|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1928 occurrences of 929 keywords
|
|
|
Results
Found 2507 publication records. Showing 2507 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Penny Duquenoy, Carlisle Eldwidge George, Anthony Solomonides |
What ELSE? Regulation and Compliance in Medical Imaging and Medical Informatics. |
MIMI |
2007 |
DBLP DOI BibTeX RDF |
Ethical principles, material quality, electronic medical data, shared data processing, shared access, jurisdictional responsibility, usability, accessibility, data integrity, training, confidentiality, data protection, standardisation, informed consent |
15 | Anindya Banerjee 0001, David A. Naumann, Stan Rosenberg |
Towards a logical account of declassification. |
PLAS |
2007 |
DBLP DOI BibTeX RDF |
information flow, confidentiality, aliasing |
15 | Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl |
An Information Flow Verifier for Small Embedded Systems. |
WISTP |
2007 |
DBLP DOI BibTeX RDF |
class loading, information flow, confidentiality, type checking |
15 | Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl |
Embedding verifiable information flow analysis. |
PST |
2006 |
DBLP DOI BibTeX RDF |
embedded systems, static analysis, information flow, confidentiality, language-based security, smart objects |
15 | Merv Matson, Mihaela Ulieru |
The 'how' and 'why' of persistent information security. |
PST |
2006 |
DBLP DOI BibTeX RDF |
avaliability, emergency response operations, information custodian, infosec, persistent information security, integrity, information security, confidentiality, digital rights management, DRM |
15 | Michael Boyle, Saul Greenberg |
The language of privacy: Learning from video media space analysis and design. |
ACM Trans. Comput. Hum. Interact. |
2005 |
DBLP DOI BibTeX RDF |
environmental psychology, solitude, video media spaces, privacy, Human-computer interaction, computer-supported cooperative work (CSCW), user interface design, social interaction, confidentiality, autonomy |
15 | Qingfeng Chen, Chengqi Zhang, Shichao Zhang 0001 |
ENDL: A Logical Framework for Verifying Secure Transaction Protocols. |
Knowl. Inf. Syst. |
2005 |
DBLP DOI BibTeX RDF |
Secure transaction protocol, Security, Verification, Integrity, Electronic commerce, Confidentiality |
15 | Béatrice Finance, Saïda Medjdoub, Philippe Pucheral |
The case for access control on XML relationships. |
CIKM |
2005 |
DBLP DOI BibTeX RDF |
XML relationship, need-to-know and consent principles, data confidentiality, XML access control |
15 | Gilles Barthe, Tamara Rezk |
Non-interference for a JVM-like language. |
TLDI |
2005 |
DBLP DOI BibTeX RDF |
type systems, confidentiality, low level languages |
15 | Rachid Echahed, Frédéric Prost |
Security policy in a declarative style. |
PPDP |
2005 |
DBLP DOI BibTeX RDF |
confidentiality, non-interference |
15 | Arun Subbiah, Douglas M. Blough |
An approach for fault tolerant and secure data storage in collaborative work environments. |
StorageSS |
2005 |
DBLP DOI BibTeX RDF |
replication, secret sharing, confidentiality, collaborative environments, Byzantine fault tolerance, distributed data storage |
15 | Vishal Kher, Yongdae Kim |
Securing distributed storage: challenges, techniques, and systems. |
StorageSS |
2005 |
DBLP DOI BibTeX RDF |
privacy, intrusion detection, integrity, authorization, confidentiality |
15 | Krishnamurty Muralidhar, Rathindra Sarathy |
A theoretical basis for perturbation methods. |
Stat. Comput. |
2003 |
DBLP DOI BibTeX RDF |
statistical disclosure limitation, confidentiality, perturbation, disclosure risk, data masking |
15 | Menno Cuppen, Leon Willenborg |
Source Data Perturbation and consistent sets of safe tables. |
Stat. Comput. |
2003 |
DBLP DOI BibTeX RDF |
table protection, confidentiality, data warehousing, disclosure, noise addition |
15 | Krishnamurty Muralidhar, Rathindra Sarathy |
A rejoinder to the comments by Polettini and Stander. |
Stat. Comput. |
2003 |
DBLP DOI BibTeX RDF |
statistical disclosure limitation, confidentiality, perturbation, disclosure risk, data masking |
15 | Luisa Franconi, Julian Stander |
Spatial and non-spatial model-based protection procedures for the release of business microdata. |
Stat. Comput. |
2003 |
DBLP DOI BibTeX RDF |
Community Innovation Survey, conditional autoregressive scheme, performance assessment for disclosure limitation methods, confidentiality, Gibbs sampler |
15 | Jerome P. Reiter |
Model Diagnostics for Remote Access Regression Servers. |
Stat. Comput. |
2003 |
DBLP DOI BibTeX RDF |
regression, confidentiality, diagnostics, remote access, disclosure, synthetic data |
15 | Barry Schouten, Marc Cigrang |
Remote access systems for statistical analysis of microdata. |
Stat. Comput. |
2003 |
DBLP DOI BibTeX RDF |
confidentiality, remote access, remote execution, microdata |
15 | Roberto Di Pietro, Antonio Durante, Luigi V. Mancini |
A Reliable Key Authentication Schema for Secure Multicast Communications. |
SRDS |
2003 |
DBLP DOI BibTeX RDF |
Secure multicast communications, logical key hierarchy, re-keying, security, authenticity, confidentiality, key distribution, group key management |
15 | Jill Lynn Tyler |
The Healthcare Information Technology Context: A Framework for Viewing Legal Aspects of Telemedicine and Teleradiology. |
HICSS |
2001 |
DBLP DOI BibTeX RDF |
Healthcare informatics, medical data transfer, adoption barriers, privacy, standards, information technology, confidentiality, telemedicine, data security, teleradiology, radiology, legal issues, medical records |
15 | Refik Molva, Alain Pannetrat |
Scalable multicast security with dynamic recipient groups. |
ACM Trans. Inf. Syst. Secur. |
2000 |
DBLP DOI BibTeX RDF |
scalability, RSA, group communications, confidentiality, key distribution, Diffie-Hellman |
15 | Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam |
Secure group communications using key graphs. |
IEEE/ACM Trans. Netw. |
2000 |
DBLP DOI BibTeX RDF |
security, privacy, multicast, group communications, confidentiality, key distribution, group key management, rekeying |
15 | Edgar R. Weippl |
Coimbra: secure Web access to multimedia content. |
ACM Multimedia Workshops |
2000 |
DBLP DOI BibTeX RDF |
encryption, confidentiality, security model, discretionary access control |
15 | Dale M. Johnson, Lee A. Benzinger |
Layering Boundary Protections: An Experiment in Information Assurance. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
DARPA Information Assurance Program, boundary protection layering, attack protection, experiment, security of data, data security, client-server systems, client server system, data privacy, data confidentiality |
15 | Erland Jonsson |
An Integrated Framework for Security and Dependability. |
Workshop on New Security Paradigms |
1998 |
DBLP DOI BibTeX RDF |
modellings, measure, dependability, computer security, confidentiality, concepts |
15 | Aris Zakinthinos, E. Stewart Lee |
A General Theory of Security Properties. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
possibilistic security properties, low level event sequence, security predicate, high level users, low level users, Selective Interleaving Functions framework, information theory, information flow, security of data, partial ordering, data confidentiality, event systems |
15 | Roshan K. Thomas, Ravi S. Sandhu |
A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases. |
IEEE Trans. Knowl. Data Eng. |
1996 |
DBLP DOI BibTeX RDF |
secure write-up, trusted subject architecture, confidentiality proof, object-oriented databases, covert channels, Multilevel security |
15 | Jan Schlörer |
Security of Statistical Databases: Multidimensional Transformation. |
ACM Trans. Database Syst. |
1981 |
DBLP DOI BibTeX RDF |
security, database, confidentiality, database security, statistical database, matrices |
15 | Dorothy E. Denning |
Secure Statistical Databases with Random Sample Queries. |
ACM Trans. Database Syst. |
1980 |
DBLP DOI BibTeX RDF |
sampling, confidentiality, database security, statistical database, disclosure controls |
15 | Dorothy E. Denning, Jan Schlörer |
A Fast Procedure for Finding a Tracker in a Statistical Database. |
ACM Trans. Database Syst. |
1980 |
DBLP DOI BibTeX RDF |
confidentiality, data security, database security, statistical database, tracker |
15 | Dorothy E. Denning, Peter J. Denning, Mayer D. Schwartz |
The Tracker: A Threat to Statistical Database Security. |
ACM Trans. Database Syst. |
1979 |
DBLP DOI BibTeX RDF |
secure query functions, confidentiality, data security, database security, statistical database, tracker |
15 | Mayer D. Schwartz, Dorothy E. Denning, Peter J. Denning |
Linear Queries in Statistical Databases. |
ACM Trans. Database Syst. |
1979 |
DBLP DOI BibTeX RDF |
linear query, secure query functions, statical database, inference, confidentiality, data security, database security |
14 | |
To change the world, take a chance. |
Commun. ACM |
2011 |
DBLP DOI BibTeX RDF |
|
14 | |
UX design and agile: a natural fit? (Talking with Julian Gosper, Jean-Luc Agathos, Richard Rutter, and Terry Coatta). |
Commun. ACM |
2011 |
DBLP DOI BibTeX RDF |
|
14 | |
In the Virtual Extension. |
Commun. ACM |
2011 |
DBLP DOI BibTeX RDF |
|
14 | Ashish Kundu, Elisa Bertino |
How to authenticate graphs without leaking. |
EDBT |
2010 |
DBLP DOI BibTeX RDF |
|
14 | Aameek Singh, Mudhakar Srivatsa, Ling Liu 0001 |
Search-as-a-service: Outsourced search over outsourced storage. |
ACM Trans. Web |
2009 |
DBLP DOI BibTeX RDF |
Search-as-a-Service, access control aware search, cloud search, cloud storage |
14 | Xiaojun Tang 0001, Ruoheng Liu, Predrag Spasojevic, H. Vincent Poor |
On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels. |
IEEE Trans. Inf. Theory |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Llanos Tobarra, Diego Cazorla, Fernando Cuartero, Gregorio Díaz 0001, María-Emilia Cambronero |
Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK. |
Telecommun. Syst. |
2009 |
DBLP DOI BibTeX RDF |
AVISPA toolbox, Model checking, Security protocols, Wireless sensor |
14 | Yun Li 0011, Leron Lightfoot, Jian Ren 0001 |
Routing-based source-location privacy protection in wireless sensor networks. |
EIT |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Christos Ioannidis, David J. Pym, Julian Williams |
Investments and Trade-offs in the Economics of Information Security. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Rui Zhang 0007, Jing Shi 0002, Yanchao Zhang |
Secure multidimensional range queries in sensor networks. |
MobiHoc |
2009 |
DBLP DOI BibTeX RDF |
multidimensional range query, security, sensor networks |
14 | Joachim Biskup, Jan-Hendrik Lochner, Sebastian Sonntag |
Optimization of the Controlled Evaluation of Closed Relational Queries. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Vik Tor Goh, Jacob Zimmermann, Mark Looi |
Towards Intrusion Detection for Encrypted Networks. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Jeff Sedayao, Steven Su, Xiaohao Ma, Minghao Jiang, Kai Miao |
A Simple Technique for Securing Data at Rest Stored in a Computing Cloud. |
CloudCom |
2009 |
DBLP DOI BibTeX RDF |
Data at Rest Storage, Security, Cloud Computing, Encryption, PlanetLab |
14 | Ravi Akella, Bruce M. McMillin |
Model-Checking BNDC Properties in Cyber-Physical Systems. |
COMPSAC (1) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Mohsen Toorani, Ali Asghar Beheshti Shirazi |
A directly public verifiable signcryption scheme based on elliptic curves. |
ISCC |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Avraham Shinnar, Marco Pistoia, Anindya Banerjee 0001 |
A language for information flow: dynamic tracking in multiple interdependent dimensions. |
PLAS |
2009 |
DBLP DOI BibTeX RDF |
information flow control, declassification, security type system |
14 | Jim E. Smith, Alistair R. Clark, Andrea T. Staggemeier |
A genetic approach to statistical disclosure control. |
GECCO |
2009 |
DBLP DOI BibTeX RDF |
statistical disclosure control |
14 | Chaoting Xuan, John A. Copeland, Raheem A. Beyah |
Shepherding Loadable Kernel Modules through On-demand Emulation. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
Rootkit Prevention, On-demand Emulation, Emulator, Virtual Machine Monitor |
14 | S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan |
Identity Based Aggregate Signcryption Schemes. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Aggregate Signcryption, Provable Security, Bilinear Pairings, Random Oracle Model, Identity Based Cryptography |
14 | Takahiro Matsuda 0002, Kanta Matsuura, Jacob C. N. Schuldt |
Efficient Constructions of Signcryption Schemes and Signcryption Composability. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
multi-user security, signcryption, generic construction |
14 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
Multi-Signcryption, Cryptanalysis, Provable Security, Bilinear Pairing, Signcryption, Random Oracle Model, Identity Based Cryptography |
14 | Lander Casado, Philippas Tsigas |
ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System. |
NordSec |
2009 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks Security, Link Layer Security |
14 | Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Basney, Himanshu Khurana |
Usable secure mailing lists with untrusted servers. |
IDtrust |
2009 |
DBLP DOI BibTeX RDF |
e-mail list security, usability study, proxy re-encryption |
14 | Alexander Yip, Neha Narula, Maxwell N. Krohn, Robert Tappan Morris |
Privacy-preserving browser-side scripting with BFlow. |
EuroSys |
2009 |
DBLP DOI BibTeX RDF |
javascript, labels, information flow control, web platforms |
14 | Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole Bai, Dong Xuan |
Link-layer protection in 802.11i WLANS with dummy authentication. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
dummy authentication, security, wlan, open access |
14 | Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Marcel Winandy, Rani Husseiki, Christian Stüble |
Flexible and secure enterprise rights management based on trusted virtual domains. |
STC |
2008 |
DBLP DOI BibTeX RDF |
enterprise rights management (ERM), trusted virtual domain (TVD), security policy, trusted computing |
14 | Chris Kürschner, Cosmin Condea, Oliver Kasten, Frédéric Thiesse |
Discovery Service Design in the EPCglobal Network. |
IOT |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Vineela Devarashetty, Jeffrey J. P. Tsai, Lu Ma, Du Zhang |
Modeling a secure sensor network system using an Extended Elementary Object System. |
IEEE ICCI |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Stephen Chong, Andrew C. Myers |
End-to-End Enforcement of Erasure and Declassification. |
CSF |
2008 |
DBLP DOI BibTeX RDF |
Erasure, Expressive security policies, Information flow, Language-based security, Noninterference, Declassification |
14 | Stéphane Onno |
A Federated Physical and Logical Access Control Enforcement Model. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
access control federation, logical access control, physical access control, Bell-lapadula |
14 | Raylin Tso |
Signcryption Scheme with Standardized Verification Algorithm. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Peter Christen |
Geocode Matching and Privacy Preservation. |
PinKDD |
2008 |
DBLP DOI BibTeX RDF |
privacy preservation, secure multi-party computations, record linkage, entity resolution, geocoding, Data matching |
14 | Matthias Werner 0001, Michael A. Jaeger, Helge Parzyjegla |
An Application of the (max, +) Algebra to Information Flow Security. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
maxplus, security, information flow, lattice model |
14 | Benoît Badrignans, Reouven Elbaz, Lionel Torres |
Secure update Mechanism for Remote Update of FPGA-Based System. |
SIES |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Muzammil Khan, Attiq Ahmed, Ahmad Raza Cheema |
Vulnerabilities of UMTS Access Domain Security Architecture. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
UMTS vulnerabilities, DoS attacks on UMTS, Security, UMTS |
14 | S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan |
Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme. |
WISA |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Provable Security, Bilinear Pairing, Broadcast Encryption, Signcryption, Random Oracle, ID-based Cryptosystem |
14 | Rohit Chadha, Carl A. Gunter, José Meseguer 0001, Ravinder Shankesi, Mahesh Viswanathan 0001 |
Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers. |
FMOODS |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Giovanni Russello, Changyu Dong, Naranker Dulay, Michel R. V. Chaudron, Maarten van Steen |
Encrypted Shared Data Spaces. |
COORDINATION |
2008 |
DBLP DOI BibTeX RDF |
|
14 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan, Neha Jain |
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Ioana Rodhe, Christian Rohner |
n-LDA: n-Layers Data Aggregation in Sensor Networks. |
ICDCS Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
14 | S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, C. Pandu Rangan |
Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
14 | William Enck, Kevin R. B. Butler, Thomas Richardson, Patrick D. McDaniel, Adam D. Smith |
Defending Against Attacks on Main Memory Persistence. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Roberto Capizzi, Antonio Longo, V. N. Venkatakrishnan, A. Prasad Sistla |
Preventing Information Leaks through Shadow Executions. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Per Närman, Marten Schönherr, Pontus Johnson, Mathias Ekstedt, Moustafa Chenine |
Using Enterprise Architecture Models for System Quality Analysis. |
EDOC |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Charlie Obimbo, Behzad Salami 0002 |
A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption. |
J. Supercomput. |
2007 |
DBLP DOI BibTeX RDF |
Inverse of a matrix, Row-echelon reduction, Parallel Algorithms, Cryptography, Block Ciphers, Modular arithmetic, Systems of linear equations |
14 | Joonsang Baek, Ron Steinfeld, Yuliang Zheng 0001 |
Formal Proofs for the Security of Signcryption. |
J. Cryptol. |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Manhee Lee, Eun Jung Kim 0001 |
A Comprehensive Framework for Enhancing Security in InfiniBand Architecture. |
IEEE Trans. Parallel Distributed Syst. |
2007 |
DBLP DOI BibTeX RDF |
Cluster Security, InfiniBand Architecture, Galois/Counter Mode, Availability DoS, Authentication, Encryption |
14 | Stephen Tse, Steve Zdancewic |
Run-time principals in information-flow type systems. |
ACM Trans. Program. Lang. Syst. |
2007 |
DBLP DOI BibTeX RDF |
Decentralized label model, dynamic principals, run-time principals, security-typed language, type systems, information-flow, soundness, noninterference |
14 | Meng Yu 0001, Peng Liu 0005, Wanyu Zang, Sushil Jajodia |
Trusted Recovery. |
Secure Data Management in Decentralized Systems |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Manghui Tu, Liangliang Xiao, Hui Ma 0006, I-Ling Yen, Farokh B. Bastani |
Placement in Dependable and Secure Peer-to-Peer Data Grids. |
HASE |
2007 |
DBLP DOI BibTeX RDF |
|
14 | George Spanoudakis, Christos Kloukinas, Kelly Androutsopoulos |
Towards security monitoring patterns. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
runtime monitoring, event calculus, security patterns |
14 | Chik How Tan |
Insider-secure Hybrid Signcryption SchemeWithout Random Oracles. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Ettore Merlo, Dominic Letarte, Giuliano Antoniol |
Automated Protection of PHP Applications Against SQL-injection Attacks. |
CSMR |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Somanath Tripathy |
LISA: LIghtweight Security Algorithm for Wireless Sensor Networks. |
ICDCIT |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Le Yang 0003, Yongsun Choi |
A Flexible Access Control Model for Dynamic Workflow Using Extended WAM and RBAC. |
CSCWD (Selected Papers) |
2007 |
DBLP DOI BibTeX RDF |
Workflow Authorization Model, Role-based Access Control, Workflow System |
14 | Saar Drimer |
Authentication of FPGA Bitstreams: Why and How. |
ARC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Janus Dam Nielsen, Michael I. Schwartzbach |
A domain-specific programming language for secure multiparty computation. |
PLAS |
2007 |
DBLP DOI BibTeX RDF |
SMCL, design, implementation, analysis |
14 | Dominik Engel, Thomas Stütz, Andreas Uhl |
Format-compliant jpeg2000 encryption with combined packet header and packet body protection. |
MM&Sec |
2007 |
DBLP DOI BibTeX RDF |
format-compliant encryption, packet body encryption, packet header encryption, JPEG2000 |
14 | Takuya Mishina, Sachiko Yoshihama, Michiharu Kudo |
Fine-Grained Sticky Provenance Architecture for Office Documents. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Zhong Xu, Guanzhong Dai, Deming Yang |
An Efficient Online/Offline Signcryption Scheme for MANET. |
AINA Workshops (2) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Mohamed Nabeel, Elisa Bertino |
A structure preserving approach for securing XML documents. |
CollaborateCom |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Kevin S. Killourhy, Roy A. Maxion |
Toward Realistic and Artifact-Free Insider-Threat Data. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Lenin Singaravelu, Calton Pu |
Fine-Grain, End-to-End Security for Web Service Compositions. |
IEEE SCC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Olivier Verscheure, Michail Vlachos, Aris Anagnostopoulos, Pascal Frossard, Eric Bouillet, Philip S. Yu |
Finding "Who Is Talking to Whom" in VoIP Networks via Progressive Stream Clustering. |
ICDM |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Johannes Gehrke |
Models and Methods for Privacy-Preserving Data Analysis and Publishing. |
ICDE |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Xintao Wu, Songtao Guo, Yingjiu Li |
Towards value disclosure analysis in modeling general databases. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
disclosure analysis, general location model, privacy |
14 | Stephen Chong, Andrew C. Myers |
Decentralized Robustness. |
CSFW |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Alban Gabillon, Laurent Gallon |
Availability Constraints for Avionic Data Buses. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 2507 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|