The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "NSS"( http://dblp.L3S.de/Venues/NSS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/nss

Publication years (Num. hits)
2009 (90) 2010 (91) 2011 (58) 2012 (40) 2013 (72) 2014 (48) 2015 (42) 2016 (36) 2017 (60) 2018 (37) 2019 (48) 2020 (27) 2021 (25) 2022 (42) 2023 (22)
Publication types (Num. hits)
inproceedings(723) proceedings(15)
Venues (Conferences, Journals, ...)
NSS(738)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 215 occurrences of 177 keywords

Results
Found 738 publication records. Showing 738 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1James Alderman, Jason Crampton On the Use of Key Assignment Schemes in Authentication Protocols. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jiguo Li 0001, Yanqiong Li, Yichen Zhang 0003 Forward Secure Certificateless Proxy Signature Scheme. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yang Wang 0074, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Willy Susilo Threshold-Oriented Optimistic Fair Exchange. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Elisavet Konstantinou An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc Networks. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kent Are Varmedal, Henning Klevjer, Joakim Hovlandsvåg, Audun Jøsang, Johann Vincent, Laurent Miralabé The OffPAD: Requirements and Usage. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sashi Gurung, Dan Lin 0001, Anna Cinzia Squicciarini, Elisa Bertino Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mohamed Nabeel, Stefan Appel, Elisa Bertino, Alejandro P. Buchmann Privacy Preserving Context Aware Publish Subscribe Systems. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shaohua Tang, Lingling Xu Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Naoki Nishikawa, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa Performance Prediction Model for Block Ciphers on GPU Architectures. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Florian Weingarten, Georg Neugebauer, Ulrike Meyer, Susanne Wetzel Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zheli Liu, Haoyu Ma, Jin Li 0002, Chunfu Jia, Jingwei Li 0001, Ke Yuan Secure Storage and Fuzzy Query over Encrypted Databases. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Markus Gruber, Christian Schanes, Florian Fankhauser, Martin Moutran, Thomas Grechenig Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Fan Zhang, Hua Guo, Zhoujun Li Ancestor Excludable Hierarchical ID-Based Encryption Revisited. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yuxin Meng 0001, Wenjuan Li 0001, Lam-for Kwok Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jorge de-la-Peña-Sordo, Igor Santos, Iker Pastor-López, Pablo García Bringas Filtering Trolling Comments through Collective Classification. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gabriel Cartier, Jean-François Cartier, José M. Fernandez 0001 Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ahmad Alomari Security Authentication of AODV Protocols in MANETs. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yan Li 0075, Yingjiu Li, Qiang Yan 0001, Robert H. Deng Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jason Cohen, Subatra Acharya Towards a More Secure Apache Hadoop HDFS Infrastructure - Anatomy of a Targeted Advanced Persistent Threat against HDFS and Analysis of Trusted Computing Based Countermeasures. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kannan Karthik Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tamas K. Lengyel, Justin Neumann, Steve Maresca, Aggelos Kiayias Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tianzuo Wang, Huaimin Wang, Bo Liu, Peichang Shi Model the Influence of Sybil Nodes in P2P Botnets. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James Tracing Sources of Anonymous Slow Suspicious Activities. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Benoît Bertholon, Sébastien Varrette, Pascal Bouvry JShadObf: A JavaScript Obfuscator Based on Multi-Objective Optimization Algorithms. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Weijia Wang, Lei Hu, Yong Li 0002 Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Maurizio Naldi, Marta Flamini, Giuseppe D'Acquisto Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning Approach. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sebastian Vogl, Fatih Kiliç, Christian A. Schneider, Claudia Eckert 0001 X-TIER: Kernel Module Injection. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rafael Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mahdi Aiash A Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDR. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Javier López 0001, Xinyi Huang, Ravi S. Sandhu (eds.) Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jianwei Liu 0001, Abdur Rashid Sangi, Ruiying Du, Qianhong Wu Light Weight Network Coding Based Key Distribution Scheme for MANETs. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1James Kirrage, Asiri Rathnayake, Hayo Thielecke Static Analysis for Regular Expression Denial-of-Service Attacks. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Miltiadis Kandias, Konstantina Galbogini, Lilian Mitrou, Dimitris Gritzalis Insiders Trapped in the Mirror Reveal Themselves in Social Media. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hongda Li 0001, Qihua Niu, Bei Liang Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jia Hu 0001, Hui Lin 0007, Li Xu 0002 A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Aditi Gupta 0002, Sam Kerr, Michael S. Kirkpatrick, Elisa Bertino Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shun-Wen Hsiao, Yi-Ning Chen, Yeali S. Sun, Meng Chang Chen Combining Dynamic Passive Analysis and Active Fingerprinting for Effective Bot Malware Detection in Virtualized Environments. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jörg Daubert, Mathias Fischer 0001, Stefan Schiffner, Max Mühlhäuser Distributed and Anonymous Publish-Subscribe. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sheng Wen, Yang Xiang 0001, Wanlei Zhou 0001 Modeling and Analysis for Thwarting Worm Propagation in Email Networks. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sana Ullah, Waleed Alsalih On Secure and Power-Efficient RFID-Based Wireless Body Area Network. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yan Zhang, Dengguo Feng, Zhengfeng Zhang, Liwu Zhang On the Security of an Efficient Attribute-Based Signature. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Jim Burns, Brian A. Coan, John L. Schultz, Jonathan Robert Stanton, Simon Tsang, Rebecca N. Wright Efficient and Private Three-Party Publish/Subscribe. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Anjia Yang, Yunhui Zhuang, Duncan S. Wong, Guomin Yang A New Unpredictability-Based RFID Privacy Model. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chao Wang, Kefei Mao, Jianwei Liu 0001, Jianhua Liu Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Julien Bringer, Hervé Chabanne, Alain Patey Collusion-Resistant Domain-Specific Pseudonymous Signatures. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wei Zhou, Jiankun Hu, Ian R. Petersen, Mohammed Bennamoun Partial Fingerprint Reconstruction with Improved Smooth Extension. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alessandro Armando, Roberto Carbone, Luca Zanetti Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Raphael Spreitzer, Thomas Plos On the Applicability of Time-Driven Cache Attacks on Mobile Devices. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Idalides J. Vergara-Laurens, Diego Mendez-Chaves, Miguel A. Labrador On the Interactions between Privacy-Preserving, Incentive, and Inference Mechanisms in Participatory Sensing Systems. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christoph Krauß, Volker Fusenig Using Trusted Platform Modules for Location Assurance in Cloud Networking. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jing Chen 0003, Ruiying Du, Li Zhao, Chiheng Wang, Minghui Zheng, Yang Xiang 0001 Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Suaad S. Alarifi, Stephen D. Wolthusen Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xu Huang 0001, Salahiddin Altahat, Dat Tran 0001, Shutao Li Human Identification with Electroencephalogram (EEG) for the Future Network Security. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wei Feng, Yu Qin, Dengguo Feng, Ge Wei, Lihui Xue, Dexian Chang Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mahdi Aiash A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Muhammad I. Sarfraz, Peter Baker, Jia Xu, Elisa Bertino A Comprehensive Access Control System for Scientific Applications. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jonas Pfoh, Christian A. Schneider, Claudia Eckert 0001 Leveraging String Kernels for Malware Detection. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shengli Liu 0001, Fangguo Zhang, Kefei Chen Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jingwei Li 0001, Jin Li 0002, Xiaofeng Chen 0001, Chunfu Jia, Zheli Liu Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jing Guo, Zhuxiao Wang Linear Cryptanalysis and Security Tradeoff of Block Ciphering Systems with Channel Errors. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xilin Zhang, Yingjie Wu, Xiaodong Wang 0003 Differential Privacy Data Release through Adding Noise on Average Value. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Long-Hai Li, Cheng-Qiang Huang, Shao-Feng Fu Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-Net. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Cristina Alcaraz, Javier López 0001 Addressing Situational Awareness in Critical Domains of a Smart Grid. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yifan Zhao, Swee-Won Lo, Robert H. Deng, Xuhua Ding An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yue Yu, Michael Fry 0001, Bernhard Plattner, Paul Smith 0001, Alberto E. Schaeffer Filho Resilience Strategies for Networked Malware Detection and Remediation. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mohammad Saiful Islam Mamun, Atsuko Miyaji, Mohammad Shahriar Rahman A Secure and Private RFID Authentication Protocol under SLPN Problem. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Wenjie Yang, Futai Zhang, Limin Shen Practical Certificateless Public Key Encryption in the Standard Model. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yuxin Meng 0001, Lam-for Kwok Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Samaneh Mahdavifar, Mahdi Abadi, Mohsen Kahani, Hassan Mahdikhani A Clustering-Based Approach for Personalized Privacy Preserving Publication of Moving Object Trajectory Data. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Eitan Menahem, Rami Puzis, Yuval Elovici Detecting Spammers via Aggregated Historical Data Set. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Amani S. Ibrahim, John Grundy 0001, James H. Hamlyn-Harris, Mohamed Almorsy Operating System Kernel Data Disambiguation to Support Security Analysis. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yunmei Zhang, Man Ho Au, Guomin Yang, Willy Susilo (Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key Attack. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sushama Karumanchi, Anna Cinzia Squicciarini, Dan Lin 0001 Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Roman Schlegel, Duncan S. Wong Private Friends on a Social Networking Site Operated by an Overly Curious SNP. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ding Wang 0002, Chunguang Ma, De-li Gu, Zhen-shan Cui Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yuechuan Wei, Xiaoyuan Yang 0002, Chao Li, Weidong Du Impossible Differential Cryptanalysis on Tweaked E2. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Fei Tang, Changlu Lin, Pinhui Ke Universal Designated Verifier Signcryption. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lukasz Krzywiecki, Miroslaw Kutylowski Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Silvio Ranise, Alessandro Armando On the Automated Analysis of Safety in Usage Control: A New Decidability Result. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Qi Han, Yinghui Zhang 0002, Xiaofeng Chen 0001, Hui Li 0006, Jiaxiang Quan Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Willy Susilo, Yang-Wai Chow, Rungrat Wiangsripanawan Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online Games. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tae-Gyu Lee, Gi-Soo Chung A Scalable Link Model for Local Optical Wireless Networks. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yang Yang 0026 A Communication Efficient Group Key Distribution Scheme for MANETs. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor A Bird's Eye View on the I2P Anonymous File-Sharing Environment. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Huimin Shuai, Wen Tao Zhu Masque: Access Control for Interactive Sharing of Encrypted Data in Social Networks. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alif Wahid, Christopher Leckie, Chenfeng Vincent Zhou Estimating the Number of Hosts Corresponding to an Address while Preserving Anonymity. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Steffen Wagner, Sascha Wessel, Frederic Stumpf Attestation of Mobile Baseband Stacks. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mu-En Wu, Raylin Tso, Hung-Min Sun Cryptanalysis of Exhaustive Search on Attacking RSA. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Li Xu 0002, Elisa Bertino, Yi Mu 0001 (eds.) Network and System Security - 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kaiqi Xiong The Performance of Public Key-Based Authentication Protocols. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Amani S. Ibrahim, James H. Hamlyn-Harris, John Grundy 0001, Mohamed Almorsy Identifying OS Kernel Objects for Run-Time Security Analysis. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tae-Gyu Lee, Gi-Soo Chung Background Transfer Method for Ubiquitous Computing. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kristian Beilke, Volker Roth 0002 FlexCOS: An Open Smartcard Platform for Research and Education. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mu-En Wu, Raylin Tso, Hung-Min Sun On the Improvement of Fermat Factorization. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Leyou Zhang, Qing Wu 0005, Yupu Hu Direct CCA Secure Identity-Based Broadcast Encryption. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nima Mousavi, Mahesh V. Tripunitara Mitigating the Intractability of the User Authorization Query Problem in Role-Based Access Control (RBAC). Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shaohua Tang, Lingling Xu Proxy Signature Scheme Based on Isomorphisms of Polynomials. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kui Xu 0002, Danfeng Yao, Qiang Ma 0006, Alexander Crowell Detecting infection onset with behavior-based policies. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 738 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license