Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
20 | Marco Descher, Philip Masser, Thomas Feilhauer, A Min Tjoa, David Huemer |
Retaining Data Control to the Client in Infrastructure Clouds. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Jun Li 0008, Bryan Stephenson, Sharad Singhal |
A Policy Framework for Data Management in Services Marketplaces. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Nina Moebius, Kurt Stenzel, Holger Grandy, Wolfgang Reif |
SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Sarat C. Addepalli, Piyush Bansal, Kannan Srinathan, K. Madhava Krishna |
Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trusting Robots. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Bagher Rahimpour Cami, Mohammad Reza Matash Brujerdi |
Using Hybrid Trust Model for Handling Inaccurate Resource. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Christian A. Schneider, Frederic Stumpf, Claudia Eckert 0001 |
Enhancing Control of Service Compositions in Service-Oriented Architectures. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Alireza Namazi, Seyed Ghassem Miremadi, Alireza Ejlali |
A High Speed and Low Cost Error Correction Technique for the Carry Select Adder. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Vincent Alimi, Marc Pasquet |
Post-Distribution Provisioning and Personalization of a Payment Application on a UICC-Based Secure Element. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Kimmo Halunen, Pauli Rikula, Juha Röning |
Finding Preimages of Multiple Passwords Secured with VSH. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Yves Younan, Frank Piessens, Wouter Joosen |
Protecting Global and Static Variables from Buffer Overflow Attacks. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Marcin Gorawski, Szymon Panfil |
A System of Privacy Preserving Distributed Spatial Data Warehouse Using Relation Decomposition. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki |
Modeling Misuse Patterns. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Xiaowei Shi, Fenlin Liu, Daofu Gong, Jing Jing |
An Authentication Watermark Algorithm for JPEG images. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Xianglin Deng, Malcolm Shore |
Advanced Flooding Attack on a SIP Server. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Shanai Ardi, Nahid Shahmehri |
A Post-Mortem Incident Modeling Method. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | George Hsieh, Keith Foster, Gerald Emamali, Gregory Patrick, Lisa M. Marvel |
Using XACML for Embedded and Fine-Grained Access Control Policy. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Mohaned Kafi, Sylvain Guilley, Sandra Marcello, David Naccache |
Deconvolving Protected Signals. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Hiroshi Kudou, Shunn-ichiro Nakayama, Atsushi Watanabe, Tomoyuki Nagase, Yoshio Yoshioka |
A Reconfigurable-Permutation Algorithm for M_S-Box. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Marco Descher, Thomas Feilhauer, Thomas Ludescher, Philip Masser, B. Wenzel, Peter Brezany, Ibrahim Elsayed, Alexander Wöhrer, A Min Tjoa, David Huemer |
Position Paper: Secure Infrastructure for Scientific Data Life Cycle Management. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Christophe Feltus, Christophe Incoul, Jocelyn Aubert, Benjamin Gâteau, André Adelsbach, Marc Camy |
Methodology to Align Business and IT Policies: Use Case from an IT Company. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Chunyan Mu, David Clark 0001 |
Quantitative Analysis of Secure Information Flow via Probabilistic Semantics. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Grant Osborne, Benjamin P. Turnbull |
Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Mourad Elhadef |
A Perceptron Neural Network for Asymmetric Comparison-Based System-Level Fault Diagnosis. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Wolfgang Boehmer |
Cost-Benefit Trade-Off Analysis of an ISMS Based on ISO 27001. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Ludwig Fuchs, Christian Broser, Günther Pernul |
Different Approaches to In-House Identity Management - Justification of an Assumption. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Pin Zhang, Xiangwei Kong |
Detecting Image Tampering Using Feature Fusion. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Markus Goldstein, Matthias Reif, Armin Stahl, Thomas M. Breuel |
Server-Side Prediction of Source IP Addresses Using Density Estimation. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Frédéric Majorczyk, Jonathan-Christofer Demay |
Automated Instruction-Set Randomization for Web Applications in Diversified Redundant Systems. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Jörn-Marc Schmidt, Stefan Tillich |
On the Security of Untrusted Memory. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Filippo Chiariglione, Giacomo Cosenza, Sergio Matone |
Managing Rights and Value of Digital Media. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | S. Hamid Amiri, Mansour Jamzad |
A Robust Image Watermarking Method in Wavelet Domain Using Genetic Algorithm. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Claude Carlet |
On the Higher Order Nonlinearities of Boolean Functions and S-boxes. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Ao Ma, Yang Yin, Wenwu Na, Xiaoxuan Meng, Qingzhong Bu, Lu Xu 0001 |
Scrubbing in Storage Virtualization Platform for Long-Term Backup Application. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | George Spanoudakis, Stephane LoPresti |
Web Service Trust: Towards a Dynamic Assessment Framework. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Kim Wuyts, Riccardo Scandariato, Bart De Decker, Wouter Joosen |
Linking Privacy Solutions to Developer Goals. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | |
Novel Algorithms for Subgroup Detection in Terrorist Networks |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Jaafar Almasizadeh, Mohammad Abdollahi Azgomi |
Intrusion Process Modeling for Security Quantification. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Michael Menzel 0001, Ivonne Thomas, Christoph Meinel |
Security Requirements Specification in Service-Oriented Business Process Management. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Kotaro Yamamoto, Munetoshi Iwakiri |
A Standard MIDI File Steganography Based on Fluctuation of Duration. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Gerardo Canfora, Corrado Aaron Visaggio, Vito Paradiso |
A Test Framework for Assessing Effectiveness of the Data Privacy Policy's Implementation into Relational Databases. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Omar Khadeer Hussain, Tharam S. Dillon |
Ascertaining the Financial Loss from Non-dependable Events in Business Interactions by Using the Monte Carlo Method. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Amirhossein Taherinia, Mansour Jamzad |
A Robust Image Watermarking Using Two Level DCT and Wavelet Packets Denoising. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai |
Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Ying-Wei Kuo, Shou-Hsuan Stephen Huang |
Detecting Stepping-Stone Connection Using Association Rule Mining. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Carlos Blanco 0001, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo 0001, Mario Piattini |
Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Mehran Ahsant, Jim Basney |
Workflows in Dynamic and Restricted Delegation. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Siv Hilde Houmb, Virginia N. L. Franqueira |
Estimating ToE Risk Level Using CVSS. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Jooyoung Lee, Sungkyung Un, Dowon Hong |
Improving Performance in Digital Forensics: A Case Using Pattern Matching Board. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Chun-I Fan, Ming-Te Chen, Lung-Hsien Chen |
Truly Anonymous Paper Submission and Review Scheme. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Mikaël Ates, Jacques Fayolle, Christophe Gravier, Jérémy Lardon |
The User-Centric Vision Matches Credentials Exchanges. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Xiao Xiao 0002, Tadashi Dohi |
On Equilibrium Distribution Properties in Software Reliability Modeling. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Collin Mulliner |
Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Hiroaki Kikuchi, Hiroyasu Kizawa, Minako Tada |
Privacy-Preserving Collaborative Filtering Schemes. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Frank Innerhofer-Oberperfler, Ruth Breu |
An Empirically Derived Loss Taxonomy Based on Publicly Known Security Incidents. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | George O. M. Yee |
An Automatic Privacy Policy Agreement Checker for E-services. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Alexander Pretschner, Judith Rüesch, Christian Schaefer, Thomas Walter 0001 |
Formal Analyses of Usage Control Policies. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Juhani Anttila, Jorma Kajava |
Haste in Knowledge-Intensive Work: A Major Threat to Information Security Management in Business Environments. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Yi Wang, Ping Chen 0003, Yi Ge, Bing Mao, Li Xie 0001 |
Traffic Controller: A Practical Approach to Block Network Covert Timing Channel. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Carlos Blanco 0001, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo 0001, Mario Piattini |
Including Security Rules Support in an MDA Approach for Secure DWs. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Per Håkon Meland, Shanai Ardi, Jostein Jensen, Erkuden Rios, Txus Sanchez, Nahid Shahmehri, Inger Anne Tøndel |
An Architectural Foundation for Security Model Sharing and Reuse. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Javier Jiménez, Vicenç Torra |
Utility and Risk of JPEG-Based Continuous Microdata Protection Methods. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Luanna Lopes Lobato, Eduardo B. Fernández, Sérgio Donizetti Zorzo |
Patterns to Support the Development of Privacy Policies. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | George Poulopoulos, Konstantinos Markantonakis, Keith Mayes |
A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Ya-Fen Chang, Yen-Cheng Lai |
An LPN-Problem-Based Lightweight Authentication Protocol for Wireless Communications. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Noam Ben-Asher, Joachim Meyer 0002, Sebastian Möller 0001, Roman Englert |
An Experimental System for Studying the Tradeoff between Usability and Security. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Sopheak Cheang, Sinawong Sang |
State of Cybersecurity and the Roadmap to Secure Cyber Community in Cambodia. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Koen Buyens, Bart De Win, Wouter Joosen |
Identifying and Resolving Least Privilege Violations in Software Architectures. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens |
Deploying Security Policy in Intra and Inter Workflow Management Systems. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Thomas Butter, Markus Aleksy |
MixVM - An Approach to Service Isolation and Data Protection in Mobile Context-Sensitive Applications. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Virginia N. L. Franqueira, Pascal van Eck, Roel J. Wieringa, Raul H. C. Lopes |
A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Meiko Jensen, Jörg Schwenk |
The Accountability Problem of Flooding Attacks in Service-Oriented Architectures. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Song Fu, Cheng-Zhong Xu 0001 |
Proactive Resource Management for Failure Resilient High Performance Computing Clusters. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Kara L. Nance, Brian Hay, Matt Bishop |
Investigating the Implications of Virtual Machine Introspection for Digital Forensics. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Mehrtash Manoochehri, Alireza Ejlali, Seyed Ghassem Miremadi |
Fault Tolerant and Low Energy Write-Back Heterogeneous Set Associative Cache for DSM Technologies. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka |
Yet Another Sanitizable Signature from Bilinear Maps. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Jan Paul Kolter, Günther Pernul |
Generating User-Understandable Privacy Preferences. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Guenther Starnberger, Lorenz Froihofer, Karl M. Göschka |
QR-TAN: Secure Mobile Transaction Authentication. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Binbin Wang, Zhitang Li, Hao Tu, Jie Ma |
Measuring Peer-to-Peer Botnets Using Control Flow Stability. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Vik Tor Goh, Jacob Zimmermann, Mark Looi |
Towards Intrusion Detection for Encrypted Networks. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Ping Chen 0003, Yi Wang, Zhi Xin, Bing Mao, Li Xie 0001 |
BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Masami Izumi, Kazuo Sakiyama, Kazuo Ohta |
A New Approach for Implementing the MPL Method toward Higher SPA Resistance. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Stefan Rass, Peter Schartner |
Security in Quantum Networks as an Optimization Problem. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Youcheng Chen, Mohammad Reza Selim, Yuichi Goto, Jingde Cheng |
An Improvement of REM: A Replication Oriented Event-Based Middleware. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai |
Secrecy Capacity of Wireless LAN. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Solange Ghernaouti-Helie |
An Inclusive Information Society Needs a Global Approach of Information Security. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson |
Package-Role Based Authorization Control Model for Wireless Network Services. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Sebastian Mödersheim |
Algebraic Properties in Alice and Bob Notation. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Ganugula Umadevi, Sarat C. Addepalli, Kannan Srinathan |
Generalized Robust Combiners for Oblivious Transfer. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Marko Hölbl, Tatjana Welzer |
An Improved Authentication Protocol Based on One-Way Hash Functions and Diffie-Hellman Key Exchange. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Daniel Mellado, Jesús Rodríguez, Eduardo Fernández-Medina, Mario Piattini |
Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Amine Boukhtouta, Dima Alhadidi, Mourad Debbabi |
A Practical Framework for the Dataflow Pointcut in AspectJ. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Thomas Heyman, Riccardo Scandariato, Wouter Joosen |
Risk-Driven Architectural Decomposition. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Tomasz Polacik |
Back and Forth Between First-Order Kripke Models. |
Log. J. IGPL |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Simon Gog, Martin Bader |
Fast Algorithms for Transforming Back and Forth between a Signed Permutation and Its Equivalent Simple Permutation. |
J. Comput. Biol. |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Michele Piunti, Alessandro Ricci |
From Agents to Artifacts Back and Forth: Purposive and Doxastic use of Artifacts in MAS. |
Programming Multi-Agent Systems |
2008 |
DBLP BibTeX RDF |
|
20 | Paolo Atzeni, Stefano Paolozzi, Pierluigi Del Nostro |
Ontologies And Databases: Going Back And Forth. |
ODBIS |
2008 |
DBLP BibTeX RDF |
|
20 | Maristella Agosti, Floriana Esposito, Costantino Thanos (eds.) |
Post-proceedings of the Forth Italian Research Conference on Digital Library Systems, IRCDL 2008, Padova, Italy, 24-25 January 2008 |
IRCDL |
2008 |
DBLP BibTeX RDF |
|
20 | Michele Piunti, Alessandro Ricci |
From Agents to Artifacts Back and Forth: Operational and Doxastic Use of Artifacts in MAS. |
WOA |
2008 |
DBLP BibTeX RDF |
|
20 | Xiao Yang, Guican Chen, Jun Cheng, Xiaoyun Xu |
A novel two-channel time-interleaved forth-order sigma-delta modulator topology. |
APCCAS |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Nirmala Pudota, Paolo Casoto, Antonina Dattolo, Paolo Omero, Carlo Tasso |
Towards Bridging the Gap between Personalization and Information Extraction. |
IRCDL |
2008 |
DBLP BibTeX RDF |
|