The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Confidentiality with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1985 (16) 1986-1990 (16) 1991-1994 (23) 1995-1996 (27) 1997 (20) 1998 (18) 1999 (29) 2000 (41) 2001 (40) 2002 (52) 2003 (91) 2004 (130) 2005 (176) 2006 (212) 2007 (199) 2008 (200) 2009 (167) 2010 (76) 2011 (81) 2012 (62) 2013 (59) 2014 (65) 2015 (61) 2016 (65) 2017 (58) 2018 (82) 2019 (91) 2020 (83) 2021 (93) 2022 (78) 2023 (82) 2024 (14)
Publication types (Num. hits)
article(774) incollection(28) inproceedings(1665) phdthesis(40)
Venues (Conferences, Journals, ...)
J. Priv. Confidentiality(181) CoRR(76) Privacy in Statistical Databas...(28) ARES(26) CSFW(23) ESORICS(22) DBSec(20) IACR Cryptol. ePrint Arch.(19) ACSAC(18) CCS(17) S&P(17) HICSS(16) AsiaCCS(15) ISCC(13) ITNG(12) IEEE Access(11) More (+10 of total 1048)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1928 occurrences of 929 keywords

Results
Found 2507 publication records. Showing 2507 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Penny Duquenoy, Carlisle Eldwidge George, Anthony Solomonides What ELSE? Regulation and Compliance in Medical Imaging and Medical Informatics. Search on Bibsonomy MIMI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Ethical principles, material quality, electronic medical data, shared data processing, shared access, jurisdictional responsibility, usability, accessibility, data integrity, training, confidentiality, data protection, standardisation, informed consent
15Anindya Banerjee 0001, David A. Naumann, Stan Rosenberg Towards a logical account of declassification. Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF information flow, confidentiality, aliasing
15Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl An Information Flow Verifier for Small Embedded Systems. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF class loading, information flow, confidentiality, type checking
15Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl Embedding verifiable information flow analysis. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF embedded systems, static analysis, information flow, confidentiality, language-based security, smart objects
15Merv Matson, Mihaela Ulieru The 'how' and 'why' of persistent information security. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF avaliability, emergency response operations, information custodian, infosec, persistent information security, integrity, information security, confidentiality, digital rights management, DRM
15Michael Boyle, Saul Greenberg The language of privacy: Learning from video media space analysis and design. Search on Bibsonomy ACM Trans. Comput. Hum. Interact. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF environmental psychology, solitude, video media spaces, privacy, Human-computer interaction, computer-supported cooperative work (CSCW), user interface design, social interaction, confidentiality, autonomy
15Qingfeng Chen, Chengqi Zhang, Shichao Zhang 0001 ENDL: A Logical Framework for Verifying Secure Transaction Protocols. Search on Bibsonomy Knowl. Inf. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Secure transaction protocol, Security, Verification, Integrity, Electronic commerce, Confidentiality
15Béatrice Finance, Saïda Medjdoub, Philippe Pucheral The case for access control on XML relationships. Search on Bibsonomy CIKM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF XML relationship, need-to-know and consent principles, data confidentiality, XML access control
15Gilles Barthe, Tamara Rezk Non-interference for a JVM-like language. Search on Bibsonomy TLDI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF type systems, confidentiality, low level languages
15Rachid Echahed, Frédéric Prost Security policy in a declarative style. Search on Bibsonomy PPDP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF confidentiality, non-interference
15Arun Subbiah, Douglas M. Blough An approach for fault tolerant and secure data storage in collaborative work environments. Search on Bibsonomy StorageSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF replication, secret sharing, confidentiality, collaborative environments, Byzantine fault tolerance, distributed data storage
15Vishal Kher, Yongdae Kim Securing distributed storage: challenges, techniques, and systems. Search on Bibsonomy StorageSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privacy, intrusion detection, integrity, authorization, confidentiality
15Krishnamurty Muralidhar, Rathindra Sarathy A theoretical basis for perturbation methods. Search on Bibsonomy Stat. Comput. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF statistical disclosure limitation, confidentiality, perturbation, disclosure risk, data masking
15Menno Cuppen, Leon Willenborg Source Data Perturbation and consistent sets of safe tables. Search on Bibsonomy Stat. Comput. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF table protection, confidentiality, data warehousing, disclosure, noise addition
15Krishnamurty Muralidhar, Rathindra Sarathy A rejoinder to the comments by Polettini and Stander. Search on Bibsonomy Stat. Comput. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF statistical disclosure limitation, confidentiality, perturbation, disclosure risk, data masking
15Luisa Franconi, Julian Stander Spatial and non-spatial model-based protection procedures for the release of business microdata. Search on Bibsonomy Stat. Comput. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Community Innovation Survey, conditional autoregressive scheme, performance assessment for disclosure limitation methods, confidentiality, Gibbs sampler
15Jerome P. Reiter Model Diagnostics for Remote Access Regression Servers. Search on Bibsonomy Stat. Comput. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF regression, confidentiality, diagnostics, remote access, disclosure, synthetic data
15Barry Schouten, Marc Cigrang Remote access systems for statistical analysis of microdata. Search on Bibsonomy Stat. Comput. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF confidentiality, remote access, remote execution, microdata
15Roberto Di Pietro, Antonio Durante, Luigi V. Mancini A Reliable Key Authentication Schema for Secure Multicast Communications. Search on Bibsonomy SRDS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Secure multicast communications, logical key hierarchy, re-keying, security, authenticity, confidentiality, key distribution, group key management
15Jill Lynn Tyler The Healthcare Information Technology Context: A Framework for Viewing Legal Aspects of Telemedicine and Teleradiology. Search on Bibsonomy HICSS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Healthcare informatics, medical data transfer, adoption barriers, privacy, standards, information technology, confidentiality, telemedicine, data security, teleradiology, radiology, legal issues, medical records
15Refik Molva, Alain Pannetrat Scalable multicast security with dynamic recipient groups. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF scalability, RSA, group communications, confidentiality, key distribution, Diffie-Hellman
15Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam Secure group communications using key graphs. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF security, privacy, multicast, group communications, confidentiality, key distribution, group key management, rekeying
15Edgar R. Weippl Coimbra: secure Web access to multimedia content. Search on Bibsonomy ACM Multimedia Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF encryption, confidentiality, security model, discretionary access control
15Dale M. Johnson, Lee A. Benzinger Layering Boundary Protections: An Experiment in Information Assurance. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF DARPA Information Assurance Program, boundary protection layering, attack protection, experiment, security of data, data security, client-server systems, client server system, data privacy, data confidentiality
15Erland Jonsson An Integrated Framework for Security and Dependability. Search on Bibsonomy Workshop on New Security Paradigms The full citation details ... 1998 DBLP  DOI  BibTeX  RDF modellings, measure, dependability, computer security, confidentiality, concepts
15Aris Zakinthinos, E. Stewart Lee A General Theory of Security Properties. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF possibilistic security properties, low level event sequence, security predicate, high level users, low level users, Selective Interleaving Functions framework, information theory, information flow, security of data, partial ordering, data confidentiality, event systems
15Roshan K. Thomas, Ravi S. Sandhu A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF secure write-up, trusted subject architecture, confidentiality proof, object-oriented databases, covert channels, Multilevel security
15Jan Schlörer Security of Statistical Databases: Multidimensional Transformation. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1981 DBLP  DOI  BibTeX  RDF security, database, confidentiality, database security, statistical database, matrices
15Dorothy E. Denning Secure Statistical Databases with Random Sample Queries. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1980 DBLP  DOI  BibTeX  RDF sampling, confidentiality, database security, statistical database, disclosure controls
15Dorothy E. Denning, Jan Schlörer A Fast Procedure for Finding a Tracker in a Statistical Database. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1980 DBLP  DOI  BibTeX  RDF confidentiality, data security, database security, statistical database, tracker
15Dorothy E. Denning, Peter J. Denning, Mayer D. Schwartz The Tracker: A Threat to Statistical Database Security. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1979 DBLP  DOI  BibTeX  RDF secure query functions, confidentiality, data security, database security, statistical database, tracker
15Mayer D. Schwartz, Dorothy E. Denning, Peter J. Denning Linear Queries in Statistical Databases. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1979 DBLP  DOI  BibTeX  RDF linear query, secure query functions, statical database, inference, confidentiality, data security, database security
14 To change the world, take a chance. Search on Bibsonomy Commun. ACM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
14 UX design and agile: a natural fit? (Talking with Julian Gosper, Jean-Luc Agathos, Richard Rutter, and Terry Coatta). Search on Bibsonomy Commun. ACM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
14 In the Virtual Extension. Search on Bibsonomy Commun. ACM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
14Ashish Kundu, Elisa Bertino How to authenticate graphs without leaking. Search on Bibsonomy EDBT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
14Aameek Singh, Mudhakar Srivatsa, Ling Liu 0001 Search-as-a-service: Outsourced search over outsourced storage. Search on Bibsonomy ACM Trans. Web The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Search-as-a-Service, access control aware search, cloud search, cloud storage
14Xiaojun Tang 0001, Ruoheng Liu, Predrag Spasojevic, H. Vincent Poor On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Llanos Tobarra, Diego Cazorla, Fernando Cuartero, Gregorio Díaz 0001, María-Emilia Cambronero Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AVISPA toolbox, Model checking, Security protocols, Wireless sensor
14Yun Li 0011, Leron Lightfoot, Jian Ren 0001 Routing-based source-location privacy protection in wireless sensor networks. Search on Bibsonomy EIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Christos Ioannidis, David J. Pym, Julian Williams Investments and Trade-offs in the Economics of Information Security. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Rui Zhang 0007, Jing Shi 0002, Yanchao Zhang Secure multidimensional range queries in sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multidimensional range query, security, sensor networks
14Joachim Biskup, Jan-Hendrik Lochner, Sebastian Sonntag Optimization of the Controlled Evaluation of Closed Relational Queries. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Vik Tor Goh, Jacob Zimmermann, Mark Looi Towards Intrusion Detection for Encrypted Networks. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Jeff Sedayao, Steven Su, Xiaohao Ma, Minghao Jiang, Kai Miao A Simple Technique for Securing Data at Rest Stored in a Computing Cloud. Search on Bibsonomy CloudCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Data at Rest Storage, Security, Cloud Computing, Encryption, PlanetLab
14Ravi Akella, Bruce M. McMillin Model-Checking BNDC Properties in Cyber-Physical Systems. Search on Bibsonomy COMPSAC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Mohsen Toorani, Ali Asghar Beheshti Shirazi A directly public verifiable signcryption scheme based on elliptic curves. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Avraham Shinnar, Marco Pistoia, Anindya Banerjee 0001 A language for information flow: dynamic tracking in multiple interdependent dimensions. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF information flow control, declassification, security type system
14Jim E. Smith, Alistair R. Clark, Andrea T. Staggemeier A genetic approach to statistical disclosure control. Search on Bibsonomy GECCO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF statistical disclosure control
14Chaoting Xuan, John A. Copeland, Raheem A. Beyah Shepherding Loadable Kernel Modules through On-demand Emulation. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Rootkit Prevention, On-demand Emulation, Emulator, Virtual Machine Monitor
14S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan Identity Based Aggregate Signcryption Schemes. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Aggregate Signcryption, Provable Security, Bilinear Pairings, Random Oracle Model, Identity Based Cryptography
14Takahiro Matsuda 0002, Kanta Matsuura, Jacob C. N. Schuldt Efficient Constructions of Signcryption Schemes and Signcryption Composability. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-user security, signcryption, generic construction
14S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan Breaking and Fixing of an Identity Based Multi-Signcryption Scheme. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Multi-Signcryption, Cryptanalysis, Provable Security, Bilinear Pairing, Signcryption, Random Oracle Model, Identity Based Cryptography
14Lander Casado, Philippas Tsigas ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks Security, Link Layer Security
14Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Basney, Himanshu Khurana Usable secure mailing lists with untrusted servers. Search on Bibsonomy IDtrust The full citation details ... 2009 DBLP  DOI  BibTeX  RDF e-mail list security, usability study, proxy re-encryption
14Alexander Yip, Neha Narula, Maxwell N. Krohn, Robert Tappan Morris Privacy-preserving browser-side scripting with BFlow. Search on Bibsonomy EuroSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF javascript, labels, information flow control, web platforms
14Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole Bai, Dong Xuan Link-layer protection in 802.11i WLANS with dummy authentication. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dummy authentication, security, wlan, open access
14Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Marcel Winandy, Rani Husseiki, Christian Stüble Flexible and secure enterprise rights management based on trusted virtual domains. Search on Bibsonomy STC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF enterprise rights management (ERM), trusted virtual domain (TVD), security policy, trusted computing
14Chris Kürschner, Cosmin Condea, Oliver Kasten, Frédéric Thiesse Discovery Service Design in the EPCglobal Network. Search on Bibsonomy IOT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Vineela Devarashetty, Jeffrey J. P. Tsai, Lu Ma, Du Zhang Modeling a secure sensor network system using an Extended Elementary Object System. Search on Bibsonomy IEEE ICCI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Stephen Chong, Andrew C. Myers End-to-End Enforcement of Erasure and Declassification. Search on Bibsonomy CSF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Erasure, Expressive security policies, Information flow, Language-based security, Noninterference, Declassification
14Stéphane Onno A Federated Physical and Logical Access Control Enforcement Model. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF access control federation, logical access control, physical access control, Bell-lapadula
14Raylin Tso Signcryption Scheme with Standardized Verification Algorithm. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Peter Christen Geocode Matching and Privacy Preservation. Search on Bibsonomy PinKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF privacy preservation, secure multi-party computations, record linkage, entity resolution, geocoding, Data matching
14Matthias Werner 0001, Michael A. Jaeger, Helge Parzyjegla An Application of the (max, +) Algebra to Information Flow Security. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF maxplus, security, information flow, lattice model
14Benoît Badrignans, Reouven Elbaz, Lionel Torres Secure update Mechanism for Remote Update of FPGA-Based System. Search on Bibsonomy SIES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Muzammil Khan, Attiq Ahmed, Ahmad Raza Cheema Vulnerabilities of UMTS Access Domain Security Architecture. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF UMTS vulnerabilities, DoS attacks on UMTS, Security, UMTS
14S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, Provable Security, Bilinear Pairing, Broadcast Encryption, Signcryption, Random Oracle, ID-based Cryptosystem
14Rohit Chadha, Carl A. Gunter, José Meseguer 0001, Ravinder Shankesi, Mahesh Viswanathan 0001 Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers. Search on Bibsonomy FMOODS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Giovanni Russello, Changyu Dong, Naranker Dulay, Michel R. V. Chaudron, Maarten van Steen Encrypted Shared Data Spaces. Search on Bibsonomy COORDINATION The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan, Neha Jain Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Ioana Rodhe, Christian Rohner n-LDA: n-Layers Data Aggregation in Sensor Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, C. Pandu Rangan Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14William Enck, Kevin R. B. Butler, Thomas Richardson, Patrick D. McDaniel, Adam D. Smith Defending Against Attacks on Main Memory Persistence. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Roberto Capizzi, Antonio Longo, V. N. Venkatakrishnan, A. Prasad Sistla Preventing Information Leaks through Shadow Executions. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Per Närman, Marten Schönherr, Pontus Johnson, Mathias Ekstedt, Moustafa Chenine Using Enterprise Architecture Models for System Quality Analysis. Search on Bibsonomy EDOC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Charlie Obimbo, Behzad Salami 0002 A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption. Search on Bibsonomy J. Supercomput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Inverse of a matrix, Row-echelon reduction, Parallel Algorithms, Cryptography, Block Ciphers, Modular arithmetic, Systems of linear equations
14Joonsang Baek, Ron Steinfeld, Yuliang Zheng 0001 Formal Proofs for the Security of Signcryption. Search on Bibsonomy J. Cryptol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Manhee Lee, Eun Jung Kim 0001 A Comprehensive Framework for Enhancing Security in InfiniBand Architecture. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cluster Security, InfiniBand Architecture, Galois/Counter Mode, Availability DoS, Authentication, Encryption
14Stephen Tse, Steve Zdancewic Run-time principals in information-flow type systems. Search on Bibsonomy ACM Trans. Program. Lang. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Decentralized label model, dynamic principals, run-time principals, security-typed language, type systems, information-flow, soundness, noninterference
14Meng Yu 0001, Peng Liu 0005, Wanyu Zang, Sushil Jajodia Trusted Recovery. Search on Bibsonomy Secure Data Management in Decentralized Systems The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Manghui Tu, Liangliang Xiao, Hui Ma 0006, I-Ling Yen, Farokh B. Bastani Placement in Dependable and Secure Peer-to-Peer Data Grids. Search on Bibsonomy HASE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14George Spanoudakis, Christos Kloukinas, Kelly Androutsopoulos Towards security monitoring patterns. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF runtime monitoring, event calculus, security patterns
14Chik How Tan Insider-secure Hybrid Signcryption SchemeWithout Random Oracles. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Ettore Merlo, Dominic Letarte, Giuliano Antoniol Automated Protection of PHP Applications Against SQL-injection Attacks. Search on Bibsonomy CSMR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Somanath Tripathy LISA: LIghtweight Security Algorithm for Wireless Sensor Networks. Search on Bibsonomy ICDCIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Le Yang 0003, Yongsun Choi A Flexible Access Control Model for Dynamic Workflow Using Extended WAM and RBAC. Search on Bibsonomy CSCWD (Selected Papers) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Workflow Authorization Model, Role-based Access Control, Workflow System
14Saar Drimer Authentication of FPGA Bitstreams: Why and How. Search on Bibsonomy ARC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Janus Dam Nielsen, Michael I. Schwartzbach A domain-specific programming language for secure multiparty computation. Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SMCL, design, implementation, analysis
14Dominik Engel, Thomas Stütz, Andreas Uhl Format-compliant jpeg2000 encryption with combined packet header and packet body protection. Search on Bibsonomy MM&Sec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF format-compliant encryption, packet body encryption, packet header encryption, JPEG2000
14Takuya Mishina, Sachiko Yoshihama, Michiharu Kudo Fine-Grained Sticky Provenance Architecture for Office Documents. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Zhong Xu, Guanzhong Dai, Deming Yang An Efficient Online/Offline Signcryption Scheme for MANET. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Mohamed Nabeel, Elisa Bertino A structure preserving approach for securing XML documents. Search on Bibsonomy CollaborateCom The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Kevin S. Killourhy, Roy A. Maxion Toward Realistic and Artifact-Free Insider-Threat Data. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Lenin Singaravelu, Calton Pu Fine-Grain, End-to-End Security for Web Service Compositions. Search on Bibsonomy IEEE SCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Olivier Verscheure, Michail Vlachos, Aris Anagnostopoulos, Pascal Frossard, Eric Bouillet, Philip S. Yu Finding "Who Is Talking to Whom" in VoIP Networks via Progressive Stream Clustering. Search on Bibsonomy ICDM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Johannes Gehrke Models and Methods for Privacy-Preserving Data Analysis and Publishing. Search on Bibsonomy ICDE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Xintao Wu, Songtao Guo, Yingjiu Li Towards value disclosure analysis in modeling general databases. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF disclosure analysis, general location model, privacy
14Stephen Chong, Andrew C. Myers Decentralized Robustness. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Alban Gabillon, Laurent Gallon Availability Constraints for Avionic Data Buses. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 2507 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license