|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1928 occurrences of 929 keywords
|
|
|
Results
Found 2507 publication records. Showing 2507 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Penny Duquenoy, Carlisle Eldwidge George, Anthony Solomonides |
What ELSE? Regulation and Compliance in Medical Imaging and Medical Informatics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIMI ![In: Medical Imaging and Informatics, 2nd International Conference, MIMI 2007, Beijing, China, August 14-16, 2007, Revised Selected Papers, pp. 340-357, 2007, Springer, 978-3-540-79489-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Ethical principles, material quality, electronic medical data, shared data processing, shared access, jurisdictional responsibility, usability, accessibility, data integrity, training, confidentiality, data protection, standardisation, informed consent |
15 | Anindya Banerjee 0001, David A. Naumann, Stan Rosenberg |
Towards a logical account of declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, PLAS 2007, San Diego, California, USA, June 14, 2007, pp. 61-66, 2007, ACM, 978-1-59593-711-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
information flow, confidentiality, aliasing |
15 | Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl |
An Information Flow Verifier for Small Embedded Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings, pp. 189-201, 2007, Springer, 978-3-540-72353-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
class loading, information flow, confidentiality, type checking |
15 | Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl |
Embedding verifiable information flow analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 39, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
embedded systems, static analysis, information flow, confidentiality, language-based security, smart objects |
15 | Merv Matson, Mihaela Ulieru |
The 'how' and 'why' of persistent information security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 56, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
avaliability, emergency response operations, information custodian, infosec, persistent information security, integrity, information security, confidentiality, digital rights management, DRM |
15 | Michael Boyle, Saul Greenberg |
The language of privacy: Learning from video media space analysis and design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Hum. Interact. ![In: ACM Trans. Comput. Hum. Interact. 12(2), pp. 328-370, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
environmental psychology, solitude, video media spaces, privacy, Human-computer interaction, computer-supported cooperative work (CSCW), user interface design, social interaction, confidentiality, autonomy |
15 | Qingfeng Chen, Chengqi Zhang, Shichao Zhang 0001 |
ENDL: A Logical Framework for Verifying Secure Transaction Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Inf. Syst. ![In: Knowl. Inf. Syst. 7(1), pp. 84-109, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Secure transaction protocol, Security, Verification, Integrity, Electronic commerce, Confidentiality |
15 | Béatrice Finance, Saïda Medjdoub, Philippe Pucheral |
The case for access control on XML relationships. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31 - November 5, 2005, pp. 107-114, 2005, ACM, 1-59593-140-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
XML relationship, need-to-know and consent principles, data confidentiality, XML access control |
15 | Gilles Barthe, Tamara Rezk |
Non-interference for a JVM-like language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TLDI ![In: Proceedings of TLDI'05: 2005 ACM SIGPLAN International Workshop on Types in Languages Design and Implementation, Long Beach, CA, USA, January 10, 2005, pp. 103-112, 2005, ACM, 1-58113-999-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
type systems, confidentiality, low level languages |
15 | Rachid Echahed, Frédéric Prost |
Security policy in a declarative style. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPDP ![In: Proceedings of the 7th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, July 11-13 2005, Lisbon, Portugal, pp. 153-163, 2005, ACM, 1-59593-090-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
confidentiality, non-interference |
15 | Arun Subbiah, Douglas M. Blough |
An approach for fault tolerant and secure data storage in collaborative work environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
StorageSS ![In: Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005, pp. 84-93, 2005, ACM, 1-59593-233-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
replication, secret sharing, confidentiality, collaborative environments, Byzantine fault tolerance, distributed data storage |
15 | Vishal Kher, Yongdae Kim |
Securing distributed storage: challenges, techniques, and systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
StorageSS ![In: Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005, pp. 9-25, 2005, ACM, 1-59593-233-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, intrusion detection, integrity, authorization, confidentiality |
15 | Krishnamurty Muralidhar, Rathindra Sarathy |
A theoretical basis for perturbation methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Stat. Comput. ![In: Stat. Comput. 13(4), pp. 329-335, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
statistical disclosure limitation, confidentiality, perturbation, disclosure risk, data masking |
15 | Menno Cuppen, Leon Willenborg |
Source Data Perturbation and consistent sets of safe tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Stat. Comput. ![In: Stat. Comput. 13(4), pp. 355-362, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
table protection, confidentiality, data warehousing, disclosure, noise addition |
15 | Krishnamurty Muralidhar, Rathindra Sarathy |
A rejoinder to the comments by Polettini and Stander. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Stat. Comput. ![In: Stat. Comput. 13(4), pp. 339-342, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
statistical disclosure limitation, confidentiality, perturbation, disclosure risk, data masking |
15 | Luisa Franconi, Julian Stander |
Spatial and non-spatial model-based protection procedures for the release of business microdata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Stat. Comput. ![In: Stat. Comput. 13(4), pp. 295-305, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Community Innovation Survey, conditional autoregressive scheme, performance assessment for disclosure limitation methods, confidentiality, Gibbs sampler |
15 | Jerome P. Reiter |
Model Diagnostics for Remote Access Regression Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Stat. Comput. ![In: Stat. Comput. 13(4), pp. 371-380, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
regression, confidentiality, diagnostics, remote access, disclosure, synthetic data |
15 | Barry Schouten, Marc Cigrang |
Remote access systems for statistical analysis of microdata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Stat. Comput. ![In: Stat. Comput. 13(4), pp. 381-389, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
confidentiality, remote access, remote execution, microdata |
15 | Roberto Di Pietro, Antonio Durante, Luigi V. Mancini |
A Reliable Key Authentication Schema for Secure Multicast Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 6-8 October 2003, Florence, Italy, pp. 231-240, 2003, IEEE Computer Society, 0-7695-1955-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Secure multicast communications, logical key hierarchy, re-keying, security, authenticity, confidentiality, key distribution, group key management |
15 | Jill Lynn Tyler |
The Healthcare Information Technology Context: A Framework for Viewing Legal Aspects of Telemedicine and Teleradiology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 34th Annual Hawaii International Conference on System Sciences (HICSS-34), January 3-6, 2001, Maui, Hawaii, USA, 2001, IEEE Computer Society, 0-7695-0981-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Healthcare informatics, medical data transfer, adoption barriers, privacy, standards, information technology, confidentiality, telemedicine, data security, teleradiology, radiology, legal issues, medical records |
15 | Refik Molva, Alain Pannetrat |
Scalable multicast security with dynamic recipient groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 3(3), pp. 136-160, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
scalability, RSA, group communications, confidentiality, key distribution, Diffie-Hellman |
15 | Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam |
Secure group communications using key graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 8(1), pp. 16-30, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
security, privacy, multicast, group communications, confidentiality, key distribution, group key management, rekeying |
15 | Edgar R. Weippl |
Coimbra: secure Web access to multimedia content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia Workshops ![In: Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30 - November 3, 2000, pp. 145-148, 2000, ACM Press, 1-58113-311-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
encryption, confidentiality, security model, discretionary access control |
15 | Dale M. Johnson, Lee A. Benzinger |
Layering Boundary Protections: An Experiment in Information Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 60-66, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
DARPA Information Assurance Program, boundary protection layering, attack protection, experiment, security of data, data security, client-server systems, client server system, data privacy, data confidentiality |
15 | Erland Jonsson |
An Integrated Framework for Security and Dependability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on New Security Paradigms ![In: Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998, pp. 22-29, 1998, ACM, 1-58113-168-2. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
modellings, measure, dependability, computer security, confidentiality, concepts |
15 | Aris Zakinthinos, E. Stewart Lee |
A General Theory of Security Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 94-102, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
possibilistic security properties, low level event sequence, security predicate, high level users, low level users, Selective Interleaving Functions framework, information theory, information flow, security of data, partial ordering, data confidentiality, event systems |
15 | Roshan K. Thomas, Ravi S. Sandhu |
A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 8(1), pp. 16-31, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
secure write-up, trusted subject architecture, confidentiality proof, object-oriented databases, covert channels, Multilevel security |
15 | Jan Schlörer |
Security of Statistical Databases: Multidimensional Transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 6(1), pp. 95-112, 1981. The full citation details ...](Pics/full.jpeg) |
1981 |
DBLP DOI BibTeX RDF |
security, database, confidentiality, database security, statistical database, matrices |
15 | Dorothy E. Denning |
Secure Statistical Databases with Random Sample Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 5(3), pp. 291-315, 1980. The full citation details ...](Pics/full.jpeg) |
1980 |
DBLP DOI BibTeX RDF |
sampling, confidentiality, database security, statistical database, disclosure controls |
15 | Dorothy E. Denning, Jan Schlörer |
A Fast Procedure for Finding a Tracker in a Statistical Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 5(1), pp. 88-102, 1980. The full citation details ...](Pics/full.jpeg) |
1980 |
DBLP DOI BibTeX RDF |
confidentiality, data security, database security, statistical database, tracker |
15 | Dorothy E. Denning, Peter J. Denning, Mayer D. Schwartz |
The Tracker: A Threat to Statistical Database Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 4(1), pp. 76-96, 1979. The full citation details ...](Pics/full.jpeg) |
1979 |
DBLP DOI BibTeX RDF |
secure query functions, confidentiality, data security, database security, statistical database, tracker |
15 | Mayer D. Schwartz, Dorothy E. Denning, Peter J. Denning |
Linear Queries in Statistical Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 4(2), pp. 156-167, 1979. The full citation details ...](Pics/full.jpeg) |
1979 |
DBLP DOI BibTeX RDF |
linear query, secure query functions, statical database, inference, confidentiality, data security, database security |
14 | |
To change the world, take a chance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 54(1), pp. 6-7, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
14 | |
UX design and agile: a natural fit? (Talking with Julian Gosper, Jean-Luc Agathos, Richard Rutter, and Terry Coatta). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 54(1), pp. 54-60, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
14 | |
In the Virtual Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 54(1), pp. 8, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
14 | Ashish Kundu, Elisa Bertino |
How to authenticate graphs without leaking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: EDBT 2010, 13th International Conference on Extending Database Technology, Lausanne, Switzerland, March 22-26, 2010, Proceedings, pp. 609-620, 2010, ACM, 978-1-60558-945-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
14 | Aameek Singh, Mudhakar Srivatsa, Ling Liu 0001 |
Search-as-a-service: Outsourced search over outsourced storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Web ![In: ACM Trans. Web 3(4), pp. 13:1-13:33, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Search-as-a-Service, access control aware search, cloud search, cloud storage |
14 | Xiaojun Tang 0001, Ruoheng Liu, Predrag Spasojevic, H. Vincent Poor |
On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 55(4), pp. 1575-1591, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Llanos Tobarra, Diego Cazorla, Fernando Cuartero, Gregorio Díaz 0001, María-Emilia Cambronero |
Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 40(3-4), pp. 91-99, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
AVISPA toolbox, Model checking, Security protocols, Wireless sensor |
14 | Yun Li 0011, Leron Lightfoot, Jian Ren 0001 |
Routing-based source-location privacy protection in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIT ![In: 2009 IEEE International Conference on Electro/Information Technology, EIT 2009, Windsor, Ontario, Canada, June 7-9, 2009, pp. 29-34, 2009, IEEE, 978-1-4244-3355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Christos Ioannidis, David J. Pym, Julian Williams |
Investments and Trade-offs in the Economics of Information Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers, pp. 148-166, 2009, Springer. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Rui Zhang 0007, Jing Shi 0002, Yanchao Zhang |
Secure multidimensional range queries in sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHoc ![In: Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2009, New Orleans, LA, USA, May 18-21, 2009, pp. 197-206, 2009, ACM, 978-1-60558-531-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multidimensional range query, security, sensor networks |
14 | Joachim Biskup, Jan-Hendrik Lochner, Sebastian Sonntag |
Optimization of the Controlled Evaluation of Closed Relational Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings, pp. 214-225, 2009, Springer, 978-3-642-01243-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Vik Tor Goh, Jacob Zimmermann, Mark Looi |
Towards Intrusion Detection for Encrypted Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 540-545, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Jeff Sedayao, Steven Su, Xiaohao Ma, Minghao Jiang, Kai Miao |
A Simple Technique for Securing Data at Rest Stored in a Computing Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CloudCom ![In: Cloud Computing, First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009. Proceedings, pp. 553-558, 2009, Springer, 978-3-642-10664-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Data at Rest Storage, Security, Cloud Computing, Encryption, PlanetLab |
14 | Ravi Akella, Bruce M. McMillin |
Model-Checking BNDC Properties in Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 1, pp. 660-663, 2009, IEEE Computer Society, 978-0-7695-3726-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Mohsen Toorani, Ali Asghar Beheshti Shirazi |
A directly public verifiable signcryption scheme based on elliptic curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), July 5-8, Sousse, Tunisia, pp. 713-716, 2009, IEEE Computer Society, 978-1-4244-4672-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Avraham Shinnar, Marco Pistoia, Anindya Banerjee 0001 |
A language for information flow: dynamic tracking in multiple interdependent dimensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, PLAS 2009, Dublin, Ireland, 15-21 June, 2009, pp. 125-131, 2009, ACM, 978-1-60558-645-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
information flow control, declassification, security type system |
14 | Jim E. Smith, Alistair R. Clark, Andrea T. Staggemeier |
A genetic approach to statistical disclosure control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2009, Proceedings, Montreal, Québec, Canada, July 8-12, 2009, pp. 1625-1632, 2009, ACM, 978-1-60558-325-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
statistical disclosure control |
14 | Chaoting Xuan, John A. Copeland, Raheem A. Beyah |
Shepherding Loadable Kernel Modules through On-demand Emulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings, pp. 48-67, 2009, Springer, 978-3-642-02917-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Rootkit Prevention, On-demand Emulation, Emulator, Virtual Machine Monitor |
14 | S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan |
Identity Based Aggregate Signcryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings, pp. 378-397, 2009, Springer, 978-3-642-10627-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Aggregate Signcryption, Provable Security, Bilinear Pairings, Random Oracle Model, Identity Based Cryptography |
14 | Takahiro Matsuda 0002, Kanta Matsuura, Jacob C. N. Schuldt |
Efficient Constructions of Signcryption Schemes and Signcryption Composability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings, pp. 321-342, 2009, Springer, 978-3-642-10627-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multi-user security, signcryption, generic construction |
14 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 61-75, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Multi-Signcryption, Cryptanalysis, Provable Security, Bilinear Pairing, Signcryption, Random Oracle Model, Identity Based Cryptography |
14 | Lander Casado, Philippas Tsigas |
ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings, pp. 133-147, 2009, Springer, 978-3-642-04765-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks Security, Link Layer Security |
14 | Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Basney, Himanshu Khurana |
Usable secure mailing lists with untrusted servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2009, Proceedings of the 8th Symposium on Identity and Trust on the Internet, April 14-16, 2009, Gaithersburg, Maryland, USA, pp. 103-116, 2009, ACM, 978-1-60558-474-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
e-mail list security, usability study, proxy re-encryption |
14 | Alexander Yip, Neha Narula, Maxwell N. Krohn, Robert Tappan Morris |
Privacy-preserving browser-side scripting with BFlow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, pp. 233-246, 2009, ACM, 978-1-60558-482-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
javascript, labels, information flow control, web platforms |
14 | Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole Bai, Dong Xuan |
Link-layer protection in 802.11i WLANS with dummy authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 131-138, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
dummy authentication, security, wlan, open access |
14 | Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Marcel Winandy, Rani Husseiki, Christian Stüble |
Flexible and secure enterprise rights management based on trusted virtual domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008, pp. 71-80, 2008, ACM, 978-1-60558-295-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
enterprise rights management (ERM), trusted virtual domain (TVD), security policy, trusted computing |
14 | Chris Kürschner, Cosmin Condea, Oliver Kasten, Frédéric Thiesse |
Discovery Service Design in the EPCglobal Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IOT ![In: The Internet of Things, First International Conference, IOT 2008, Zurich, Switzerland, March 26-28, 2008. Proceedings, pp. 19-34, 2008, Springer, 978-3-540-78730-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Vineela Devarashetty, Jeffrey J. P. Tsai, Lu Ma, Du Zhang |
Modeling a secure sensor network system using an Extended Elementary Object System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE ICCI ![In: Proceedings of the Seventh IEEE International Conference on Cognitive Informatics, ICCI 2008, Stanford University, California, USA, August 14-16, 2008, pp. 67-74, 2008, IEEE Computer Society, 978-1-4244-2538-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Stephen Chong, Andrew C. Myers |
End-to-End Enforcement of Erasure and Declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008, pp. 98-111, 2008, IEEE Computer Society, 978-0-7695-3182-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Erasure, Expressive security policies, Information flow, Language-based security, Noninterference, Declassification |
14 | Stéphane Onno |
A Federated Physical and Logical Access Control Enforcement Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 683-692, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control federation, logical access control, physical access control, Bell-lapadula |
14 | Raylin Tso |
Signcryption Scheme with Standardized Verification Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 1369-1374, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Peter Christen |
Geocode Matching and Privacy Preservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PinKDD ![In: Privacy, Security, and Trust in KDD, Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, NV, USA, August 24, 2008, Revised Selected Papers, pp. 7-24, 2008, Springer, 978-3-642-01717-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy preservation, secure multi-party computations, record linkage, entity resolution, geocoding, Data matching |
14 | Matthias Werner 0001, Michael A. Jaeger, Helge Parzyjegla |
An Application of the (max, +) Algebra to Information Flow Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Seventh International Conference on Networking (ICN 2008), 13-18 April 2008, Cancun, Mexico, pp. 262-266, 2008, IEEE Computer Society, 978-0-7695-3106-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
maxplus, security, information flow, lattice model |
14 | Benoît Badrignans, Reouven Elbaz, Lionel Torres |
Secure update Mechanism for Remote Update of FPGA-Based System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIES ![In: IEEE Third International Symposium on Industrial Embedded Systems, SIES 2008, Montpellier / La Grande Motte, France, June 11-13, 2008, pp. 221-224, 2008, IEEE, 978-1-4244-1994-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Muzammil Khan, Attiq Ahmed, Ahmad Raza Cheema |
Vulnerabilities of UMTS Access Domain Security Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 350-355, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
UMTS vulnerabilities, DoS attacks on UMTS, Security, UMTS |
14 | S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan |
Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers, pp. 115-129, 2008, Springer, 978-3-642-00305-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Provable Security, Bilinear Pairing, Broadcast Encryption, Signcryption, Random Oracle, ID-based Cryptosystem |
14 | Rohit Chadha, Carl A. Gunter, José Meseguer 0001, Ravinder Shankesi, Mahesh Viswanathan 0001 |
Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMOODS ![In: Formal Methods for Open Object-Based Distributed Systems, 10th IFIP WG 6.1 International Conference, FMOODS 2008, Oslo, Norway, June 4-6, 2008, Proceedings, pp. 39-58, 2008, Springer, 978-3-540-68862-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Giovanni Russello, Changyu Dong, Naranker Dulay, Michel R. V. Chaudron, Maarten van Steen |
Encrypted Shared Data Spaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COORDINATION ![In: Coordination Models and Languages, 10th International Conference, COORDINATION 2008, Oslo, Norway, June 4-6, 2008. Proceedings, pp. 264-279, 2008, Springer, 978-3-540-68264-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan, Neha Jain |
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC (2) ![In: 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II: Workshops, pp. 127-132, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Ioana Rodhe, Christian Rohner |
n-LDA: n-Layers Data Aggregation in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 17-20 June 2008, Beijing, China, pp. 400-405, 2008, IEEE Computer Society, 978-0-7695-3173-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, C. Pandu Rangan |
Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 109-120, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | William Enck, Kevin R. B. Butler, Thomas Richardson, Patrick D. McDaniel, Adam D. Smith |
Defending Against Attacks on Main Memory Persistence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 65-74, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Roberto Capizzi, Antonio Longo, V. N. Venkatakrishnan, A. Prasad Sistla |
Preventing Information Leaks through Shadow Executions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 322-331, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Per Närman, Marten Schönherr, Pontus Johnson, Mathias Ekstedt, Moustafa Chenine |
Using Enterprise Architecture Models for System Quality Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: 12th International IEEE Enterprise Distributed Object Computing Conference, ECOC 2008, 15-19 September 2008, Munich, Germany, pp. 14-23, 2008, IEEE Computer Society, 978-0-7695-3373-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Charlie Obimbo, Behzad Salami 0002 |
A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 39(2), pp. 113-130, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Inverse of a matrix, Row-echelon reduction, Parallel Algorithms, Cryptography, Block Ciphers, Modular arithmetic, Systems of linear equations |
14 | Joonsang Baek, Ron Steinfeld, Yuliang Zheng 0001 |
Formal Proofs for the Security of Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 20(2), pp. 203-235, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Manhee Lee, Eun Jung Kim 0001 |
A Comprehensive Framework for Enhancing Security in InfiniBand Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 18(10), pp. 1393-1406, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Cluster Security, InfiniBand Architecture, Galois/Counter Mode, Availability DoS, Authentication, Encryption |
14 | Stephen Tse, Steve Zdancewic |
Run-time principals in information-flow type systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Program. Lang. Syst. ![In: ACM Trans. Program. Lang. Syst. 30(1), pp. 6, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Decentralized label model, dynamic principals, run-time principals, security-typed language, type systems, information-flow, soundness, noninterference |
14 | Meng Yu 0001, Peng Liu 0005, Wanyu Zang, Sushil Jajodia |
Trusted Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management in Decentralized Systems ![In: Secure Data Management in Decentralized Systems, pp. 59-94, 2007, Springer, 978-0-387-27694-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Manghui Tu, Liangliang Xiao, Hui Ma 0006, I-Ling Yen, Farokh B. Bastani |
Placement in Dependable and Secure Peer-to-Peer Data Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), November 14-16, 2007, Dallas, Texas, USA, pp. 133-140, 2007, IEEE Computer Society, 0-7695-3043-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | George Spanoudakis, Christos Kloukinas, Kelly Androutsopoulos |
Towards security monitoring patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 1518-1525, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
runtime monitoring, event calculus, security patterns |
14 | Chik How Tan |
Insider-secure Hybrid Signcryption SchemeWithout Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 1148-1154, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Ettore Merlo, Dominic Letarte, Giuliano Antoniol |
Automated Protection of PHP Applications Against SQL-injection Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSMR ![In: 11th European Conference on Software Maintenance and Reengineering, Software Evolution in Complex Software Intensive Systems, CSMR 2007, 21-23 March 2007, Amsterdam, The Netherlands, pp. 191-202, 2007, IEEE Computer Society, 0-7695-2802-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Somanath Tripathy |
LISA: LIghtweight Security Algorithm for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, 4th International Conference, ICDCIT 2007, Bangalore, India, December 17-20, Proceedings, pp. 129-134, 2007, Springer, 978-3-540-77112-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Le Yang 0003, Yongsun Choi |
A Flexible Access Control Model for Dynamic Workflow Using Extended WAM and RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD (Selected Papers) ![In: Computer Supported Cooperative Work in Design IV, 11th International Conference, CSCWD 2007, Melbourne, Australia, April 26-28, 2007. Revised Selected Papers, pp. 488-497, 2007, Springer, 978-3-540-92718-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Workflow Authorization Model, Role-based Access Control, Workflow System |
14 | Saar Drimer |
Authentication of FPGA Bitstreams: Why and How. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARC ![In: Reconfigurable Computing: Architectures, Tools and Applications, Third International Workshop, ARC 2007, Mangaratiba, Brazil, March 27-29, 2007., pp. 73-84, 2007, Springer, 978-3-540-71430-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Janus Dam Nielsen, Michael I. Schwartzbach |
A domain-specific programming language for secure multiparty computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, PLAS 2007, San Diego, California, USA, June 14, 2007, pp. 21-30, 2007, ACM, 978-1-59593-711-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SMCL, design, implementation, analysis |
14 | Dominik Engel, Thomas Stütz, Andreas Uhl |
Format-compliant jpeg2000 encryption with combined packet header and packet body protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007, pp. 87-96, 2007, ACM, 978-1-59593-857-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
format-compliant encryption, packet body encryption, packet header encryption, JPEG2000 |
14 | Takuya Mishina, Sachiko Yoshihama, Michiharu Kudo |
Fine-Grained Sticky Provenance Architecture for Office Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings, pp. 336-351, 2007, Springer, 978-3-540-75650-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Zhong Xu, Guanzhong Dai, Deming Yang |
An Efficient Online/Offline Signcryption Scheme for MANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (2) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 2, May 21-23, 2007, Niagara Falls, Canada, pp. 171-176, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Mohamed Nabeel, Elisa Bertino |
A structure preserving approach for securing XML documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing, White Plains, New York, USA, November 12-15, 2007, pp. 8-15, 2007, IEEE Computer Society / ICST, 1-4244-1317-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Kevin S. Killourhy, Roy A. Maxion |
Toward Realistic and Artifact-Free Insider-Threat Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, Florida, USA, pp. 87-96, 2007, IEEE Computer Society, 0-7695-3060-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Lenin Singaravelu, Calton Pu |
Fine-Grain, End-to-End Security for Web Service Compositions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: 2007 IEEE International Conference on Services Computing (SCC 2007), 9-13 July 2007, Salt Lake City, Utah, USA, pp. 212-219, 2007, IEEE Computer Society, 0-7695-2925-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Olivier Verscheure, Michail Vlachos, Aris Anagnostopoulos, Pascal Frossard, Eric Bouillet, Philip S. Yu |
Finding "Who Is Talking to Whom" in VoIP Networks via Progressive Stream Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 18-22 December 2006, Hong Kong, China, pp. 667-677, 2006, IEEE Computer Society, 0-7695-2701-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Johannes Gehrke |
Models and Methods for Privacy-Preserving Data Analysis and Publishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006, 3-8 April 2006, Atlanta, GA, USA, pp. 105, 2006, IEEE Computer Society, 0-7695-2570-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Xintao Wu, Songtao Guo, Yingjiu Li |
Towards value disclosure analysis in modeling general databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 617-621, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
disclosure analysis, general location model, privacy |
14 | Stephen Chong, Andrew C. Myers |
Decentralized Robustness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 19th IEEE Computer Security Foundations Workshop, (CSFW-19 2006), 5-7 July 2006, Venice, Italy, pp. 242-256, 2006, IEEE Computer Society, 0-7695-2615-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Alban Gabillon, Laurent Gallon |
Availability Constraints for Avionic Data Buses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 124-131, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 2507 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|