The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SECRYPT"( http://dblp.L3S.de/Venues/SECRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/secrypt

Publication years (Num. hits)
2006 (73) 2007 (67) 2008 (83) 2009 (62) 2010 (71) 2011 (68) 2012 (67) 2013 (71) 2014 (64) 2015 (53) 2016 (52) 2017 (67) 2021 (96) 2022 (85) 2023 (100)
Publication types (Num. hits)
inproceedings(1064) proceedings(15)
Venues (Conferences, Journals, ...)
SECRYPT(1079)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 1079 publication records. Showing 1079 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Guyu Fan, Manoranjan Mohanty Privacy-preserving Disease Susceptibility Test with Shamir's Secret Sharing. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Manuel Huber 0001, Julian Horsch, Junaid Ali 0002, Sascha Wessel Freeze & Crypt: Linux Kernel Support for Main Memory Encryption. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jaroslaw Bernacki, Marek Klonowski, Piotr Syga Some Remarks about Tracing Digital Cameras - Faster Method and Usable Countermeasure. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Valérie Viet Triem Tong, Aurélien Trulla, Mourad Leslous, Jean-François Lalande Information Flows at OS Level Unmask Sophisticated Android Malware. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nesrine Kaaniche, Maryline Laurent Attribute based Encryption for Multi-level Access Control Policies. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Luis Menezes, Roland Wismüller FlowSlicer - A Hybrid Approach to Detect and Avoid Sensitive Information Leaks in Android Applications using Program Slicing and Instrumentation. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Simone Aonzo, Giovanni Lagorio, Alessio Merlo RmPerm: A Tool for Android Permissions Removal. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rosario Giustolisi, Vincenzo Iovino, Gabriele Lenzini Privacy-Preserving Verifiability - A Case for an Electronic Exam Protocol. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shawn A. Prestridge, James G. Dunham Improving Throughput in BB84 Quantum Key Distribution. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Andrea S. Atzeni, Andrea Marcelli, Francesco Muroni, Giovanni Squillero HAIT: Heap Analyzer with Input Tracing. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jannik Dreier, Maxime Puys, Marie-Laure Potet, Pascal Lafourcade 0001, Jean-Louis Roch Formally Verifying Flow Properties in Industrial Systems. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pierangela Samarati, Mohammad S. Obaidat, Enrique Cabello (eds.) Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  BibTeX  RDF
1Matthieu Giraud, Alexandre Anzala-Yamajako, Olivier Bernard 0002, Pascal Lafourcade 0001 Practical Passive Leakage-abuse Attacks Against Symmetric Searchable Encryption. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Alireza Jolfaei, Krishna Kant 0001 A Lightweight Integrity Protection Scheme for Fast Communications in Smart Grid. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Damien Jauvart, Jacques J. A. Fournier, Louis Goubin First Practical Side-channel Attack to Defeat Point Randomization in Secure Implementations of Pairing-based Cryptography. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gaurav Pareek, B. R. Purushothama On Efficient Access Control Mechanisms in Hierarchy using Unidirectional and Transitive Proxy Re-encryption Schemes. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bekkar Laskar, Merouane Bouzid Vector Quantization based Steganography for Secure Speech Communication System. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1George O. M. Yee Adding Privacy Protection to Distributed Software Systems. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia Constant-size Threshold Attribute based SignCryption for Cloud Applications. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1João Amarante, João Paulo Barros Exploring USB Connection Vulnerabilities on Android Devices - Breaches using the Android Debug Bridge. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gerardo Canfora, Antonio Pirozzi, Aaron Visaggio s2ipt: A Lightweight Network Intrusion Detection/Prevention System based on IPtables. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jean-Guillaume Dumas, Pascal Lafourcade 0001, Francis Melemedjian, Jean-Baptiste Orfila, Pascal Thoniel LOCALPKI: A User-Centric Formally Proven Alternative to PKIX. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Juan Enrique Rubio, Cristina Alcaraz, Rodrigo Roman, Javier López 0001 Analysis of Intrusion Detection Systems in Industrial Ecosystems. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Louise Axon, Michael Goldsmith PB-PKI: A Privacy-aware Blockchain-based PKI. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Angela Jäschke, Björn Grohmann, Frederik Armknecht, Andreas Schaad Short Paper: Industrial Feasibility of Private Information Retrieval. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1José Becerra, Vincenzo Iovino, Dimiter Ostrev, Marjan Skrobot On the Relation Between SIM and IND-RoR Security Models for PAKEs. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xichen Zhang, Arash Habibi Lashkari, Ali A. Ghorbani 0001 A Lightweight Online Advertising Classification System using Lexical-based Features. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ilhem Souissi, Nadia Ben Azzouna, Tahar Berradia Towards a Self-adaptive Trust Management Model for VANETs. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Diogo Domingues Regateiro, Óscar Mortágua Pereira, Rui L. Aguiar On the Application of Fuzzy Set Theory for Access Control Enforcement. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Federico Sinigaglia, Roberto Carbone, Gabriele Costa 0001 Strong Authentication for e-Banking: A Survey on European Regulations and Implementations. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohammed Bakiri, Jean-François Couchot, Christophe Guyeux One Random Jump and One Permutation: Sufficient Conditions to Chaotic, Statistically Faultless, and Large Throughput PRNG for FPGA. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marek Sýs, Dusan Klinec, Petr Svenda The Efficient Randomness Testing using Boolean Functions. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Miguel Hernández Boza, Alfonso Muñoz (In) Security in Graph Databases - Analysis and Data Leaks. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu 0001 On Obfuscating Compilation for Encrypted Computing. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Stig Fr. Mjølsnes, Ruxandra F. Olimid Experimental Assessment of Private Information Disclosure in LTE Mobile Networks. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Petr Dzurenda, Jan Hajny, Lukas Malina, Sara Ricci Anonymous Credentials with Practical Revocation using Elliptic Curves. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Maryem Ait El Hadj, Meryeme Ayache, Yahya Benkaouz, Ahmed Khoumsi, Mohammed Erradi Clustering-based Approach for Anomaly Detection in XACML Policies. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bhupendra Singh, Upasna Singh Program Execution Analysis using UserAssist Key in Modern Windows. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Matús Harvan, Thomas Locher, Marta Mularczyk, Yvonne-Anne Pignolet Privacy-preserving Regression on Partially Encrypted Data. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jesus Diaz, David Arroyo, Francisco B. Rodríguez Fair and Accountable Anonymity for the Tor Network. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Prabhat Kushwaha, Ayan Mahalanobis A Probabilistic Baby-step Giant-step Algorithm. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  BibTeX  RDF
1David Ortega del Campo, Cristina Conde, Ángel Serrano 0002, Isaac Martín de Diego, Enrique Cabello Face Recognition-based Presentation Attack Detection in a Two-step Segregated Automated Border Control e-Gate - Results of a Pilot Experience at Adolfo Suárez Madrid-Barajas Airport. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Roberto Saia, Salvatore Carta Evaluating Credit Card Transactions in the Frequency Domain for a Proactive Fraud Detection Approach. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Diogo Barradas, Tiago Brito, David Duarte, Nuno Santos 0001, Luís E. T. Rodrigues Forensic Analysis of Communication Records of Web-based Messaging Applications from Physical Memory. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Alberto García, Alberto Garcia Moro, José Javier García, Jorge Roncero, Víctor A. Villagrá, Helena Jalain Context-based Encryption Applied to Data Leakage Prevention Solutions. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohamed Amine Bouazzouni, Emmanuel Conchon, Fabrice Peyrard, Pierre-François Bonnefoi A Card-less TEE-based Solution for Trusted Access Control. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Neila Mekki, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim Scenario-based Vulnerability Analysis in IoT-based Patient Monitoring System. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Louis Philippe Sondeck, Maryline Laurent, Vincent Frey The Semantic Discrimination Rate Metric for Privacy Measurements which Questions the Benefit of t-closeness over l-diversity. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Abdullah Al Balushi, Kieran McLaughlin, Sakir Sezer OSCIDS: An Ontology based SCADA Intrusion Detection Framework. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Denis Hock, Martin Kappes, Bogdan V. Ghita A Pre-clustering Method To Improve Anomaly Detection. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu 0001 A Practical Encrypted Microprocessor. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mohammed Bakiri, Jean-François Couchot, Christophe Guyeux FPGA Implementation of F2-Linear Pseudorandom Number Generators based on Zynq MPSoC: A Chaotic Iterations Post Processing Case Study. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nicolas T. Courtois, Pouyan Sepehrdad, Guangyan Song, Iason Papapanagiotakis-Bousy Predicting Outcomes of ElimLin Attack on Lightweight Block Cipher Simon. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gerardo Canfora, Paolo Di Notte, Francesco Mercaldo, Corrado Aaron Visaggio Silent and Continuous Authentication in Mobile Environment. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Asma Patel, Esther Palomar LP-Cache: Privacy-aware Cache Model for Location-based Apps. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sven Kiljan, Harald P. E. Vranken, Marko C. J. D. van Eekelen User-friendly Manual Transfer of Authenticated Online Banking Transaction Data - A Case Study that Applies the What You Enter Is What You Sign Transaction Authorization Information Scheme. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Andreas Put, Bart De Decker PACCo: Privacy-friendly Access Control with Context. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Giada Sciarretta, Alessandro Armando, Roberto Carbone, Silvio Ranise Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jan Hajny, Petr Dzurenda, Lukas Malina Multi-Device Authentication using Wearables and IoT. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sumanta Chatterjee, Alwyn R. Pais, Sumit Saurabh Distributed Data Aggregation in Wireless Sensor Network - with Peer Verification. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Johannes Schneider 0002, Bin Lu, Thomas Locher, Yvonne-Anne Pignolet, Matús Harvan, Sebastian Obermeier 0001 Subdomain and Access Pattern Privacy - Trading off Confidentiality and Performance. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jean-Guillaume Dumas, Pascal Lafourcade 0001, Jean-Baptiste Orfila, Maxime Puys Private Multi-party Matrix Multiplication and Trust Computations. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sana Belguith, Nesrine Kaaniche, Abderrazak Jemai, Maryline Laurent, Rabah Attia PAbAC: A Privacy Preserving Attribute based Framework for Fine Grained Access Control in Clouds. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tomoaki Mimoto, Anirban Basu 0001, Shinsaku Kiyomoto Towards Practical k-Anonymization: Correlation-based Construction of Generalization Hierarchy. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Cristina Alcaraz, Javier López 0001, Kim-Kwang Raymond Choo Dynamic Restoration in Interconnected RBAC-based Cyber-physical Control Systems. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rosario Giustolisi, Christian Gehrmann Threats to 5G Group-based Authentication. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Johannes Schneider Lean and Fast Secure Multi-party Computation: Minimizing Communication and Local Computation using a Helper. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Olivier Blazy, Xavier Bultel, Pascal Lafourcade 0001 Two Secure Anonymous Proxy-based Data Storages. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dirk Achenbach, Bernhard Löwe, Jörn Müller-Quade, Jochen Rill Oblivious Voting: Hiding Votes from the Voting Machine in Bingo Voting. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Óscar Mortágua Pereira, Diogo Domingues Regateiro, Rui L. Aguiar Protecting Databases from Schema Disclosure - A CRUD-Based Protection Model. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jean-François Couchot, Raphaël Couturier, Yousra Ahmed Fadil, Christophe Guyeux A Second Order Derivatives based Approach for Steganography. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kenta Muranaka, Naoto Yanai, Shingo Okamura, Toru Fujiwara ISDSR: Secure DSR with ID-based Sequential Aggregate Signature. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Vitor Bernardo, Dulce Domingos Web-based Fingerprinting Techniques. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mohsen Ahmadvand, Antoine Scemama, Martín Ochoa, Alexander Pretschner Enhancing Operation Security using Secret Sharing. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wojciech Wodo, Lucjan Hanzlik Thermal Imaging Attacks on Keypad Security Systems. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ibraheem Frieslaar, Barry Irwin Towards a Software Approach to Mitigate Correlation Power Analysis. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kazuhide Fukushima, Seira Hidano, Shinsaku Kiyomoto Sensor-based Wearable PUF. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Manoranjan Mohanty, Muhammad Rizwan Asghar, Giovanni Russello 3DCrypt: Privacy-preserving Pre-classification Volume Ray-casting of 3D Images in the Cloud. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hafsa Assidi, Edoukou Berenger Ayebie, El Mamoun Souidi A Code-based Group Signature Scheme with Shorter Public Key Length. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hélène Le Bouder, Thierno Barry, Damien Couroussé, Jean-Louis Lanet, Ronan Lashermes A Template Attack Against VERIFY PIN Algorithms. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gerben Geltink, Sergei Volokitin FPGA Implementation of HS1-SIV. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jelena Milosevic, Miroslaw Malek, Alberto Ferrante A Friend or a Foe? Detecting Malware using Memory and CPU Features. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Slim Trabelsi, Skander Ben Mahmoud, Anis Zouaoui Predictive Model for Exploit Kit based Attacks. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Francesco Buccafurri, Rajeev Anand Sahu, Vishal Saraswat Efficient Proxy Signature Scheme from Pairings. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1George Stergiopoulos, Panagiotis Katsaros, Dimitris Gritzalis, Theodore K. Apostolopoulos Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tim Waage, Daniel Homann, Lena Wiese Practical Application of Order-preserving Encryption in Wide Column Stores. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jordi Cucurull, Sandra Guasch, David Galindo Transitioning to a Javascript Voting Client for Remote Online Voting. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wojciech Wodo, Lucjan Hanzlik, Kamil Kluczniak Computations on Private Sets and their Application to Biometric based Authentication Systems. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kirill Belyaev, Indrakshi Ray Towards Access Control for Isolated Applications. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Debjyoti Bhattacharjee, Anupam Chattopadhyay Hardware Accelerator for Stream Cipher Spritz. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Abir Awad, Brian Lee 0001 A Metaphone based Chaotic Searchable Encryption Algorithm for Border Management. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Srinivasa Rao Subramanya Rao Differential Addition in Edwards Coordinates Revisited and a Short Note on Doubling in Twisted Edwards Form. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gerardo Canfora, Francesco Mercaldo, Antonio Pirozzi, Corrado Aaron Visaggio How I Met Your Mother? - An Empirical Study about Android Malware Phylogenesis. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bogdan Groza, Pal-Stefan Murvay, Tudor Andreica Evaluating SRAM as Source for Fingerprints and Randomness on Automotive Grade Controllers. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ahmet Emin Tatar, Marius Nagy, Naya Nagy The Cost of Breaking a Quantum Bit Commitment Protocol on Equivalence Classes. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  BibTeX  RDF
1Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner, Hung X. Nguyen, Marian Mihailescu, Michelle McClintock Verifiable Policy-defined Networking for Security Management. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner The Mathematical Foundations for Mapping Policies to Network Devices. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sara Barakat, Bechara al Bouna, Mohamed Nassar 0001, Christophe Guyeux On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Christian Callegari, Marten van Sinderen, Panagiotis G. Sarigiannidis, Pierangela Samarati, Enrique Cabello, Pascal Lorenz, Mohammad S. Obaidat (eds.) Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  BibTeX  RDF
1Andrea Lesavourey, Christophe Nègre, Thomas Plantard Efficient Randomized Regular Modular Exponentiation using Combined Montgomery and Barrett Multiplications. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 1079 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license