten Holz Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ameni Ben Fadhel, Domenico Bianculli, Lionel C. Briand, Benjamin Hourte A Model-driven Approach to Representing and Checking RBAC Contextual Policies. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  BibTeX  RDF
1Gaoyao Xiao, Jun Wang 0141, Peng Liu 0005, Jiang Ming 0002, Dinghao Wu Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination Forensics. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  BibTeX  RDF
1Zhenquan Cai, Roland H. C. Yap Inferring the Detection Logic and Evaluating the Effectiveness of Android Anti-Virus Apps. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Navid Pustchi, Farhan Patwa, Ravi S. Sandhu Multi Cloud IaaS with Domain Trust in OpenStack. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yufei Gu, Zhiqiang Lin Derandomizing Kernel Address Space Layout for Memory Introspection and Forensics. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Syed Zain R. Rizvi, Philip W. L. Fong Interoperability of Relationship- and Role-Based Access Control. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  BibTeX  RDF
1Taous Madi, Suryadipta Majumdar, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang 0001 Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  BibTeX  RDF
1Eduard Marin, Dave Singelée, Bohan Yang 0001, Ingrid Verbauwhede, Bart Preneel On the Feasibility of Cryptography for a Wireless Insulin Pump System. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yue Chen, Zhi Wang 0004, David B. Whalley, Long Lu Remix: On-demand Live Randomization. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yoshinori Aono, Takuya Hayashi 0001, Le Trieu Phong, Lihua Wang 0001 Scalable and Secure Logistic Regression via Homomorphic Encryption. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Carlo Combi, Luca Viganò 0001, Matteo Zavatteri Security Constraints in Temporal Role-Based Access-Controlled Workflows. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  BibTeX  RDF
1John Maheswaran, Daniel Jackowitz, Ennan Zhai, David Isaac Wolinsky, Bryan Ford Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Awad A. Younis, Yashwant K. Malaiya, Charles Anderson 0001, Indrajit Ray To Fear or Not to Fear That is the Question: Code Characteristics of a Vulnerable Functionwith an Existing Exploit. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Manar Mohamed, Babins Shrestha, Nitesh Saxena SMASheD: Sniffing and Manipulating Android Sensor Data. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  BibTeX  RDF
1Judicael Briand Djoko, Brandon Jennings, Adam J. Lee TPRIVEXEC: Private Execution in Virtual Memory. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  BibTeX  RDF
1Teryl Taylor, Xin Hu 0001, Ting Wang 0006, Jiyong Jang, Marc Ph. Stoecklin, Fabian Monrose, Reiner Sailer Detecting Malicious Exploit Kits using Tree-based Similarity Searches. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  BibTeX  RDF
1Anita Nikolich SDN Research Challenges and Opportunities. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  BibTeX  RDF
1Alexandru Ionut Egner, Duc Luu, Jerry den Hartog, Nicola Zannone An Authorization Service for Collaborative Situation Awareness. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin Differentially Private K-Means Clustering. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mihai Maruseac, Gabriel Ghinita Privacy-Preserving Mining of Sequential Association Rules from Provenance Workflows. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Elisa Bertino, Ravi S. Sandhu, Alexander Pretschner (eds.) Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, New Orleans, LA, USA, March 9-11, 2016 Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  BibTeX  RDF
1Bo Zhu 0007, Xinxin Fan, Guang Gong Pleco and Plectron - Two Provably Secure Password Hashing Algorithms. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhongwen Zhang, Peng Liu 0005, Ji Xiang, Jiwu Jing, Lingguang Lei How Your Phone Camera Can Be Used to Stealthily Spy on You: Transplantation Attacks against Android Camera Service. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Irfan Ahmed 0001, Vassil Roussev, Aisha I. Ali-Gombe Robust Fingerprinting for Relocatable Code. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jing (Dave) Tian, Kevin R. B. Butler, Patrick D. McDaniel, Padma Krishnaswamy Securing ARP From the Ground Up. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mihai Maruseac, Gabriel Ghinita Differentially-Private Mining of Moderately-Frequent High-Confidence Association Rules. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhi Xu 0004, Sencun Zhu SemaDroid: A Privacy-Aware Sensor Management Framework for Smartphones. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zach Jorgensen, Jing Chen 0005, Christopher S. Gates, Ninghui Li, Robert W. Proctor, Ting Yu 0001 Dimensions of Risk in Mobile Applications: A User Study. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bhavani Thuraisingham Big Data Security and Privacy. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jonathan L. Dautrich Jr., Chinya V. Ravishankar Combining ORAM with PIR to Minimize Bandwidth Costs. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Daniele Gallingani, Rigel Gjomemo, V. N. Venkatakrishnan, Stefano Zanero Practical Exploit Generation for Intent Message Vulnerabilities in Android. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kadhim Hayawi, Alireza Mortezaei, Mahesh V. Tripunitara The Limits of the Trade-Off Between Query-Anonymity and Communication-Cost in Wireless Sensor Networks. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Steven Van Acker, Daniel Hausknecht, Wouter Joosen, Andrei Sabelfeld Password Meters and Generators on the Web: From Large-Scale Empirical Study to Getting It Right. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiaofeng Xu, Li Xiong 0001, Jinfei Liu Database Fragmentation with Confidentiality Constraints: A Graph Search Approach. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rakesh M. Verma, Keith Dyer On the Character of Phishing URLs: Accurate and Robust Statistical Learning Classifiers. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bo Chen, Anil Kumar Ammula, Reza Curtmola Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jason Gionta, William Enck, Peng Ning HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jing Qiu 0003, Babak Yadegari, Brian Johannesmeyer, Saumya Debray, Xiaohong Su Identifying and Understanding Self-Checksumming Defenses in Software. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Cong Liao, Anna Cinzia Squicciarini, Christopher Griffin 0001 Epidemic Behavior of Negative Users in Online Social Sites. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yun Zhang, Ram Krishnan, Ravi S. Sandhu Secure Information and Resource Sharing in Cloud. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Peter Snyder, Chris Kanich One Thing Leads to Another: Credential Based Privilege Escalation. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fang Liu, Xiaokui Shu, Danfeng Yao, Ali Raza Butt Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lei Xu 0012, Xinwen Zhang, Xiaoxin Wu 0001, Weidong Shi ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public Cloud. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1William G. Horne Collecting, Analyzing and Responding to Enterprise Scale DNS Events. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jonathan L. Dautrich Jr., Chinya V. Ravishankar Tunably-Oblivious Memory: Generalizing ORAM to Enable Privacy-Efficiency Tradeoffs. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sebastian Banescu, Alexander Pretschner, Dominic Battré, Stéfano Cazzulani, Robert Shield, Greg Thompson Software-Based Protection against Changeware. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Günter Karjoth Aligning Security and Business Objectives for Process-Aware Information Systems. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jaehong Park, Anna Cinzia Squicciarini (eds.) Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, San Antonio, TX, USA, March 2-4, 2015 Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  BibTeX  RDF
1Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino Vincenzo Verde Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Syed Rafiul Hussain, Asmaa Sallam, Elisa Bertino DetAnom: Detecting Anomalous Database Transactions by Insiders. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mehmet Kuzu, Mohammad Saiful Islam, Murat Kantarcioglu Distributed Search over Encrypted Big Data. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Cory Thoma, Adam J. Lee, Alexandros Labrinidis CryptStream: Cryptographic Access Controls for Streaming Data. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiaokui Shu, Jing Zhang 0039, Danfeng Yao, Wu-chun Feng Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yury Zhauniarovich, Maqsood Ahmad 0001, Olga Gadyatskaya, Bruno Crispo, Fabio Massacci StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Muhammad I. Sarfraz, Mohamed Nabeel, Jianneng Cao, Elisa Bertino DBMask: Fine-Grained Access Control on Encrypted Relational Databases. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Prosunjit Biswas, Farhan Patwa, Ravi S. Sandhu Content Level Access Control for OpenStack Swift Storage. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Anna Vapen, Niklas Carlsson, Anirban Mahanti, Nahid Shahmehri Information Sharing and User Privacy in the Third-party Identity Management Landscape. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jan Henrik Ziegeldorf, Fred Grossmann, Martin Henze, Nicolas Inden, Klaus Wehrle CoinParty: Secure Multi-Party Mixing of Bitcoins. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Vivek Shandilya, Sajjan G. Shiva A Network Security Game Model. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohammad Saiful Islam, Mehmet Kuzu, Murat Kantarcioglu A Dynamic Approach to Detect Anomalous Queries on Relational Databases. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Erman Pattuk, Murat Kantarcioglu, Huseyin Ulusoy BigGate: Access Control Framework for Outsourced Key-Value Stores. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu Virtual Resource Orchestration Constraints in Cloud Infrastructure as a Service. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Matthias Neugschwandtner, Paolo Milani Comparetti, István Haller, Herbert Bos The BORG: Nanoprobing Binaries for Buffer Overreads. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jules Dupont, Anna Cinzia Squicciarini Toward De-Anonymizing Bitcoin by Mapping Users Location. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Visa Antero Vallivaara, Mirko Sailio, Kimmo Halunen Detecting man-in-the-middle attacks on non-mobile systems. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Enrico Lovat, Johan Oudinet, Alexander Pretschner On quantitative dynamic data flow tracking. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Anna Cinzia Squicciarini, Giuseppe Petracca, William G. Horne, Aurnob Nath Situational awareness through reasoning on network incidents. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1William C. Garrison III, Yechen Qiao, Adam J. Lee On the suitability of dissemination-centric access control systems for group-centric sharing. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kalpana Gondi, A. Prasad Sistla, V. N. Venkatakrishnan Minimizing lifetime of sensitive data in concurrent programs. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sandrine Blazy, Stéphanie Riaud Measuring the robustness of source program obfuscation: studying the impact of compiler optimizations on the obfuscation of C programs. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fabien Duchene, Sanjay Rawat 0001, Jean-Luc Richier, Roland Groz KameleonFuzz: evolutionary fuzzing for black-box XSS detection. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Birhanu Eshete, V. N. Venkatakrishnan WebWinnow: leveraging exploit kit workflows to detect malicious urls. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Euijin Choo, Jianchun Jiang, Ting Yu 0001 COMPARS: toward an empirical approach for comparing the resilience of reputation systems. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dongyan Xu Virtualization and security: happily ever after? Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hemant Sengar, Haining Wang, Seyed Amir Iranmanesh Wiretap-proof: what they hear is not what you speak, and what you speak they do not hear. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kangjie Lu, Siyang Xiong, Debin Gao RopSteg: program steganography with return oriented programming. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Anja Remshagen, Li Yang Consistency checking in access control. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Justin Hummel, Andrew McDonald, Vatsal Shah, Riju Singh, Bradford D. Boyle, Tingshan Huang, Nagarajan Kandasamy, Harish Sethu, Steven Weber 0001 A modular multi-location anonymized traffic monitoring tool for a WiFi network. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michael Mitchell, Guanyu Tian, Zhi Wang 0004 Systematic audit of third-party android phones. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Se Eun Oh, Ji Young Chun, Limin Jia 0001, Deepak Garg 0001, Carl A. Gunter, Anupam Datta Privacy-preserving audit for broker-based health information exchange. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mehmet Kuzu, Mohammad Saiful Islam, Murat Kantarcioglu Efficient privacy-aware search over encrypted databases. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Julian Horsch, Konstantin Böttinger, Michael Weiß, Sascha Wessel, Frederic Stumpf TrustID: trustworthy identities for untrusted mobile devices. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yiming Jing, Gail-Joon Ahn, Ziming Zhao 0001, Hongxin Hu RiskMon: continuous and automated risk assessment of mobile applications. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xiaowei Li 0003, Xujie Si, Yuan Xue 0001 Automated black-box detection of access control vulnerabilities in web applications. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Julian Horsch, Sascha Wessel, Frederic Stumpf, Claudia Eckert 0001 SobrTrA: a software-based trust anchor for ARM cortex application processors. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohamed Shehab, Fadi Mohsen Securing OAuth implementations in smart phones. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 526 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license