The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase B-rep (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1974-1991 (17) 1992-1996 (46) 1997 (39) 1998 (55) 1999 (37) 2000 (34) 2001 (45) 2002 (29) 2003 (44) 2004 (37) 2005 (43) 2006 (44) 2007 (49) 2008 (49) 2009 (42) 2010 (35) 2011 (37) 2012 (21) 2013 (34) 2014 (20) 2015 (22) 2016 (23) 2017 (30) 2018 (31) 2019 (39) 2020-2021 (23) 2022 (20) 2023 (27) 2024 (5)
Publication types (Num. hits)
article(791) incollection(3) inproceedings(181) phdthesis(1) proceedings(1)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 166 occurrences of 132 keywords

Results
Found 979 publication records. Showing 977 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
16Ge Zhang, Yacine Rebahi Side effects of identity management in SIP VoIP environment. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Paul Andrew Watters, Robert Layton, Richard Dazeley How much material on BitTorrent is infringing content? A case study. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Gaurav Gupta 0002, Josef Pieprzyk, Len Hamey Bucket attack on numeric set watermarking model and safeguards. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16David Teneyuca Internet cloud security: The illusion of inclusion. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Gaurav Gupta 0002, Josef Pieprzyk Socio-technological phishing prevention. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16André van Cleeff, Wolter Pieters, Roel J. Wieringa, Frits van Tiel Integrated assessment and mitigation of physical and digital security threats: Case studies on virtualization. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Zaheer Ahmad, Keith Mayes, Song Dong, Konstantinos Markantonakis Considerations for mobile authentication in the Cloud. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Paul G. Dorey, Armando Leite Commentary: Cloud computing - A security problem or solution? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Mofakharul Islam, Paul Andrew Watters, John Yearwood Real-time detection of children's skin on social networking sites using Markov random field modelling. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Claudio Mazzariello, Paolo De Lutiis, Dario Lombardo Clustering NGN user behavior for anomaly detection. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Stephen D. Wolthusen Next generation networks. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Piers Wilson Positive perspectives on cloud security. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Ethel Quayle, Max Taylor Social networking as a nexus for engagement and exploitation of young people. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Paul A. Watters Social networking threats. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Man Qi, Denis Edgar-Nevill Social networking searching and privacy issues. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Shin-Cheng Mu, Conor McBride, Stephanie Weirich Dependently Typed Programming (NII Shonan Meeting 2011-3). Search on Bibsonomy NII Shonan Meet. Rep. The full citation details ... 2011 DBLP  BibTeX  RDF
16Katsuhisa Horimoto, Katsumi Inoue, Oliver Ray International Symposium on Symbolic Systems Biology (NII Shonan Meeting 2011-7). Search on Bibsonomy NII Shonan Meet. Rep. The full citation details ... 2011 DBLP  BibTeX  RDF
16Naoki Kobayashi 0001, Luke Ong, David Van Horn Automated Techniques for Higher-Order Program Verification (NII Shonan Meeting 2011-5). Search on Bibsonomy NII Shonan Meet. Rep. The full citation details ... 2011 DBLP  BibTeX  RDF
16Peter Dybjer, Yoshiki Kinoshita, Shin-Cheng Mu Agda Implementors Meeting (NII Shonan Meeting 2011-2). Search on Bibsonomy NII Shonan Meet. Rep. The full citation details ... 2011 DBLP  BibTeX  RDF
16Gerard J. Milburn, Jörg Schmiedmayer, Yasuhiro Tokura, Kae Nemoto Hybrid Quantum Devices (NII Shonan Meeting 2011-6). Search on Bibsonomy NII Shonan Meet. Rep. The full citation details ... 2011 DBLP  BibTeX  RDF
16Sadao Kurohashi, Akihiro Yamamoto, Kentaro Inui, Sebastian Riedel 0001 Knowledge-leveraged Computational Thinking through Natural Language Processing and Statistical Logic (NII Shonan Meeting 2011-4). Search on Bibsonomy NII Shonan Meet. Rep. The full citation details ... 2011 DBLP  BibTeX  RDF
16Satoru Iwata 0001, Ken-ichi Kawarabayashi Graph Algorithm and Combinatorial Optimization (NII Shonan Meeting 2011-1). Search on Bibsonomy NII Shonan Meet. Rep. The full citation details ... 2011 DBLP  BibTeX  RDF
16Andy Jones, Thomas Anthony Martin Digital forensics and the issues of identity. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Marc Langheinrich, Günter Karjoth Social networking and the risk to companies and institutions. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Dimitrios Patsos, Chez Ciechanowicz, Fred Piper The status of National PKIs - A European overview. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16George French, Mike Bond Caveat venditor. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Steven M. Furnell Online identity: Giving it all away? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Sriramkrishnan Srinivasan Identity based encryption: Progress and challenges. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Alexander W. Dent Choosing key sizes for cryptography. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Chez Ciechanowicz Protocols and cryptography. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Kuheli Roy Sarkar Assessing insider threats to information security using technical, behavioural and organisational measures. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Chez Ciechanowicz Identity Theft and Reconstruction. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Gunnar Peterson From auditor-centric to architecture-centric: SDLC for PCI DSS. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Claire Elliott Botnets: To what extent are they a threat to information security? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16J. Andrew Valentine Compliance complacency: How 'check-box' compliancy remains a pitfall for many organizations worldwide. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Keith Mayes, Carlos Cid The MIFARE Classic story. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Georges Ataya PCI DSS audit and compliance. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Allan Tomlinson, Po-Wah Yau, John A. MacDonald Privacy threats in a mobile enterprise social network. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16William Walker Mobile telephony security compromises. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16John Austen Computer crime - A 2011 update. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Jeff Tutton Incident response and compliance: A case study of the recent attacks. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Karen Lawrence Öqvist The art of alchemy. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Branden R. Williams How tokenization and encryption can enable PCI DSS compliance. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Chris Sundt Cryptography in the real world. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Kim-Kwang Raymond Choo High tech criminal threats to the national information infrastructure. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Karen Lawrence Öqvist Fool's gold. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16André Mariën Matchmaking between PCI-DSS and Security. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Jeremy Hilton Improving the secure management of personal data: Privacy on-line IS important, but it's not easy. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Igor Muttik, Chris Barton Cloud security technologies. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Damien Sauveron Multiapplication smart card: Towards an open smart card? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Jo Bryce, Mathias Klang Young people, disclosure of personal information and online privacy: Control, choice and consequences. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Xuefei Leng Smart card applications and security. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Lizzie Coles-Kemp The changing shape of privacy and consent. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Serge Chaumette, Damien Sauveron Smart cards and remote computing: Interaction or convergence? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Steven M. Furnell The irreversible march of technology. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Shirin Elahi Privacy and consent in the digital era. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Martin Smith Changing staff behaviour. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Louise Bennett Reflections on privacy, identity and consent in on-line services. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Andrew Churchill 'Privacy and public policy delivery - Dichotomy or design'. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Tony Boswell Smart card security evaluation: Community solutions to intractable problems. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Theodosios Tsiakis Contribution of corporate social responsibility to information security management. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16David G. W. Birch Victorian values: Politicians and the public incorrectly see security and privacy as opposites. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Mete Eminagaoglu, Erdem Uçar, Saban Eren The positive outcomes of information security awareness training in companies - A case study. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Robin Wilton What's happened to PETs? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Asaf Shabtai, Robert Moskovitch, Yuval Elovici, Chanan Glezer Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Wolfgang Rankl How to defend against smartcard attacks - Or the amazing number of different ways to check a PIN securely. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Lizzie Coles-Kemp Information security management: An entangled research challenge. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Geordie Stewart A safety approach to information security communications. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Sameera Mubarak, Jill Slay Protecting clients from insider attacks on trust accounts. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Sami Rautiainen A look at Portable Document Format vulnerabilities. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Nazir A. Malik, Allan Tomlinson Privacy and consent in pervasive networks. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Carl Colwill Human factors in information security: The insider threat - Who can you trust these days? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Andrew Jones 0002 How do you make information security user friendly? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Danijela Bogdanovic, Conn Crawford, Lizzie Coles-Kemp The need for enhanced privacy and consent dialogues. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Ingo Liersch Electronic passports - from secure specifications to secure implementations. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Edgar A. Whitley Informational privacy, consent and the "control" of personal data. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Keith Mayes, Konstantinos Markantonakis, Gerhard P. Hancke 0002 Transport ticketing security and fraud controls. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Michael J. Ganley Introduction to this issue. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Konstantinos Markantonakis, Michael Tunstall, Gerhard P. Hancke 0002, Ioannis G. Askoxylakis, Keith Mayes Attacking smart card systems: Theory and practice. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16David Harley Making sense of anti-malware comparative testing. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Terrence Walker Practical management of malicious insider threat - An enterprise CSIRT perspective. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Lizzie Coles-Kemp Introduction. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Michael J. Ganley Introduction to this issue. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Rene Mayrhofer, Hans Gellersen Spontaneous mobile device authentication based on sensor data. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Christian W. Probst, René Rydhof Hansen An extensible analysable system model. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Mason Brown, Alan Paller Secure software development: Why the development world awoke to the challenge. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Nai-Wei Lo, Kuo-Hui Yeh, Chan Yeob Yeun New mutual agreement protocol to secure mobile RFID-enabled devices. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Edward Humphreys Information security management standards: Compliance, governance and risk management. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16John A. MacDonald Authentication & key agreement for off-portal mobile applications. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Geraint Price The benefits and drawbacks of using electronic identities. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Thomas Myhr Legal and organizational challenges and solutions for achieving a pan-European electronic ID solution: or I am 621216-1318, but I am also 161262-43774. Do you know who I am? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Lieven Desmet, Wouter Joosen, Fabio Massacci, Pieter Philippaerts, Frank Piessens, Ida Sri Rejeki Siahaan, Dries Vanoverberghe Security-by-contract on the .NET platform. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Chan Yeob Yeun, Kyusuk Han, Duc-Liem Vo, Kwangjo Kim Secure authenticated group key agreement protocol in the MANET environment. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Tony Collings Some thoughts on the underlying logic and process underpinning Electronic Identity (e-ID). Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Iain Crinson Assessing the 'insider-outsider threat' duality in the context of the development of public-private partnerships delivering 'choice' in healthcare services: A sociomaterial critique. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Brian Chess, Jacob West Dynamic taint propagation: Finding vulnerabilities without attacking. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Andy Jones Catching the malicious insider. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Paul de Hert Identity management of e-ID, privacy and security in Europe. A human rights view. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Danny De Cock, Koen Simoens, Bart Preneel Insights on identity documents based on the Belgian case study. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Siddhartha Arora National e-ID card schemes: A European overview. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 977 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license