The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICISS"( http://dblp.L3S.de/Venues/ICISS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/iciss

Publication years (Num. hits)
2005 (29) 2006 (33) 2007 (28) 2008 (26) 2009 (26) 2010 (19) 2011 (29) 2012 (25) 2013 (30) 2014 (28) 2015 (37) 2016 (33) 2017 (26) 2018 (25) 2019 (19) 2020 (59) 2021 (43) 2022 (46) 2023 (71)
Publication types (Num. hits)
inproceedings(609) proceedings(23)
Venues (Conferences, Journals, ...)
ICISS(632)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 150 occurrences of 130 keywords

Results
Found 632 publication records. Showing 632 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1RatnaKumari Challa, VijayaKumari Gunta Reed-Muller Code Based Symmetric Key Fully Homomorphic Encryption Scheme. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hardik Gajera, Shruti Naik, Manik Lal Das On the Security of "Verifiable Privacy-Preserving Monitoring for Cloud-Assisted mHealth Systems". Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Srinivas Jangirala, Dheerendra Mishra, Sourav Mukhopadhyay Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lokesh Jain, Aditya Chandran, Sanjay Rawat 0001, Kannan Srinathan Discovering Vulnerable Functions by Extrapolation: A Control-Flow Graph Similarity Based Approach. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Douglas Simões Silva, Davi Resner, Rick Lopes de Souza, Jean Everson Martina Formal Verification of a Cross-Layer, Trustful Space-Time Protocol for Wireless Sensor Networks. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ashish Nanda, Priyadarsi Nanda, Xiangjian He, Aruna Jamdagni A Secure Routing Scheme for Wireless Mesh Networks. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kyrre Wahl Kongsgård, Nils Agne Nordbotten, Federico Mancini 0001, Paal E. Engelstad Data Loss Prevention Based on Text Classification in Controlled Environments. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sharvari Prakash Chorghe, Narendra Shekokar A Solution to Detect Phishing in Android Devices. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1S. J. Sheela, K. V. Suresh 0001, Deepaknath Tandur Performance Evaluation of Modified Henon Map in Image Encryption. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Varsha Bhat Kukkala, Jaspal Singh Saini, S. R. S. Iyengar Privacy Preserving Network Analysis of Distributed Social Networks. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kristof Teichel, Dieter Sibold, Stefan Milius An Attack Possibility on Time Synchronization Protocols Secured with TESLA-Like Mechanisms. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mridul Sankar Barik, Chandan Mazumdar, Amarnath Gupta Network Vulnerability Analysis Using a Constrained Graph Data Model. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sébastien Canard, Viet Cuong Trinh An Efficient Certificateless Signature Scheme in the Standard Model. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Vineeta Jain, Manoj Singh Gaur, Vijay Laxmi, Mohamed Mosbah 0001 Detection of SQLite Database Vulnerabilities in Android Apps. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jerry den Hartog, Nicola Zannone Collaborative Access Decisions: Why Has My Decision Not Been Enforced? Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sudhir Bagade, Vijay T. Raisinghani JITWORM: Jitter Monitoring Based Wormhole Attack Detection in MANET. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ankit Maheshwari, Samrat Mondal SPOSS: Secure Pin-Based-Authentication Obviating Shoulder Surfing. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia Building a Fair System Using Access Rights. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sébastien Canard, Viet Cuong Trinh Constant-Size Ciphertext Attribute-Based Encryption from Multi-channel Broadcast Encryption. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Maroti Deshmukh, Neeta Nain, Mushtaq Ahmed Enhanced Modulo Based Multi Secret Image Sharing Scheme. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kissan G. Gauns Dessai, Venkatesh V. Kamat A Framework for Analyzing Associativity and Anonymity in Conventional and Electronic Summative Examinations. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti 0001 (eds.) Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sarita Agrawal, Manik Lal Das, Anish Mathuria, Sanjay Srivastava Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Angsuman Das, Avishek Adhikari Plaintext Checkable Signcryption. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Imon Mukherjee, Biswajita Datta, Reeturaj Banerjee, Srijan Das DWT Difference Modulation Based Novel Steganographic Algorithm. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shyamalendu Kandar, Bibhas Chandra Dhara A (k, n) Multi Secret Sharing Scheme Using Two Variable One Way Function with Less Public Values. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey, Xiaoshu Ji Similarity Measure for Security Policies in Service Provider Selection. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Punit Mehta, Jigar Sharda, Manik Lal Das SQLshield: Preventing SQL Injection Attacks by Modifying User Input Data. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Prasuna Sarana, Arindam Roy, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri Role Mining in the Presence of Separation of Duty Constraints. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aniket Roy, Rajat Subhra Chakraborty, Ruchira Naskar Reversible Color Image Watermarking in the YCoCg-R Color Space. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati Data Security Issues in Cloud Scenarios. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Simon Gansel, Stephan Schnitzer, Ahmad Gilbeau-Hammoud, Viktor Friesen, Frank Dürr, Kurt Rothermel, Christian Maihöfer, Ulrich Krämer Context-Aware Access Control in Novel Automotive HMI Systems. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Stefan Prandl, Mihai M. Lazarescu, Duc-Son Pham 0001 A Study of Web Application Firewall Solutions. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Dominik Bollmann, Steffen Lortz, Heiko Mantel, Artem Starostin An Automatic Inference of Minimal Security Types. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ashish Choudhury Asynchronous Error-Decodable Secret-Sharing and Its Application. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Satyajit Banerjee, Debapriyay Mukhopadhyay, Suman Roy 0001 A New Threshold Certification Scheme Based Defense Against Sybil Attack for Sensor Networks. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Donghoon Chang, Somitra Kumar Sanadhya, Nishant Sharma New HMAC Message Patches: Secret Patch and CrOw Patch. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Moumita Das, Bhaskar Sardar, Ansuman Banerjee Attacks on Branch Predictors: An Empirical Exploration. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Toshanlal Meenpal, A. K. Bhattacharjee Watermark Removal Attack Extended to Forgery Against Correlation-Based Watermarking Schemes. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya Enforcing Separation of Duty in Attribute Based Access Control Systems. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Michael Kunz, Ludwig Fuchs, Matthias Hummer, Günther Pernul Introducing Dynamic Identity and Access Management in Organizations. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tom Deering, Ganesh Ram Santhanam, Suresh C. Kothari FlowMiner: Automatic Summarization of Library Data-Flow for Malware Analysis. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Dhruti Sharma, Devesh Jinwala Functional Encryption in IoT E-Health Care System. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Y. Sreenivasa Rao Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Schemes with Fast Decryption. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Phillipa Bennett, Indrakshi Ray, Robert B. France Modeling of Online Social Network Policies Using an Attribute-Based Access Control Framework. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sushil Jajodia, Chandan Mazumdar (eds.) Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Vinod Ganapathy Reflections on the Self-service Cloud Computing Project. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Radhey Shyam, Yogendra Narain Singh Robustness of Score Normalization in Multibiometric Systems. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Santanu Sarkar 0001 A New Distinguisher on Grain v1 for 106 Rounds. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gaurav Somani 0001, Abhinav Johri, Mohit Taneja, Utkarsh Pyne, Manoj Singh Gaur, Dheeraj Sanghi DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Payal Chaudhari, Manik Lal Das, Anish Mathuria On Anonymous Attribute Based Encryption. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Erwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk Assessment of an Automatic Correlation Rules Generator. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Haruhisa Kosuge, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa Search Algorithm of Precise Integral Distinguisher of Byte-Based Block Cipher. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Goutam Paul 0001 Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible Remedies. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Stefano Paraboschi, Enrico Bacis, Simone Mutti Extending Mandatory Access Control Policies in Android. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1S. Susheel, N. V. Narendra Kumar, R. K. Shyamasundar Enforcing Secure Data Sharing in Web Application Development Frameworks Like Django Through Information Flow Control. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Suchismita Bhattacharjee, Ningrinla Marchang Attack-Resistant Trust-Based Weighted Majority Game Rule for Spectrum Sensing in Cognitive Radio Networks. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Anant Pushkar, Nirnay Ghosh, Soumya K. Ghosh 0001 A Statistical Approach to Detect Anomalous User Requests in SaaS Cloud-Centric Collaborations. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ruggero Donida Labati, Angelo Genovese, Enrique Muñoz Ballester, Vincenzo Piuri, Fabio Scotti, Gianluca Sforza Automated Border Control Systems: Biometric Challenges and Research Trends. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hiten Choudhury, Basav Roychoudhury, Dilip Kr. Saikia A Security Extension Providing User Anonymity and Relaxed Trust Requirement in Non-3GPP Access to the EPS. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Victor Heorhiadi, Seyed Kaveh Fayaz, Michael K. Reiter, Vyas Sekar SNIPS: A Software-Defined Approach for Scaling Intrusion Prevention Systems via Offloading. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1George Cybenko, Sushil Jajodia, Michael P. Wellman, Peng Liu 0005 Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sumitra Biswal, Goutam Paul 0001, Shashwat Raizada Preserving Privacy in Location-Based Services Using Sudoku Structures. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mukti Padhya, Devesh Jinwala A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sadhana Jha, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Tushar Singhal, Mauro Conti Privacy Leakage Attacks in Browsers by Colluding Extensions. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Goutam Paul 0001, Pratik Sarkar, Sarbajit Mukherjee Towards a More Democratic Mining in Bitcoins. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Puneet Gupta 0002, Phalguni Gupta A Vein Biometric Based Authentication System. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Peter Mayer 0001, Melanie Volkamer, Michaela Kauer Authentication Schemes - Comparison and Effective Password Spaces. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Joachim Biskup, Marcel Preuß Inference-Proof Data Publishing by Minimally Weakening a Database Instance. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Pankaj Malviya, Ruchira Naskar Digital Forensic Technique for Double Compression Based JPEG Image Forgery Detection. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar A Formal Methodology for Modeling Threats to Enterprise Assets. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Thong M. Doan, Han N. Dinh, Nam Tuan Nguyen, Phuoc T. Tran Location Obfuscation Framework for Training-Free Localization System. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Atul Prakash 0001, Rudrapatna K. Shyamasundar (eds.) Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Richard Gay, Jinwei Hu, Heiko Mantel CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic Enforcement. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nilesh Chakraborty, Samrat Mondal An Improved Methodology towards Providing Immunity against Weak Shoulder Surfing Attack. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Koen Decroix, Denis Butin, Joachim Jansen, Vincent Naessens Inferring Accountability from Trust Perceptions. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Biswajit Halder, Rajkumar Darbar, Utpal Garain, Abhoy Chand Mondal Analysis of Fluorescent Paper Pulps for Detecting Counterfeit Indian Paper Money. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wilayat Khan, Stefano Calzavara, Michele Bugliesi, Willem De Groef, Frank Piessens Client Side Web Session Integrity as a Non-interference Property. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tanmay Thakur, Rakesh M. Verma Catching Classical and Hijack-Based Phishing Attacks. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Aditya Basu, Anish Mathuria, Nagendra Chowdary Automatic Generation of Compact Alphanumeric Shellcodes for x86. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ramaswamy Ramanujam, Vaishnavi Sundararajan, S. P. Suresh Extending Dolev-Yao with Assertions. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Krishna Chaitanya Telikicherla, Venkatesh Choppella, Bruhadeshwar Bezawada CORP: A Browser Policy to Mitigate Web Infiltration Attacks. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Arindam Roy, Shamik Sural, Arun Kumar Majumdar Impact of Multiple t-t SMER Constraints on Minimum User Requirement in RBAC. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Alexandre Vernotte, Frédéric Dadeau, Franck Lebeau, Bruno Legeard, Fabien Peureux, François Piat Efficient Detection of Multi-step Cross-Site Scripting Vulnerabilities. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xiaolei Li, Xinshu Dong, Zhenkai Liang A Usage-Pattern Perspective for Privacy Ranking of Android Apps. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Paolo Rovelli, Ymir Vigfusson PMDS: Permission-Based Malware Detection System. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Y. Sreenivasa Rao, Ratna Dutta Recipient Anonymous Ciphertext-Policy Attribute Based Encryption. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yasser Sobhdel, Rasool Jalili A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dheerendra Mishra, Sourav Mukhopadhyay Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Subhamoy Maitra, Sourav Sen Gupta 0001 New Long-Term Glimpse of RC4 Stream Cipher. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1R. V. Pradweap, R. C. Hansdah A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Angsuman Das, Avishek Adhikari Signcryption from Randomness Recoverable PKE Revisited. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Anuj Shanker Saxena, Vikram Goyal, Debajyoti Bera Efficient Enforcement of Privacy for Moving Object Trajectories. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Florian Kerschbaum, Martin Härterich, Mathias Kohler, Isabelle Hang, Andreas Schaad, Axel Schröpfer, Walter Tighzert An Encrypted In-Memory Column-Store: The Onion Selection Problem. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sourya Joyee De, Asim K. Pal Auctions with Rational Adversary. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sheethal Kumar, Pai B. J. Jaipal, Sourav Sen Gupta 0001, Vigesh R. Ungrapalli Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ankita Chaturvedi, Dheerendra Mishra, Sourav Mukhopadhyay Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James Monitoring for Slow Suspicious Activities Using a Target Centric Approach. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ayesha Khalid, Muhammad Hassan, Anupam Chattopadhyay, Goutam Paul 0001 RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 632 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license