The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SecureComm"( http://dblp.L3S.de/Venues/SecureComm )

URL (DBLP): http://dblp.uni-trier.de/db/conf/securecomm

Publication years (Num. hits)
2005 (51) 2006 (56) 2007 (62) 2008 (43) 2009 (27) 2010 (29) 2011 (36) 2012 (22) 2013 (28) 2015 (49) 2016 (49) 2017 (47) 2018-2022 (44) 2023 (1)
Publication types (Num. hits)
inproceedings(531) proceedings(13)
Venues (Conferences, Journals, ...)
SecureComm(544)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 544 publication records. Showing 544 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Patrick Traynor Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Deguang Kong, Yoon-chan Jhi, Tao Gong, Sencun Zhu, Peng Liu 0005, Hongsheng Xi SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Michael C. Grace, Zhi Wang 0004, Deepa Srinivasan, Jinku Li, Xuxian Jiang, Zhenkai Liang, Siarhei Liakh Transparent Protection of Commodity OS Kernels Using Hardware Virtualization. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sushil Jajodia, Jianying Zhou 0001 (eds.) Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Andrea Gabrielli, Mauro Conti, Roberto Di Pietro, Luigi V. Mancini Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Julien Freudiger, Maxim Raya, Jean-Pierre Hubaux Self-organized Anonymous Authentication in Mobile Ad Hoc Networks. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1William Kozma, Loukas Lazos Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo Baiting Inside Attackers Using Decoy Documents. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Feng Qian 0001, Zhiyun Qian, Zhuoqing Morley Mao, Atul Prakash 0001 Ensemble: Community-Based Anomaly Detection for Popular Applications. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Aravind Venkataraman, Raheem A. Beyah Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Martijn Oostdijk, Dirk-Jan van Dijk, Maarten Wegdam User-Centric Identity Using ePassports. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Guilherme Fernandes, Philippe Owezarski Automated Classification of Network Traffic Anomalies. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Toni Perkovic, Ivo Stancic, Luka Malisa, Mario Cagalj Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yan Chen, Tassos Dimitriou, Jianying Zhou 0001 (eds.) Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Magdalena Payeras-Capellà, Macià Mut Puigserver, Andreu Pere Isern-Deyà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Nets. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1S. Sree Vivek, S. Sharmila Deva Selvi, S. Gopi Nath, C. Pandu Rangan Breaking and Building of Group Inside Signature. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ghassan Karame, David Gubler, Srdjan Capkun On the Security of Bottleneck Bandwidth Estimation Techniques. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Liang Cai, Gabriel Maganis, Hui Zang, Hao Chen 0003 Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yanjiang Yang, Jianying Zhou 0001, Robert H. Deng, Feng Bao 0001 Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shimrit Tzur-David, Danny Dolev, Tal Anker MULAN: Multi-Level Adaptive Network Filter. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Zhaosheng Zhu, Vinod Yegneswaran, Yan Chen 0004 Using Failure Information Analysis to Detect Enterprise Zombies. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Wassim Znaidi, Marine Minier, Cédric Lauradoux Aggregated Authentication (AMAC) Using Universal Hash Functions. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ioannis Broustis, Konstantinos Pelechrinis, Dimitris Syrivelis, Srikanth V. Krishnamurthy, Leandros Tassiulas FIJI: Fighting Implicit Jamming in 802.11 WLANs. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Eric Chan-Tin, Daniel Feldman, Nicholas Hopper, Yongdae Kim The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yi Yang 0002, Sencun Zhu, Guohong Cao, Thomas La Porta An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shucheng Yu, Kui Ren 0001, Wenjing Lou, Jin Li 0002 Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mansoor Alicherry, Angelos D. Keromytis, Angelos Stavrou Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yawen Wei, Zhen Yu, Yong Guan A Novel Architecture for Secure and Scalable Multicast over IP Network. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Andrey Garnaev, Wade Trappe An Eavesdropping Game with SINR as an Objective Function. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia, Nikos Triandopoulos Reliable Resource Searching in P2P Networks. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Thanassis Tiropanis, Tassos Dimitriou Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources. Search on Bibsonomy SecureComm The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Eric Medvet, Engin Kirda, Christopher Kruegel Visual-similarity-based phishing detection. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Abhijit Bose, Kang G. Shin On capturing malware dynamics in mobile power-law networks. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Eyal Felstaine, Eldad Chai, Niv Gilboa, Avi Elisha Distributed flow detection over multi path sessions. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Mathias Fischer 0001, Guenter Schaefer, Robert Karl Schmidt, Thorsten Strufe A Key Management Solution for Overlay-Live-Streaming. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Erik-Oliver Blaß, Joachim Wilke, Martina Zitterbart Relaxed authenticity for data aggregation in wireless sensor networks. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Kevin S. Bauer, Damon McCoy, Dirk Grunwald, Douglas C. Sicker BitBlender: Light-Weight Anonymity for BitTorrent. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Urs Hengartner Location privacy based on trusted computing and secure logging. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Tansu Alpcan, Sinan Kesici, Daniel Bicher, Mehmet Kivanç Mihçak, Christian Bauckhage, Seyit Ahmet Çamtepe A lightweight biometric signature scheme for user authentication over networks. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Andrea Cirulli, Roberto Di Pietro PEAC: a probabilistic, efficient, and resilient authentication protocol for broadcast communications. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Lingjun Li, Liusheng Huang, Wei Yang 0011, Xinxin Zhao, Zhenshan Yu, Zhili Chen Detection of word shift steganography in PDF document. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Nouha Oualha, Yves Roudier Reputation and Audits for Self-Organizing Storage. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan Unassailable sensor networks. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Shijin Kong, Randy Smith, Cristian Estan Efficient signature matching with multiple alphabet compression tables. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula Subjective logic based trust model for mobile ad hoc networks. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Shawn Embleton, Sherri Sparks, Cliff C. Zou SMM rootkits: a new breed of OS independent malware. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Xinyuan Wang 0005, Ruishan Zhang, Xiaohui Yang, Xuxian Jiang, Duminda Wijesekera Voice pharming attack and the trust of VoIP. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia Securely computing an approximate median in wireless sensor networks. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yan Wen, Jinjing Zhao, Huaimin Wang Hiding "real" machine from attackers and malware with a minimal virtual machine monitor. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sepideh Fouladgar, Hossam Afifi Scalable Privacy Protecting Scheme through Distributed RFID Tag Identification. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sherif M. Khattab, Daniel Mossé, Rami G. Melhem Jamming Mitigation in Multi-Radio Wireless Networks: Reactive or Proactive? Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Tassos Dimitriou rfidDOT: RFID delegation and ownership transfer made simple. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yuanyuan Zeng, Xin Hu 0001, Haixiong Wang, Kang G. Shin, Abhijit Bose Containment of network worms via per-process rate-limiting. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ayse Gül Karatop, Erkay Savas An identity-based key infrastructure suitable for messaging and its application to e-mail. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Andrew Simpson On the need for user-defined fine-grained access control policies for social networking applications. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ashish Gehani, Surendar Chandra Parameterized access control: from design to prototype. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Bazara I. A. Barry, H. Anthony Chan On the performance of a hybrid intrusion detection architecture for voice over IP systems. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Anh Le, Raouf Boutaba, Ehab Al-Shaer Correlation-based load balancing for network intrusion detection and prevention systems. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Min Shao, Sencun Zhu, Guohong Cao, Tom La Porta, Prasant Mohapatra A cross-layer dropping attack in video streaming over ad hoc networks. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim Attacking the Kad network. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yi Ouyang 0001, Zhengyi Le, Donggang Liu, James Ford, Fillia Makedon Source location privacy against laptop-class attacks in sensor networks. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Guenther Starnberger, Christopher Kruegel, Engin Kirda Overbot: a botnet protocol based on Kademlia. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Shucheng Yu, Kui Ren 0001, Wenjing Lou Attribute-based on-demand multicast group setup with membership anonymity. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik Scalable and efficient provable data possession. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yafei Yang, Qinyuan Feng, Yan Lindsay Sun, Yafei Dai RepTrap: a novel attack on feedback-based reputation systems. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yoshifumi Manabe, Tatsuaki Okamoto Anonymous return route information for onion based mix-nets. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Wolf Müller 0001, Henryk Plötz, Jens-Peter Redlich, Takashi Shiraki Sybil proof anonymous reputation management. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Xia Wang, Johnny Wong, Wensheng Zhang 0001 A heterogeneity-aware framework for group key management in wireless mesh networks. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Issa Khalil, Saurabh Bagchi MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Min Gyu Cho, Kang G. Shin ARCMA: attack-resilient collaborative message authentication in wireless sensor networks. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Marco Benini, Sabrina Sicari Towards more secure systems: how to combine expert evaluations. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Joss Wright, Susan Stepney Enforcing Behaviour with Anonymity. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Kiran Lakkaraju, Adam J. Slagell Evaluating the utility of anonymized network traces for intrusion detection. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ioannis Krontiris, Thanassis Giannetsos, Tassos Dimitriou LIDeA: a distributed lightweight intrusion detection architecture for sensor networks. Search on Bibsonomy SecureComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Guofei Gu, Zesheng Chen, Phillip A. Porras, Wenke Lee Misleading and defeating importance-scanning malware propagation. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Mihály Bárász, Balázs Boros, Péter Ligeti, Krisztina Lója, Daniel A. Nagy Breaking EMAP. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Xiaoxin Wu 0001, David K. Y. Yau Mitigating denial-of-service attacks in MANET by incentive-based packet filtering: A game-theoretic approach. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Angelo Gaeta, Matteo Gaeta, Alan Smith, Ivan Djordjevic, Theo Dimitrakos, Maurizio Colombo, Sergio Miranda Design patterns for secure virtual organization management architecture. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Luca Longo, Pierpaolo Dondio, Stephen Barrett Temporal factors to evaluate trustworthiness of virtual identities. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Antonio Coronato, Giuseppe De Pietro A context service for multimodal pervasive environments. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jean-Marc Seigneur Trustworthiness of collaborative Open Source Software quality assessment. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Yuxin Wei, Muqing Wu Intrusion detection technology based on CEGA-SVM. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Kyuhyung Cho, Jongsung Lee 0005, Jongin Lim 0001, Jongsub Moon Verification method of network simulation for pervasive environments. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jang-Su Park, Soo-Young Kang, Im-Yeong Lee A study on secure RFID authentication protocol in insecure communication. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Florian Kerschbaum Simple cross-site attack prevention. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Fabio Martinelli A model for usage control in GRID systems. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Fabio Martinelli, Paolo Mori A model for usage control in GRID systems. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jian Yin 0006, Sanjay Kumar Madria Sybil attack detection in a hierarchical sensor network. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Luigi Coppolino, Luigi Romano, Nicola Mazzocca, Sergio Salvi Web Services workflow reliability estimation through reliability patterns. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ahren Studer, Mark Luk, Adrian Perrig Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Spyros Kotoulas, Ronny Siebes Scalable discovery of private resources. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Angelo P. E. Rosiello, Engin Kirda, Christopher Kruegel, Fabrizio Ferrandi A layout-similarity-based approach for detecting phishing pages. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Claude Castelluccia, Angelo Spognardi RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Xun Wang, Wei Yu 0002, Adam C. Champion, Xinwen Fu, Dong Xuan Detecting worms via mining dynamic program execution. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Tuomas Aura, Michael Roe, Steven J. Murdoch Securing network location awareness with authenticated DHCP. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham SCRUB-tcpdump: A multi-level packet anonymizer demonstrating privacy/analysis tradeoffs. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Massimiliano Rak, Valentina Casola, Nicola Mazzocca, Emilio Pasquale Mancini, Umberto Villano Optimizing secure Web Services with MAWeS: A case study. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1 Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007 Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  BibTeX  RDF
1Ashish Gehani, Surendar Chandra Parameterizing access control for heterogeneous peer-to-peer applications. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 544 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license