The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SECRYPT"( http://dblp.L3S.de/Venues/SECRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/secrypt

Publication years (Num. hits)
2006 (73) 2007 (67) 2008 (83) 2009 (62) 2010 (71) 2011 (68) 2012 (67) 2013 (71) 2014 (64) 2015 (53) 2016 (52) 2017 (67) 2021 (96) 2022 (85) 2023 (100)
Publication types (Num. hits)
inproceedings(1064) proceedings(15)
Venues (Conferences, Journals, ...)
SECRYPT(1079)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 1079 publication records. Showing 1079 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Johan Garcia 0001 Examining the Performance for Forensic Detection of Rare Videos Under Time Constraints. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gerardo Canfora, Francesco Mercaldo, Corrado Aaron Visaggio Mobile Malware Detection using Op-code Frequency Histograms. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1George Stergiopoulos, Panagiotis Petsanas, Panagiotis Katsaros, Dimitris Gritzalis Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ewa Syta, Michael J. Fischer, David Wolinsky, Abraham Silberschatz, Gina Gallegos-García, Bryan Ford Private Eyes: Secure Remote Biometric Authentication. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tayeb Kenaza, Abdenour Labed, Yacine Boulahia, Mohcen Sebehi Adaptive SVDD-based Learning for False Alarm Reduction in Intrusion Detection. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fleura Hajilou, Ehsan Mazidi, Shahab Ardalan DPA Resistance Enhancement through a Self-healing PLL based Power Mask. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kaibin Huang, Yu-Chi Chen, Raylin Tso Semantic Secure Public Key Encryption with Filtered Equality Test - PKE-FET. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mahdi Aiash, Jonathan Loo A Formally Verified Access Control Mechanism for Information Centric Networks. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zisis Tsiatsikas, Alexandros Fakis, Dimitrios Papamartzivanos, Dimitris Geneiatakis, Georgios Kambourakis, Constantinos Kolias Battling Against DDoS in SIP - Is Machine Learning-based Detection an Effective Weapon?. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Peter Amthor 0001 A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Francesco Buccafurri, Gianluca Lax, Rajeev Anand Sahu, Vishal Saraswat Practical and Secure Integrated PKE+PEKS with Keyword Privacy. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bholanath Roy, Ravi Prakash Giri, Ashokkumar C., Bernard Menezes Design and Implementation of an Espionage Network for Cache-based Side Channel Attacks on AES. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Eduardo B. Fernández, Dereje Yimam Towards Compliant Reference Architectures by Finding Analogies and Overlaps in Compliance Regulations. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Martin Salfer, Claudia Eckert 0001 Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hajar Benmoussa, Anas Abou El Kalam, Abdellah Ait Ouahman Distributed Intrusion Detection System based on Anticipation and Prediction Approach. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Stelvio Cimato, Silvia Mella, Ruggero Susella New Results for Partial Key Exposure on RSA with Exponent Blinding. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christophe Nègre, Jean-Marc Robert 0003 Parallel Approaches for Efficient Scalar Multiplication over Elliptic Curve. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Florian Reimair, Peter Teufl, Christian Kollmann, Christoph Thaller MoCrySIL - Carry Your Cryptographic Keys in Your Pocket. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jason Reeves, Sean W. Smith Solving the Grid Defender's Dilemma: Tamper Protection for Distributed Cyber-Physical Systems. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jennifer Bellizzi, Mark Vella WeXpose: Towards on-Line Dynamic Analysis of Web Attack Payloads using Just-In-Time Binary Modification. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Thang Hoang, Deokjai Choi 0001, Thuc Dinh Nguyen On the Instability of Sensor Orientation in Gait Verification on Mobile Phone. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Malek Belhaouane, Joaquín García-Alfaro, Hervé Debar Evaluating the Comprehensive Complexity of Authorization-based Access Control Policies using Quantitative Metrics. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Amir I. Sulimov, Arkadij V. Karpov Performance Evaluation of Meteor Key Distribution. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ka Ahmad Khoureich hHB: A Harder HB+ Protocol. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pierpaolo Cincilla, Aymen Boudguiga, Makhlouf Hadji, Arnaud Kaiser Light Blind: Why Encrypt If You Can Share?. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mihajlo Pavloski, Gökçe Görbil, Erol Gelenbe Counter based Detection and Mitigation of Signalling Attacks. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mario Di Mauro, Maurizio Longo Revealing Encrypted WebRTC Traffic via Machine Learning Tools. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alexey D. Smolyakov, Amir I. Sulimov, Arkadij V. Karpov, Aidar V. Galiev Experimental Extraction of Shared Secret Key from Fluctuations of Multipath Channel at Moving a Mobile Transceiver in an Urban Environment. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Faouzi Jaïdi, Faten Labbene Ayachi A Risk Awareness Approach for Monitoring the Compliance of RBAC-based Policies. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alexandru Vlad Serbanescu, Sebastian Obermeier 0001, Der-Yeuan Yu A Flexible Architecture for Industrial Control System Honeypots. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Srinivasa Rao Subramanya Rao A Note on Schoenmakers Algorithm for Multi Exponentiation. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohammad S. Obaidat, Pascal Lorenz, Pierangela Samarati (eds.) SECRYPT 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  BibTeX  RDF
1Marc Joye A Key-private Cryptosystem from the Quadratic Residuosity. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Luigi Maria Bottasso A Public-Key Cryptography Tool for Personal Use - A Real-world Implementation of ECC for Secure File Exchange. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Worachet Uttha, Clara Bertolissi, Silvio Ranise Modeling Authorization Policies for Web Services in Presence of Transitive Dependencies. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rakesh M. Verma, Nirmala Rai Phish-IDetector: Message-Id Based Automatic Phishing Detection. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fabio Marfia, Mario Arrigoni Neri, Filippo Pellegrini, Marco Colombetti An OWL-based XACML Policy Framework. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jan Hajny, Petr Dzurenda, Lukas Malina Secure Physical Access Control with Strong Cryptographic Protection. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Asma Guesmi, Patrice Clemente, Frédéric Loulergue, Pascal Berthomé Cloud Resources Placement based on Functional and Non-functional Requirements. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hassaan Irshad, Basit Shafiq, Jaideep Vaidya, Muhammad Ahmed Bashir, Shafay Shamail, Nabil R. Adam Preserving Privacy in Collaborative Business Process Composition. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pankaj Pandey, Einar Arthur Snekkenes Design and Performance Aspects of Information Security Prediction Markets for Risk Management. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Roman Schlegel, Ana Hristova, Sebastian Obermeier 0001 A Framework for Incident Response in Industrial Control Systems. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Catalin V. Bîrjoveanu Anonymity and Fair-Exchange in e-Commerce Protocol for Physical Products Delivery. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1S. Sree Vivek, Guhan Balasubramanian Controlled Proxy Re-signing - Conditional Proxy Re-Signatures. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lukas Malina, Petr Munster, Jan Hajny, Tomás Horváth Towards Secure Gigabit Passive Optical Networks - Signal Propagation based Key Establishment. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Slim Trabelsi, Henrik Plate, Amine Abida, M. Marouane Ben Aoun, Anis Zouaoui, Chedy Missaoui, Sofien Gharbi, Alaeddine Ayari Monitoring Software Vulnerabilities through Social Networks Analysis. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Valerio Selis, Alan Marshall 0001 MEDA: A Machine Emulation Detection Algorithm. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jannik Dreier, Ali Kassem 0001, Pascal Lafourcade 0001 Formal Analysis of E-Cash Protocols. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Claas Lorenz, Bettina Schnor Policy Anomaly Detection for Distributed IPv6 Firewalls. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Florian Rhinow, Michael Clear Scargos: Towards Automatic Vulnerability Distribution. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1S. Sree Vivek, S. Sharmila Deva Selvi, Aanchal Malhotra, C. Pandu Rangan Practical IBE Secure under CBDH - Encrypting Without Pairing. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rabih Mohsen, Alexandre Miranda Pinto Algorithmic Information Theory for Obfuscation Security. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pratik Poddar, Achin Bansal, Bernard Menezes Optimizing Elliptic Curve Scalar Multiplication with Near-Factorization. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jannik Dreier, Rosario Giustolisi, Ali Kassem 0001, Pascal Lafourcade 0001, Gabriele Lenzini, Peter Y. A. Ryan Formal Analysis of Electronic Exams. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shizra Sultan, Abdul Ghafoor Abbasi, Muhammad Awais Shibli, Muhammad Ali Nasir Secure Protocol for Financial Transactions Using Smartphones - SPFT - Formally Proved by AVISPA. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Daniel Kavan, Klára Skodová, Martin Klíma Network-based Intrusion Prevention System Prototype with Multi-Detection - A Position Paper. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Omid Zanganeh, Nandita Bhattacharjee, Bala Srinivasan 0002 Partial Fingerprint Identification Through Correlation-based Approach. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Maherzia Belaazi, Hanene Boussi Rahmouni, Adel Bouhoula Towards a Legislation Driven Framework for Access Control and Privacy Protection in Public Cloud. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  BibTeX  RDF
1Nesrine Kaaniche, Maryline Laurent, Mohammed El-Barbori CloudaSec: A Novel Public-key Based Framework to Handle Data Sharing Security in Clouds. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ivona Brandic Democratization in Science and Technology through Cloud Computing. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  BibTeX  RDF
1Amir I. Sulimov, Alexey D. Smolyakov, Arkadij V. Karpov, Oleg N. Sherstyukov Experimental Study of Performance and Security Constraints on Wireless Key Distribution Using Random Phase of Multipath Radio Signal. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Alberto Ferrante, Igor Kaitovic, Jelena Milosevic Modeling Requirements for Security-enhanced Design of Embedded Systems. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Benjamin Aziz, Philippe Massonet, Christophe Ponsard A Formal Model for Forensic Storage Media Preparation Tools. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sandra Diaz-Santiago, Lil María Rodríguez-Henríquez, Debrup Chakraborty A Cryptographic Study of Tokenization Systems. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Muhammad Awais Shibli, Naveed Ahmad, Ayesha Kanwal, Abdul Ghafoor Abbasi Secure Virtual Machine Migration (SV2M) in Cloud Federation. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nikos Virvilis, Nikolaos Tsalis, Alexios Mylonas, Dimitris Gritzalis Mobile Devices - A Phisher's Paradise. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Abdallah Meraoumia, Salim Chitroub, Ahmed Bouridane Robust Multispectral Palmprint Identification System by Jointly Using Contourlet Decomposition & Gabor Filter Response. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Francesco Buccafurri, Gianluca Lax A Novel Pseudo Random Number Generator Based on L'Ecuyer's Scheme. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Marek Sýs, Petr Svenda, Martin Ukrop, Vashek Matyas Constructing Empirical Tests of Randomness. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sebastian Bittl Efficient Construction of Infinite Length Hash Chains with Perfect Forward Secrecy Using Two Independent Hash Functions. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yehia Elrakaiby, Jun Pang 0001 Dynamic Analysis of Usage Control Policies. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rabiî Dariti, El Mamoun Souidi A Steganographic Protocol Based on Linear Error-Block Codes. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Silvia Mella, Filippo Melzani, Andrea Visconti Differential Fault Attacks against AES Tampering with the Instruction Flow. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Damien Couroussé, Bruno Robisson, Jean-Louis Lanet, Thierno Barry, Hassan Noura 0001, Philippe Jaillon, Philippe Lalevée COGITO: Code Polymorphism to Secure Devices. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mihajlo Pavloski, Erol Gelenbe Signaling Attacks in Mobile Telephony. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Vishal Saraswat, Rajeev Anand Sahu A Secure Anonymous Proxy Multi-signature Scheme. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nicolas T. Courtois, Theodosis Mourouzis, Guangyan Song, Pouyan Sepehrdad, Petr Susil Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nirnay Ghosh, Triparna Mondal, Debangshu Chatterjee, Soumya K. Ghosh 0001 Verifying Conformance of Security Implementation with Organizational Access Policies in Community Cloud - A Formal Approach. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  BibTeX  RDF
1Moussa Ouedraogo, Chien-Ting Kuo, Simon Tjoa, David Preston, Eric Dubois 0001, Paulo Simões 0001, Tiago Cruz 0001 Keeping an Eye on Your Security Through Assurance Indicators. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tsvetoslava Vateva-Gurova, Jesus Luna, Giancarlo Pellegrino, Neeraj Suri Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nicolas T. Courtois, Pinar Emirdag, Daniel A. Nagy Could Bitcoin Transactions Be 100x Faster?. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hassan Noura 0001, Steven Martin 0001, Khaldoun Al Agha An Efficient Lightweight Security Algorithm for Random Linear Network Coding. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yuichi Sei, Akihiko Ohsuga Randomized Addition of Sensitive Attributes for l-diversity. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Vandana Guleria, Ratna Dutta Adaptive Oblivious Transfer with Hidden Access Policy Realizing Disjunction. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Frederik Armknecht, Vasily Mikhalev Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream Ciphers. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohammad S. Obaidat, Andreas Holzinger, Pierangela Samarati (eds.) SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014 Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  BibTeX  RDF
1Lamine M. Aouad, Alejandro Mosquera, Slawomir Grzonkowski, Dylan Morss SMS Spam - A Holistic View. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yun Wei, Fushan Wei, Chuangui Ma Certificateless Non-Interactive Key Exchange Protocol without Pairings. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  BibTeX  RDF
1Paulo Shakarian, Damon Paulo, Massimiliano Albanese, Sushil Jajodia Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Edgar R. Weippl Advanced Persistent Threats & Social Engineering. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  BibTeX  RDF
1Mikko Kiviharju RBAC with ABS - Implementation Practicalities for RBAC Integrity Policies. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Antonio Muñoz 0001, Antonio Maña Software and Hardware Certification Techniques in a Combined Certification Model. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jean-François Couchot, Pierre-Cyrille Héam, Christophe Guyeux, Qianxue Wang, Jacques M. Bahi Pseudorandom Number Generators with Balanced Gray Codes. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  BibTeX  RDF
1Seymour E. Goodman A Need-based Assessment for Building a National Cyber Security Workforce. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  BibTeX  RDF
1Saikrishna Badrinarayanan, C. Pandu Rangan Pairing-free Single Round Certificateless and Identity Based Authenticated Key Exchange Protocols. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jinse Shin, Christoph Ruland A Hybrid Approach for Content Based Image Authentication. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Pablo Antón del Pino, Antoine Monsifrot, Charles Salmon-Legagneur, Gwenaël J. Doërr Secure Video Player for Mobile Devices Integrating a Watermarking-based Tracing Mechanism. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sven Schindler, Oliver Eggert, Bettina Schnor, Thomas Scheffler Shellcode Detection in IPv6 Networks with HoneydV6. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Alexander Oprisnik, Daniel M. Hein, Peter Teufl Identifying Cryptographic Functionality in Android Applications. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 1079 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license