The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SecureComm"( http://dblp.L3S.de/Venues/SecureComm )

URL (DBLP): http://dblp.uni-trier.de/db/conf/securecomm

Publication years (Num. hits)
2005 (51) 2006 (56) 2007 (62) 2008 (43) 2009 (27) 2010 (29) 2011 (36) 2012 (22) 2013 (28) 2015 (49) 2016 (49) 2017 (47) 2018-2022 (44) 2023 (1)
Publication types (Num. hits)
inproceedings(531) proceedings(13)
Venues (Conferences, Journals, ...)
SecureComm(544)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 544 publication records. Showing 544 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jens Ove Lauf, Harald Sauff Secure lightweight tunnel for monitoring transport containers. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Assed Jehangir, Sonia M. Heemstra de Groot Securing Personal Network clusters. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Tom Chothia Securing pseudo identities in an anonymous peer-to-peer file-sharing network. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Heesook Choi, Sencun Zhu, Thomas F. La Porta SET: Detecting node clones in sensor networks. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Pekka Nikander Evolution of networking: Current problems and future directions. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Frank J. Suraci, Arye R. Ephrath, John R. Wullert Global interoperability of national security and emergency preparedness (NS/EP) telecommunications services. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Giovanni Frattini, Pierpaolo Petriccione, Giuseppe Leone, Gianluca Supino, Fabio Corvino Beyond web 2.0: enabling multimodal web interactions using VoIP and Ajax. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Kasper Bonne Rasmussen, Srdjan Capkun Implications of radio fingerprinting on the security of sensor networks. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Wassim Itani, Ayman I. Kayssi, Ali Chehab An efficient and scalable Security ProtocoL for protecting fixed-Content Objects in ContEnt aDdressable StoraGe architEctures. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1João P. Vilela, João Barros A feedback reputation mechanism to secure the optimized link state routing protocol. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Maria Gorlatova, Marc Kelly, Ramiro Liscano, Peter C. Mason Enhancing frequency-based wormhole attack detection with novel jitter waveforms. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jian Qiu, Lixin Gao 0001, Supranamaya Ranjan, Antonio Nucci Detecting bogus BGP route information: Going beyond prefix hijacking. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Christer Andersson, Andriy Panchenko 0001 Practical anonymous communication on the mobile internet using Tor. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Michalis Foukarakis, Demetres Antoniades, Spyros Antonatos, Evangelos P. Markatos Flexible and high-performance anonymization of NetFlow records using anontool. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1David Chadwick Aggregation of attributes from different authorities. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Meena Dilip Singh, Ashutosh Saxena Secure computation for data privacy. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptography. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Augusto Ciuffoletti Secure token passing at application level. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Michele Bezzi An entropy based method for measuring anonymity. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Fen Liu, Lei Hu, Li Lu 0001, Weijia Wang Privacy-preserving authentication with low computational overhead for RFID systems. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Kevin Borders, Laura Falk, Atul Prakash 0001 OpenFire: Using deception to reduce network attacks. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Dominic Battré, Karim Djemame, Odej Kao, Kerstin Voß Gaining users' trust by publishing failure probabilities. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Giuseppe Cattaneo, Luigi Catuogno, Fabio Petagna, G. Di Matteo, Luigi Romano iToken: aWireless smart card reader which provides handhelds with desk top equivalent security. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Yoon-chan Jhi, Peng Liu 0005, Lunquan Li, Qijun Gu, Jiwu Jing, George Kesidis PWC: A proactive worm containment solution for enterprise networks. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Timothy W. van der Horst, Kent E. Seamons Simple Authentication for the Web. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Seyit Ahmet Çamtepe, Bülent Yener Modeling and detection of complex attacks. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ruiyi Zhang, Johnson P. Thomas, Venkata Manoj Mulpuru Deception framework for sensor networks. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Michael Rossberg, Guenter Schaefer, Thorsten Strufe Using recurring costs for reputation management in peer-to-peer streaming systems. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Pekka Nikander The Host Identity Protocol (HIP): Bringing mobility, multi- homing, and baseline security together. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Susana Alcalde Bagüés, Jelena Mitic, Elisabeth-Anna Emberger The CONNECT platform: An architecture for Context-Aware Privacy in pervasive environments. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Leonardo Mattes, Leonardo C. Militelli, João Antonio Zuffo Platform to enforce multiple access control policy in grid hosting environment. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Takehiro Takahashi, Wenke Lee An assessment of VoIP covert channel threats. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Aniket Kate, Gregory M. Zaverucha, Urs Hengartner Anonymity and security in delay tolerant networks. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jun Wang, Luigi Lo Iacono Intrusion Detection and tolerance in Grid-based applications. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Sumair Ur Rahman, Urs Hengartner Secure crash reporting in vehicular Ad hoc networks. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee 0001 A secure and efficient key management scheme for wireless sensor networks. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Gautier Dallons, Philippe Massonet, Jean-François Molderez, Christophe Ponsard, Alvaro Arenas An analysis of the chinese wall pattern for guaranteeing confidentiality in grid-based virtual organisations. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan Sensor Networks that Are Provably Resilient. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Sukumal Kitisin, Clifford Neuman Reputation-based Trust-Aware Recommender System. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Stephen Crane, Marco Casassa Mont A Customizable Reputation-based Privacy Assurance System using Active Feedback. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Abhijit Bose, Kang G. Shin On Mobile Viruses Exploiting Messaging and Bluetooth Services. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Chin-Tser Huang, Sachin Thareja, Yong-June Shin Wavelet-based Real Time Detection of Network Traffic Anomalies. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Mohamed Mahmoud Taibah, Ehab Al-Shaer, Raouf Boutaba An Architecture for an Email Worm Prevention System. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jianqing Zhang, Nikita Borisov, William Yurcik Outsourcing Security Analysis with Anonymized Logs. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Emmanuel Hooper An Intelligent Infrastructure Strategy to Improving the Performance and Detection Capability of Intrusion Detection Systems. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ying Xu, Roch Guérin A Double Horizon Defense Design for Robust Regulation of Malicious Traffic. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Trent Jaeger, David H. King, Kevin R. B. Butler, Serge Hallyn, Joy Latten, Xiaolan Zhang 0001 Leveraging IPsec for Mandatory Per-Packet Access Control. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Issa M. Khalil, Saurabh Bagchi, Ness B. Shroff MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Imad Aad, Claude Castelluccia, Jean-Pierre Hubaux Packet Coding for Strong Anonymity in Ad Hoc Networks. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Costin Raiciu, David S. Rosenblum Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Chad D. Mano, David A. Cieslak Passive Wireless Host Detection Using Local RTT Timing Characteristics on an Enterprise Network. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Liu Yang, Markus Jakobsson, Susanne Wetzel Discount Anonymous On Demand Routing for Mobile Ad hoc Networks. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Nenad Jovanovic, Engin Kirda, Christopher Kruegel Preventing Cross Site Request Forgery Attacks. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Qing Zhang 0014, Ting Yu 0001, Peng Ning A Framework for Identifying Compromised Nodes in Sensor Networks. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Frank Fransen, Sven Lachmund, Eddy Olk, Laurent Bussard An Infrastructure for Gaining Trust in Context Information. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Michael J. Chapple, Timothy E. Wright, Robert M. Winding Flow Anomaly Detection in Firewalled Networks. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Chandana Gamage, Ben Gras, Bruno Crispo, Andrew S. Tanenbaum An Identity-based Ring Signature Scheme with Enhanced Privacy. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Andrew Stewart Efficient visualization of change events in enterprise networks. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick D. McDaniel Non-Invasive Methods for Host Certification. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jonathan T. Trostle Protecting Against Distributed Denial of Service (DDoS) Attacks Using Distributed Filtering. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Gary Pack, Jaeyoung Yoon, Eli Collins, Cristian Estan On Filtering of DDoS Attacks Based on Source Address Prefixes. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jared Cordasco, Ulrike Meyer, Susanne Wetzel Implementation and Performance Evaluation of EAP-TLS-KS. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Peter Kruus, Daniel Sterne, Richard Gopaul, Michael Heyman, Brian Rivera, Peter Budulas, Brian Luu, Tommy Johnson, Natalie Ivanic, Geoffrey Lawler In-Band Wormholes and Countermeasures in OLSR Networks. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Timothy E. Wright, Michael J. Chapple, Robert M. Winding Work in Progress: Streamlined IT Risk Management through a Micro Risk Management System (μRMS). Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Stephan Groß Towards Cooperative Self-Protecting Mobile Devices using Trustful Relationships. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Radmilo Racic, Denys Ma, Hao Chen 0003 Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Catherine Meadows 0001, Paul F. Syverson, LiWu Chang Towards More Efficient Distance Bounding Protocols for Use in Sensor Networks. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Songqing Chen, Shiping Chen 0003, Xinyuan Wang 0005, Sushil Jajodia DaTA - Data-Transparent Authentication Without Communication Overhead. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Wei Yu 0002, Xun Wang, Dong Xuan, David Lee Effective Detection of Active Worms with Varying Scan Rate. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jennifer Golbeck Computing with Trust: Definition, Properties, and Algorithms. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Dingbang Xu, Peng Ning A Flexible Approach to Intrusion Alert Anonymization and Correlation. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1George Theodorakopoulos 0001, John S. Baras Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc Networks. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Gaurav Kataria, Gaurav Anand, Rudolph Araujo, Ramayya Krishnan, Adrian Perrig A Distributed Stealthy Coordination Mechanism for Worm Synchronization. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Baik Hoh, Marco Gruteser, Hui Xiong 0001, Ansaf Alrabady Enhancing Privacy Preservation of Anonymous Location Sampling Techniques in Traffic Monitoring Systems. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Abdelaziz Babakhouya, Yacine Challal, Abdelmadjid Bouabdallah, Said Gharout S-DV: A new approach to Secure Distance Vector routing protocols. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Navid Jam, Elliot Proebstel Work in Progress: Who is Watching You? Video Conferencing Security. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Lara Srour, Ayman I. Kayssi, Ali Chehab Reputation-Based Algorithm for Managing Trust in File Sharing Networks. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Linfeng Zhang, Yong Guan TOPO: A Topology-aware Single Packet Attack Traceback Scheme. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Avinanta Tarigan Towards Communal Governed Transactions Among Decentralized Trading Agents. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Samuel Galice, Véronique Legrand, Marine Minier, John Mullins, Stéphane Ubéda A History-Based Framework to Build Trust Management Systems. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jiangtao Li 0001, Ninghui Li, XiaoFeng Wang 0001, Ting Yu 0001 Denial of Service Attacks and Defenses in Decentralized Trust Management. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Katharine Chang, Kang G. Shin Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Stefan Lindskog, Anna Brunström, Zoltán Faigl, Katalin Toth Providing Tunable Security Services: An IEEE 802.11i Example. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Xuhua Ding, Shuhong Wang 0001, Baihua Zheng Secure Real-time User Preference Collection for Broadcast Scheduling. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1 Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August 2, 2006 - September 1, 2006 Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  BibTeX  RDF
1Sule Simsek Work in Progress - Tracking Correlated Attacks in Enterprise Intranets through Lattices. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Robert M. Winding, Timothy E. Wright, Michael J. Chapple System Anomaly Detection: Mining Firewall Logs. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Tri Van Le, Breno de Medeiros Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Nicholas Weaver, Vern Paxson, Robin Sommer Work in Progress: Bro-LAN Pervasive Network Inspection and Control for LAN Traffic. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Liang Xie 0002, Sencun Zhu Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Weiliang Zhao, Vijay Varadharajan, George Bryan A Unified Framework for Trust Management. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Chris Piro, Clay Shields, Brian Neil Levine Detecting the Sybil Attack in Mobile Ad hoc Networks. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jim Basney, Patrick Flanigan, Jin Heo, Himanshu Khurana, Joe Muggli, Meenal Pant, Adam J. Slagell, Von Welch Mithril: Adaptable Security for Survivability in Collaborative Computing Sites. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Marco Voss, Andreas Heinemann, Max Mühlhäuser A Privacy Preserving Reputation System for Mobile Information Dissemination Networks. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Indrakshi Ray, Lijun Yu Short Paper: Towards a Location-Aware Role-Based Access Control Model. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Daniel Socek, Shujun Li, Spyros S. Magliveras, Borko Furht Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Amir A. Sayegh, Mahmoud T. El-Hadidi A Modified Secure Remote Password (SRP) Protocol for Key Initialization and Exchange in Bluetooth Systems. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1 First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, Athens, Greece, 5-9 September, 2005 Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  BibTeX  RDF
1Xiaoxin Wu 0001, Cristina Nita-Rotaru On the Security of Distributed Position Services. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Rajeev Koodli, Vijay Devarapalli, Hannu Flinck, Charles E. Perkins Short Paper: Location Privacy with IP Mobility. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 544 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license