The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "NSS"( http://dblp.L3S.de/Venues/NSS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/nss

Publication years (Num. hits)
2009 (90) 2010 (91) 2011 (58) 2012 (40) 2013 (72) 2014 (48) 2015 (42) 2016 (36) 2017 (60) 2018 (37) 2019 (48) 2020 (27) 2021 (25) 2022 (42) 2023 (22)
Publication types (Num. hits)
inproceedings(723) proceedings(15)
Venues (Conferences, Journals, ...)
NSS(738)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 215 occurrences of 177 keywords

Results
Found 738 publication records. Showing 738 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jinsheng Zhang, Wensheng Zhang 0001, Daji Qiao GP-ORAM: A Generalized Partition ORAM. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Teng Wu, Guang Gong New Message Authentication Code Based on APN Functions and Stream Ciphers. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kamil Kluczniak, Lucjan Hanzlik, Przemyslaw Kubiak 0001, Miroslaw Kutylowski Anonymous Evaluation System. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Andi Fitriah Abdul Kadir, Natalia Stakhanova, Ali Akbar Ghorbani Android Botnets: What URLs are Telling Us. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Damiano Bolzoni Indicators of Malicious SSL Connections. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ashish Jain, Narendra S. Chaudhari Evolving Highly Nonlinear Balanced Boolean Functions with Improved Resistance to DPA Attacks. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chao Li 0023, Balaji Palanisamy De-anonymizable Location Cloaking for Privacy-Controlled Mobile Systems. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Ronald Menendez, Shahab Etemad Foundations of Optical Encryption: A Candidate Short-Key Scheme. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jinwei Xu, Jiankun Hu Multi-constrained Orientation Field Modeling and Its Application for Fingerprint Indexing. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christian Callegari, Stefano Giordano, Michele Pagano Enforcing Privacy in Distributed Multi-Domain Network Anomaly Detection. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jean-Michel Cioranesco, Craig Hampel, Guilherme Ozari de Almeida, Rodrigo Portella do Canto Cryptographically Secure On-Chip Firewalling. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Vit Bukac, Vlasta Stavova, Lukas Nemec, Zdenek Ríha, Vashek Matyas Service in Denial - Clouds Going with the Winds. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Devu Manikantan Shila, Vivek Venugopalan, Cameron D. Patterson Unraveling the Security Puzzle: A Distributed Framework to Build Trust in FPGAs. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1P. Krishnan, Navjot Singh 0001 VICI: Visual Caller Identification for Contact Center Applications. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Duane Wilson, Giuseppe Ateniese From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Su Zhang, Xinwen Zhang, Xinming Ou, Liqun Chen 0002, Nigel Edwards, Jing Jin Assessing Attack Surface with Component-Based Package Dependency. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mark E. Fioravanti II, Ayush Shah, Shengzhi Zhang A Study of Network Domains Used in Android Applications. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Abdulaziz Aldribi, Issa Traoré A Game Theoretic Framework for Cloud Security Transparency. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Javier Baliosian, Ana R. Cavalli An Abstraction for the Interoperability Analysis of Security Policies. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ross K. Gegan, Rennie Archibald, Matthew K. Farrens, Dipak Ghosal Performance Analysis of Real-Time Covert Timing Channel Detection Using a Parallel System. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Atsuko Miyaji, Shohei Nishida A Scalable Multiparty Private Set Intersection. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fuqun Wang, Kunpeng Wang, Bao Li 0001 An Efficient Leveled Identity-Based FHE. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hui Ma 0002, Rui Zhang 0002 Secure Cloud Storage for Dynamic Group: How to Achieve Identity Privacy-Preserving and Privilege Control. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiaoshuang Ma, Kexin Qiao Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Giuseppe Ateniese, Briland Hitaj, Luigi Vincenzo Mancini, Nino Vincenzo Verde, Antonio Villani No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhiguo Wan, Robert H. Deng, David Lee Electronic Contract Signing Without Using Trusted Third Party. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Weizhi Meng 0001 RouteMap: A Route and Map Based Graphical Password Scheme for Better Multiple Password Memory. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang 0001 (eds.) Network and System Security - 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Roger Piqueras Jover, Ilona Murynets, Jeffrey Bickford Detecting Malicious Activity on Smartphones Using Sensor Measurements. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Javid Habibi, Ajay Panicker, Aditi Gupta 0002, Elisa Bertino DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jiageng Chen, Atsuko Miyaji, Chunhua Su, Liang Zhao 0020 A New Statistical Approach for Integral Attack. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Navid Pustchi, Ravi S. Sandhu MT-ABAC: A Multi-Tenant Attribute-Based Access Control Model with Tenant Trust. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mahendra Pratap Singh, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya, Ussama Yakub Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Brian Ricks, Patrick Tague Isolation of Multiple Anonymous Attackers in Mobile Networks. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Li Xu 0002, Limei Lin, Sheng Wen First-Priority Relation Graph-Based Malicious Users Detection in Mobile Social Networks. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wei Wang 0084, Mikhail Istomin, Jeffrey Bickford Dandelion - Revealing Malicious Groups of Interest in Large Mobile Networks. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jongho Won, Elisa Bertino Distance-based Trustworthiness Assessment for Sensors in Wireless Sensor Networks. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Qingji Zheng, Xiangxue Li, Aytac Azgin CLKS: Certificateless Keyword Search on Encrypted Data. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jaideep Vaidya, Basit Shafiq, Vijayalakshmi Atluri, David Lorenzi A Framework for Policy Similarity Evaluation and Migration Based on Change Detection. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhenhua Chen, Shundong Li, Yimin Guo 0001, Yilei Wang, Yunjie Chu A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong Capturing Android Malware Behaviour Using System Flow Graph. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Li Yang 0005, Jianfeng Ma 0001, Wei Wang 0105, Chunjie Cao Multi-domain Direct Anonymous Attestation Scheme from Pairings. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Di Wu 0050, Xiao Chen 0002, Chao Chen 0015, Jun Zhang 0010, Yang Xiang 0001, Wanlei Zhou 0001 On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xiaoshuang Ma, Lei Hu, Siwei Sun, Kexin Qiao, Jinyong Shan Tighter Security Bound of MIBS Block Cipher against Differential Attack. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shuangyu He, Jianwei Liu 0001, Jian Mao, Jie Chen 0038 Hierarchical Solution for Access Control and Authentication in Software Defined Networks. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yi Tang, Piaoping Lin, Zhaokai Luo psOBJ: Defending against Traffic Analysis with pseudo-Objects. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tapas Pandit, Rana Barua, Somanath Tripathy eCK Secure Single Round ID-Based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ibrahim F. Elashry, Yi Mu 0001, Willy Susilo Jhanwar-Barua's Identity-Based Encryption Revisited. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xiutao Feng, Fan Zhang Cryptanalysis on the Authenticated Cipher Sablier. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shuquan Hou, Xinyi Huang 0001, Li Xu 0002 Identity-Based Transitive Signcryption. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bo Tang, Ravi S. Sandhu Extending OpenStack Access Control with Domain Trust. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Weiwei Liu 0005, Yi Mu 0001, Guomin Yang Attribute-Based Signing Right Delegation. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Khoa Nguyen 0004, Dat Tran 0001, Wanli Ma, Dharmendra Sharma 0001 A Proposed Approach to Compound File Fragment Identification. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sriramkrishnan Srinivasan, Chris Culnane, James Heather, Steve A. Schneider, Zhe Xia Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yilei Wang, Zhe Liu 0001, Tao Li, Qiuliang Xu Rational Secure Two-party Computation in Social Cloud. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Khalifa Toumi, Wissam Mallouli, Edgardo Montes de Oca, César Andrés, Ana R. Cavalli How to Evaluate Trust Using MMT. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Miao Xie, Jiankun Hu, Xinghuo Yu 0001, Elizabeth Chang 0001 Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hasini Gunasinghe, Elisa Bertino Privacy Preserving Biometrics-Based and User Centric Authentication Protocol. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Baodian Wei, Yusong Du, Huang Zhang, Fangguo Zhang, Haibo Tian, Chong-zhi Gao Identity Based Threshold Ring Signature from Lattices. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yong Li, Yuanyuan Zhang 0002, Juanru Li, Dawu Gu iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wei Zhou, Jiankun Hu, Song Wang 0003, Ian R. Petersen, Mohammed Bennamoun Fingerprint Indexing Based on Combination of Novel Minutiae Triplet Features. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yamin Wen, Zheng Gong A Dynamic Matching Secret Handshake Scheme without Random Oracles. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kaibin Huang, Raylin Tso, Yu-Chi Chen, Wangyu Li, Hung-Min Sun A New Public Key Encryption with Equality Test. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jiguo Li 0001, Xuexia Zhao, Yichen Zhang 0003 Certificate-Based Conditional Proxy Re-Encryption. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Vandana Guleria, Ratna Dutta Lightweight Universally Composable Adaptive Oblivious Transfer. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Man Ho Au, Barbara Carminati, C.-C. Jay Kuo (eds.) Network and System Security - 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014, Proceedings Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Khoa Nguyen 0004, Dat Tran 0001, Wanli Ma, Dharmendra Sharma 0001 A New Approach to Executable File Fragment Detection in Network Forensics. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jingwan Zhang, Yiming Zhao A New Multivariate Based Threshold Ring Signature Scheme. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shijun Zhao, Qianying Zhang, Yu Qin, Dengguo Feng Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jakub Muszynski, Sébastien Varrette, Juan Luis Jiménez Laredo, Pascal Bouvry Exploiting the Hard-Wired Vulnerabilities of Newscast via Connectivity-Splitting Attack. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yumei Li 0002, Holger Voos, Albert Rosich, Mohamed Darouach A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mengmeng Ge, Kim-Kwang Raymond Choo A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bo Qin, Linxiao Wang, Yujue Wang, Qianhong Wu, Wenchang Shi, Bin Liang 0002 Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Pratish Datta, Dibyendu Roy 0001, Sourav Mukhopadhyay A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jia Yan, Lingyun Ying, Yi Yang 0040, Purui Su, Qi Li 0002, Hui Kong, Dengguo Feng Revisiting Node Injection of P2P Botnet. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yonglin Hao, Dongxia Bai, Leibo Li A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dang Nguyen 0001, Jaehong Park, Ravi S. Sandhu Adopting Provenance-Based Access Control in OpenStack Cloud IaaS. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yong Yu 0002, Yi Mu 0001, Jianbing Ni, Jiang Deng, Ke Huang 0002 Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xiao Feng, Zheng Yuan A Secure Obfuscator for Encrypted Blind Signature Functionality. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mengting Li, Xinyi Huang 0001, Joseph K. Liu, Li Xu 0002 GO-ABE: Group-Oriented Attribute-Based Encryption. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Chien-Ming Chen 0001, Tsu-Yang Wu, Raylin Tso, Mu-En Wu Security Analysis and Improvement of Femtocell Access Control. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1N. Rajamanickam, R. Nadarajan, Atilla Elçi Formal Verification of Finite State Transactional Security Policy. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nathalie Baracaldo, Balaji Palanisamy, James B. D. Joshi Geo-Social-RBAC: A Location-Based Socially Aware Access Control Framework. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Li Xi, Dengguo Feng Formal Analysis of DAA-Related APIs in TPM 2.0. Search on Bibsonomy NSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Y. Sreenivasa Rao, Ratna Dutta Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yao Lu 0002, Rui Zhang 0002, Dongdai Lin Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bruno Alves Pereira Botelho, Emilio Tissato Nakamura, Nelson Uto Security Analysis of Touch Inputted Passwords - A Preliminary Study Based on the Resistance against Brute Force Attacks. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yunhui Zhuang, Anjia Yang, Duncan S. Wong, Guomin Yang, Qi Xie A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Daniele Midi, Ashish Kundu, Elisa Bertino Towards Authenticated Objects. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dheerendra Mishra, Vinod Kumar 0003, Sourav Mukhopadhyay A Pairing-Free Identity Based Authentication Framework for Cloud Computing. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Borja Sanz 0001, Igor Santos, Javier Nieves, Carlos Laorden, Iñigo Alonso-Gonzalez, Pablo García Bringas MADS: Malicious Android Applications Detection through String Analysis. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zhihui Han, Liang Cheng 0004, Yang Zhang 0021, Dengguo Feng Measuring and Comparing the Protection Quality in Different Operating Systems. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi Building Better Unsupervised Anomaly Detector with S-Transform. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Fudong Li 0001, Nathan L. Clarke, Steven Furnell A Technology Independent Security Gateway for Real-Time Multimedia Communication. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wencheng Yang, Jiankun Hu, Song Wang 0003 A Finger-Vein Based Cancellable Bio-cryptosystem. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Qiang Tang 0001 Towards a Privacy-Preserving Solution for OSNs. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis Using the Smart Card Web Server in Secure Branchless Banking. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 738 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license