|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7090 occurrences of 2819 keywords
|
|
|
Results
Found 22916 publication records. Showing 22913 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
26 | A. M. Frolov |
A Hybrid Approach to Enhancing the Reliability of Software. |
Program. Comput. Softw. |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Bin Zhou, Hussein T. Mouftah |
Spare capacity planning using survivable alternate routing for long-haul WDM networks. |
ISCC |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Roger M. Needham |
The CAP Project - An Interim Evaluation. |
SOSP |
1977 |
DBLP DOI BibTeX RDF |
|
26 | Muhammad Awais Shibli, Imran Yousaf, Sead Muftic |
MagicNET: Security System for Protection of Mobile Agents. |
AINA |
2010 |
DBLP DOI BibTeX RDF |
Mobile Agent's Code Protection, Agent's Baggage Protection |
26 | Jibin Cheng, Wenzhe Zhang, Jiwen Yang |
Local Optimum Algorithms for Self-Protection in Wireless Sensor Networks. |
MSN |
2009 |
DBLP DOI BibTeX RDF |
multiple protection sets, local information, Self protection, active nodes |
26 | Xuebing Zhou, Stephen D. Wolthusen, Christoph Busch 0001, Arjan Kuijper |
Feature Correlation Attack on Biometric Privacy Protection Schemes. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
feature correlation attack, correlation of biometric features, privacy protection, template protection |
26 | Hyun Jun Jang, Dae Won Hwang, Eul-Gyu Im |
Data Protection in Memory Using Byte Reordering. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
Information Security, Data Protection, Memory protection |
26 | J. Tang, James Langston, Michael Sloderbeck, Dean Ouellette, P. G. McLaren |
In system emulation (ISE) of a current differential back-up protection relay. |
SCSC |
2007 |
DBLP BibTeX RDF |
differential protection, wide-area back-up protection, emulation, relay |
26 | Lawrence Snyder |
Formal Models of Capability-Based Protection Systems. |
IEEE Trans. Computers |
1981 |
DBLP DOI BibTeX RDF |
theoretical models of protection, grammatical protection systems, right-passing, Take/Grant Models, security, safety, Capabilities |
25 | Giray Birkan, Jeffery L. Kennington |
Design procedures for backbone transport networks with shared protection: optimization-based models, exact and heuristic algorithms, and unavailability computations. |
Telecommun. Syst. |
2009 |
DBLP DOI BibTeX RDF |
Integer programming applications, DWDM network design, Polarization mode dispersion, Shared protection, Availability, Network provisioning |
25 | Kyong-jin Kim, Eugene Kim, Seng-Phil Hong |
Privacy information protection in portable device. |
ICHIT |
2009 |
DBLP DOI BibTeX RDF |
privacy information protection, portable device |
25 | Jeffrey B. Lotspiech |
Broadcast encryption versus public key cryptography in content protection systems. |
Digital Rights Management Workshop |
2009 |
DBLP DOI BibTeX RDF |
tracing traitors, drm, broadcast encryption, content protection |
25 | Supachai Tangwongsan, Sathaporn Kassuvan |
A highly effective model for security protection against eavesdropping exploits. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
security protection, voice eavesdropping, voice encryption, security model, key exchange |
25 | Janice C. Sipior, Burke T. Ward |
Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation. |
Inf. Syst. Frontiers |
2008 |
DBLP DOI BibTeX RDF |
Legal protection, Privacy, Trust, Spyware |
25 | Dimitris K. Tsolis, Theodore S. Papatheodorou |
Web services for digital rights management and copyright protection in digital media. |
DIMEA |
2008 |
DBLP DOI BibTeX RDF |
digital rights management system, web services, metadata, watermarking, copyright protection |
25 | Fanny Coudert, Jos Dumortier |
Intelligent Video Surveillance Networks: Data Protection Challenges. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
image recognition software, interconnection of video surveillance networks, video analytics, video surveillance, data protection, behaviour analysis |
25 | Rajat Subhra Chakraborty, Swarup Bhunia |
Hardware protection and authentication through netlist level obfuscation. |
ICCAD |
2008 |
DBLP DOI BibTeX RDF |
IP piracy, design for security, hardware authentication, hardware obfuscation, hardware protection |
25 | Richard H. Stern |
West Coast Federal Appeals Court Upholds Chip Protection Act Violation Finding. |
IEEE Micro |
2007 |
DBLP DOI BibTeX RDF |
antitrust violation, Semiconductor Chip Protection Act, chip piracy, monopoly, Altera, Clear Logic, reverse engineering, ASICs, law, bitstream |
25 | Mesut E. Baran, Nikhil Mahajan, Sercan Teleke |
Simulation-based design of protection schemes for shipboard power systems. |
SCSC |
2007 |
DBLP BibTeX RDF |
electromagnetic transient analysis, power electronic systems, power system protection, power system simulation |
25 | Changjin Lee, Bong Gyou Lee, Youngil Kong |
Privacy Protection for a Secure u-City Life. |
International Conference on Computational Science (4) |
2007 |
DBLP DOI BibTeX RDF |
Ubiquitous Computing, Privacy Protection, Personal Information, u-City |
25 | Hui-Kai Su, Cheng-Shong Wu |
Local Link Protection Scheme in IP Networks. |
International Conference on Computational Science (4) |
2007 |
DBLP DOI BibTeX RDF |
IP network survivability, fast reroute, link protection |
25 | Hongxia Jin, Ginger Myles |
A technique for self-certifying tamper resistant software. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
software tamper resistance, content protection, attack tree, security measurement |
25 | Zili Shao, Chun Xue, Qingfeng Zhuge, Mei Kang Qiu, Bin Xiao 0001, Edwin Hsing-Mean Sha |
Security Protection and Checking for Embedded System Integration against Buffer Overflow Attacks via Hardware/Software. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
hardware/software, Security, embedded system, protection, buffer overflow attack |
25 | Jordi Perelló, Eduard Escalona, Salvatore Spadaro, Fernando Agraz, Jaume Comellas, Gabriel Junyent |
Control Plane Protection Using Link Management Protocol (LMP) in the ASON/GMPLS CARISMA Network. |
Networking |
2006 |
DBLP DOI BibTeX RDF |
LMP, protection, GMPLS, ASON |
25 | Lei Guo 0005, Lemin Li, Jin Cao, Hongfang Yu, Xuetao Wei |
Dynamic Path Shared Protection for Survivable Differentiated Reliable WDM Optical Networks. |
ICDCN |
2006 |
DBLP DOI BibTeX RDF |
differentiated reliability, Correlated Link Failure Probability (CLFP), double-link failures, path shared protection, WDM networks |
25 | Kyoungwoo Lee, Aviral Shrivastava, Ilya Issenin, Nikil D. Dutt, Nalini Venkatasubramanian |
Mitigating soft error failures for multimedia applications by selective data protection. |
CASES |
2006 |
DBLP DOI BibTeX RDF |
horizontally partitioned caches, multimedia embedded systems, selective data protection, soft errors |
25 | Hongxia Jin |
Privacy, traceability, and anonymity for content protection. |
PST |
2006 |
DBLP DOI BibTeX RDF |
anonymous trust, security, privacy, tracing, content protection |
25 | Shenghong Li 0001, Lili Cui, Jong-Uk Choi, Xuenan Cui |
An Audio Copyright Protection Schemes Based on SMM in Cepstrum Domain. |
SSPR/SPR |
2006 |
DBLP DOI BibTeX RDF |
statistical mean manipulation, cepstrum domain, watermark, information hiding, copyright protection |
25 | Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Mrinmoy Ghosh |
Towards the issues in architectural support for protection of software execution. |
SIGARCH Comput. Archit. News |
2005 |
DBLP DOI BibTeX RDF |
security, encryption, attack, tamper resistance, copy protection |
25 | Jianfei Cai 0001, Xiangjun Li, Chang Wen Chen |
Layered unequal loss protection with pre-interleaving for fast progressive image transmission over packet-loss channels. |
ACM Trans. Multim. Comput. Commun. Appl. |
2005 |
DBLP DOI BibTeX RDF |
unequal loss protection, forward error correction, packet loss, joint source-channel coding, Progressive image transmission |
25 | Roy Sterritt, Michael G. Hinchey |
Engineering Ultimate Self-Protection in Autonomic Agents for Space Exploration Missions. |
ECBS |
2005 |
DBLP DOI BibTeX RDF |
Self-Destruction, Pulse Monitoring, Autonomic Computing, Autonomic Agents, Exploration, Self-Protection, Apoptosis |
25 | Miklós Molnár, Alexandre Guitton, Bernard Cousin, Raymond A. Marie |
Efficient Protection of Many-to-One Communications. |
EDCC |
2005 |
DBLP DOI BibTeX RDF |
many-to-one, cold protection, multi-tree algorithm, network, fault-tolerant routing |
25 | Valery Pryamikov |
Call Tree Transformation for Program Obfuscation and Copy Protection. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
Software Copy Protection, Software Watermarking, Software Obfuscation |
25 | Vinh Trong Le, Son-Hong Ngo, Xiaohong Jiang 0001, Susumu Horiguchi, Yasushi Inoguchi |
A Hybrid Algorithm for Dynamic Lightpath Protection in Survivable WDM Optical Networks. |
ISPAN |
2005 |
DBLP DOI BibTeX RDF |
survivable routing, lightpath protection, genetic algorithms, mobile agents, Wavelength-division-multiplexing |
25 | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar |
Rights Protection for Relational Data. |
IEEE Trans. Knowl. Data Eng. |
2004 |
DBLP DOI BibTeX RDF |
Rights protection, watermarking, information hiding, relational data |
25 | Sastry Duri, Jeffrey Elliott, Marco Gruteser, Xuan Liu, Paul Moskowitz, Ronald Perez, Moninder Singh, Jung-Mu Tang |
Data Protection and Data Sharing in Telematics. |
Mob. Networks Appl. |
2004 |
DBLP DOI BibTeX RDF |
data protection architecture, automotive telematics, privacy policies |
25 | Philip W. L. Fong |
Pluggable verification modules: an extensible protection mechanism for the JVM. |
OOPSLA |
2004 |
DBLP DOI BibTeX RDF |
Aegis VM, extensible protection mechanism, pluggable verification modules, proof linking, Java virtual machine, bytecode verification, extensible systems, mobile code security |
25 | Vicenç Torra, Sadaaki Miyamoto |
Evaluating Fuzzy Clustering Algorithms for Microdata Protection. |
Privacy in Statistical Databases |
2004 |
DBLP DOI BibTeX RDF |
Fuzzy clustering, Privacy preserving data mining, Statistical Disclosure Control, Inference Control, Microaggregation, Microdata Protection |
25 | Josep Maria Mateo-Sanz, Francesc Sebé, Josep Domingo-Ferrer |
Outlier Protection in Continuous Microdata Masking. |
Privacy in Statistical Databases |
2004 |
DBLP DOI BibTeX RDF |
Masking methods, Outliers, Statistical disclosure control, Statistical database protection |
25 | Hui Zang, Canhui Ou, Biswanath Mukherjee |
Path-protection routing and wavelength assignment (RWA) in WDM mesh networks under duct-layer constraints. |
IEEE/ACM Trans. Netw. |
2003 |
DBLP DOI BibTeX RDF |
optical network, protection, wavelength-division multiplexing (WDM), lightpath, wavelength routing, integer linear program (ILP), shared risk link group |
25 | Sanghoon Lee 0001, Christine Podilchuk, Vidhya Krishnan, Alan C. Bovik |
Foveation-Based Error Resilience and Unequal Error Protection over Mobile Networks. |
J. VLSI Signal Process. |
2003 |
DBLP DOI BibTeX RDF |
foveated video, internet video, error resilience, wireless video, unequal error protection |
25 | Hao-Hua Chu, Lintian Qiao, Klara Nahrstedt, Hua Wang, Ritesh Jain |
A secure multicast protocol with copyright protection. |
Comput. Commun. Rev. |
2002 |
DBLP DOI BibTeX RDF |
watermark, copyright protection, key distribution, multicast security |
25 | Shing-Chi Cheung, Hanif Curreem |
Rights Protection for Digital Contents Redistribution Over the Internet. |
COMPSAC |
2002 |
DBLP DOI BibTeX RDF |
copy deterrence, watermarking protocols, E-commerce, digital watermarking, copyright protection, digital rights management, digital certificate |
25 | Miroslav Begovic, Borka Milosevic, Damir Novosel |
A Novel Method for Voltage Instability Protection. |
HICSS |
2002 |
DBLP DOI BibTeX RDF |
Power system protection, voltage stability |
25 | Sabu Emmanuel, Mohan S. Kankanhalli |
Copyright Protection For Mpeg-2 Compressed Broadcast Video. |
ICME |
2001 |
DBLP DOI BibTeX RDF |
Video Security, Multicasting, Video on Demand, Digital Watermarks, Copyright Protection, MPEG-2, Video Watermarking, Pay TV, Digital Video Broadcasting |
25 | Feng Bao 0001 |
Multimedia content protection by cryptography and watermarking in tamper-resistant hardware. |
ACM Multimedia Workshops |
2000 |
DBLP DOI BibTeX RDF |
multimedia content protection, tamper-resistant hardware, watermarking technology, public key cryptography |
25 | E. Strother |
Denial of Service Protection - The Nozzle. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
denial of service protection, nozzle, domain name server, network pumps, untrusted user, trusted traffic, packet placement, protocols, protocol, intrusion detection, computer networks, Web server, firewalls, cost, authorisation, telecommunication security, network resource |
25 | Ton Kalker |
System Issues in Digital Image and Video Watermarking for Copy Protection. |
ICMCS, Vol. 1 |
1999 |
DBLP DOI BibTeX RDF |
Watermarking, Copy Protection, DVD |
25 | João Carlos Cunha, João Gabriel Silva |
DELFIM: Error Detection by Thin Memory Protection. |
EUROMICRO |
1996 |
DBLP DOI BibTeX RDF |
thin memory protection, VME standard board, detection capability, DELFIM, error detection, error detection, concurrent error detection, error recovery, fault tolerant system |
25 | Kari Kuutti, Jaakko Virkkunen |
Organisational memory and learning network organisation: the case of Finnish labour protection inspectors. |
HICSS (4) |
1995 |
DBLP DOI BibTeX RDF |
learning network organisation, Finnish labour protection inspectors, work orientation, work organization, management, learning systems, organisational memory, computer tool |
24 | Osameh M. Al-Kofahi, Ahmed E. Kamal 0001 |
Network coding-based protection of many-to-one wireless flows. |
IEEE J. Sel. Areas Commun. |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Toby Xu, Ying Cai |
Feeling-based location privacy protection for location-based services. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
feeling-based privacy model, k-anonymity model, trajectory cloaking, location-based services, location privacy |
24 | Yang Zhan 0002, Haibo Tian, Qingqi Pei, Yueyu Zhang, Yumin Wang, Weidong Zhang |
A Deep Copy Protection Framework for Electronic Devices within Home. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Yonghong Sheng, Dongsheng Wang 0002, Jinyang He, Dapeng Ju |
TH-CDP: An Efficient Block Level Continuous Data Protection System. |
NAS |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy |
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels. |
TRUST |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Hassan Mansour, Panos Nasiopoulos, Vikram Krishnamurthy |
Real-time joint rate and protection allocation for multi-user scalable video streaming. |
PIMRC |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Nelly Fazio, Dulce B. Ponceleon |
Tutorial on content protection. |
ACM Multimedia |
2008 |
DBLP DOI BibTeX RDF |
4c, aacs, blu-ray disc, broadcast encryption, traitor tracing |
24 | Ruiqin Xiong, David S. Taubman |
Optimal LR-PET protection for scalable video streams over lossy channels with random delay. |
MMSP |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Caroline Rocha, Brigitte Jaumard |
Revisiting p-Cycles / FIPP p-Cycles vs. Shared Link / Path Protection. |
ICCCN |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Piotr Cofta |
Confidence-Compensating Privacy Protection. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Changcheng Huang, Minzhe Li, Anand Srinivasan |
A Scalable Path Protection Mechanism for Guaranteed Network Reliability Under Multiple Failures. |
IEEE Trans. Reliab. |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Hongbin Luo, Lemin Li, Hongfang Yu, Sheng Wang 0006 |
Achieving Shared Protection for Dynamic Multicast Sessions in Survivable Mesh WDM Networks. |
IEEE J. Sel. Areas Commun. |
2007 |
DBLP DOI BibTeX RDF |
|
24 | John Doucette 0001, Wayne D. Grover, Peter A. Giese |
Physical-Layer p-Cycles Adapted for Router-Level Node Protection: A Multi-Layer Design and Operation Strategy. |
IEEE J. Sel. Areas Commun. |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Anna Urra, Eusebi Calle, José-Luis Marzo, Pere Vilà |
Incorporating Protection Mechanisms in the Dynamic Multi-layer Routing Schemes. |
Networking |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Xu Shao, Luying Zhou, Weiguo Zheng, Yixin Wang |
Providing Differentiated Quality-of-Protection for Surviving Double-Link Failures in WDM Mesh Networks. |
ICC |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Hirokazu Ozaki, Atsushi Kara |
Computing the Availability and MTTF of Shared Protection Systems. |
CIT |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Balachander Krishnamurthy, Delfina Malandrino, Craig E. Wills |
Measuring privacy loss and the impact of privacy protection in web browsing. |
SOUPS |
2007 |
DBLP DOI BibTeX RDF |
privacy, web |
24 | Nicholas Paul Sheppard |
On implementing mpeg-21 intellectual property management and protection. |
Digital Rights Management Workshop |
2007 |
DBLP DOI BibTeX RDF |
MPEG REL, MPEG-21 IPMP, implementation, digital rights management |
24 | Xiaosong Lou, Kai Hwang 0001, Runfang Zhou |
Integrated Copyright Protection in Peer-to-Peer Networks. |
ICDCS Workshops |
2007 |
DBLP DOI BibTeX RDF |
Internet content delivery systems, peer collusion, content poisoning, reputation systems and digital right management, Peer-to-Peer systems |
24 | Shahram Shah-Heydari, Oliver W. W. Yang |
Performance study of self-repairing unicast hierarchical protection trees in mesh networks. |
BROADNETS |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Rance J. DeLong, Thuy D. Nguyen, Cynthia E. Irvine, Timothy E. Levin |
Toward a Medium-Robustness Separation Kernel Protection Profile. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Ram Kumar 0001, Akhilesh Singhania, Andrew Castner, Eddie Kohler, Mani B. Srivastava |
A System For Coarse Grained Memory Protection In Tiny Embedded Processors. |
DAC |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Wen-Nung Lie, Guo-Shiang Lin, Sheng-Lung Cheng |
Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques. |
IEEE Trans. Inf. Forensics Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Yu Lin, Haitham S. Hamza, Jitender S. Deogun |
Designing Fast and Bandwidth Efficient Protection Scheme for WDM Optical Networks. |
Networking |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Soo-Cheol Kim, Sang-Soo Yeo, Sung Kwon Kim |
MARP: Mobile Agent for RFID Privacy Protection. |
CARDIS |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Ronghui Tu, Feiyuan Wang, Jiying Zhao, Abdulmotaleb El-Saddik |
Copyright Protection ofWeb Applications throughWatermarking. |
ICICIC (3) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Lin Yuan, Gang Qu 0001, Lahouari Ghouti, Ahmed Bouridane |
VLSI Design IP Protection: Solutions, New Challenges, and Opportunities. |
AHS |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Syed Muhammad Atif Saleem, Adel M. Sharaf |
Ultra High Speed Protection of Series Compensated Transmission Lines using Wavelet Transforms. |
CCECE |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Saurav Das, Jaedon Kim, David Gutierrez, Leonid G. Kazovsky, Richard Rabbat, Ching-Fong Su, Takeo Hamada |
Protection and Spatial Reuse in Optical Burst Transport (OBT) Networks. |
BROADNETS |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Kemal Altinkemer, Junwei Guan, Aysegül Sahin |
Online software distribution without enforcing copy protection as a strategic weapon. |
Inf. Syst. E Bus. Manag. |
2005 |
DBLP DOI BibTeX RDF |
|
24 | David S. Taubman, Johnson Thie |
Optimal erasure protection for scalably compressed video streams with limited retransmission. |
IEEE Trans. Image Process. |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Tong Gan, Kai-Kuang Ma |
Weighted unequal error protection for transmitting scalable object-oriented images over packet-erasure networks. |
IEEE Trans. Image Process. |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Wei Hu |
Using Logical Data Protection and Recovery to Improve Data Availability. |
ISAS |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Claus G. Gruber |
A Comparison on Bandwidth Requirements of Path Protection Mechanisms. |
ICN (1) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Wojciech Molisz, Jacek Rak |
Region Protection/Restoration Scheme in Survivable Networks. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Pin-Han Ho, János Tapolcai, Hussein T. Mouftah |
On achieving optimal survivable routing for shared protection in survivable next-generation Internet. |
IEEE Trans. Reliab. |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Hassan Naser, Hussein T. Mouftah |
A multilayer differentiated protection services architecture. |
IEEE J. Sel. Areas Commun. |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Xuxian Jiang, Dongyan Xu, Rudolf Eigenmann |
Protection mechanisms for application service hosting platforms. |
CCGRID |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Lin Yuan, Pushkin R. Pari, Gang Qu 0001 |
Soft IP Protection: Watermarking HDL Codes. |
Information Hiding |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Sung-Hyun Yun, Hyung-Woo Lee |
The Undeniable Multi-signature Scheme Suitable for Joint Copyright Protection on Digital Contents. |
PCM (3) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Luisa Franconi, Julian Stander |
Spatial and non-spatial model-based protection procedures for the release of business microdata. |
Stat. Comput. |
2003 |
DBLP DOI BibTeX RDF |
Community Innovation Survey, conditional autoregressive scheme, performance assessment for disclosure limitation methods, confidentiality, Gibbs sampler |
24 | Fabio Ricciato, Marco Listanti, Angelo Belmonte, Daniele Perla |
Performance Evaluation of a Distributed Scheme for Protection against Single and Double Faults for MPLS. |
QoS-IP |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Haigang Feng, Rouying Zhan, Qiong Wu 0013, Guang Chen, Xiaokang Guan, Haolu Xie, Albert Z. Wang |
Mixed-mode ESD protection circuit simulation-design methodology. |
ISCAS (4) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Mladen Kezunovic |
Data Integration and Information Exchange for Enhanced Control and Protection of Power Systems. |
HICSS |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Michael K. Reiter, Asad Samar, Chenxi Wang |
The Design and Implementation of a JCA-Compliant Capture Protection Infrastructure. |
SRDS |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Ramesh A. Dandekar, Michael Cohen, Nancy Kirkendall |
Sensitive Micro Data Protection Using Latin Hypercube Sampling Technique. |
Inference Control in Statistical Databases |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Heun Kim, Dae-Joon Hwang |
A Study on the System Call for the Protection of Intellectual Property Rights on Linux Base. |
PRDC |
2001 |
DBLP DOI BibTeX RDF |
IPR, systemcall, hooking, RPLA, kernel |
24 | Michael Golm, Jürgen Kleinöder, Frank Bellosa |
Beyond Address Spaces - Flexibility, Performance, Protection, and Resource Management in the Type-Safe JX Operating System. |
HotOS |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Christopher Metz 0001 |
On the Wire: IP Protection and Restoration. |
IEEE Internet Comput. |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Giovanni Iachello, Kai Rannenberg |
Protection Profiles for Remailer Mixes. |
Workshop on Design Issues in Anonymity and Unobservability |
2000 |
DBLP DOI BibTeX RDF |
|
Displaying result #301 - #400 of 22913 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|