The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for owner with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1974-1990 (17) 1991-1996 (15) 1997-1998 (15) 1999 (17) 2000 (26) 2001 (30) 2002 (41) 2003 (49) 2004 (63) 2005 (90) 2006 (91) 2007 (105) 2008 (77) 2009 (77) 2010-2011 (22) 2012-2013 (21) 2014-2015 (28) 2016 (27) 2017 (18) 2018 (19) 2019 (24) 2020 (25) 2021 (26) 2022 (25) 2023 (29) 2024 (3)
Publication types (Num. hits)
article(219) book(2) incollection(4) inproceedings(752) phdthesis(3)
Venues (Conferences, Journals, ...)
CoRR(16) HICSS(13) ARES(10) ICDE(9) ACISP(8) CHI Extended Abstracts(8) SAC(8) DEXA Workshops(7) ICICS(7) SIGMOD Conference(7) ICIS(6) SEC(6) WPES(6) ACM Trans. Database Syst.(5) AGILE(5) CCGRID(5) More (+10 of total 610)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 838 occurrences of 624 keywords

Results
Found 980 publication records. Showing 980 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Serge Abiteboul, Bogdan Cautis, Amos Fiat, Tova Milo Digital Signatures for Modifiable Collections. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Shamik Sengupta, Mainak Chatterjee Synchronous and Asynchronous Auction Models for Dynamic Spectrum Access. Search on Bibsonomy ICDCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Zhengping Wu, Alfred C. Weaver Bridging Trust Relationships with Web Service Enhancements. Search on Bibsonomy ICWS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Juggapong Natwichai, Xue Li 0001, Maria E. Orlowska A reconstruction-based algorithm for classification rules hiding. Search on Bibsonomy ADC The full citation details ... 2006 DBLP  BibTeX  RDF
17Jarogniew Rykowski Who should take care of the personalization? Search on Bibsonomy I3E The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Weiwei Cheng, HweeHwa Pang, Kian-Lee Tan Authenticating Multi-dimensional Query Results in Data Publishing. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Mauro Barni, Claudio Orlandi, Alessandro Piva A privacy-preserving protocol for neural-network-based computation. Search on Bibsonomy MM&Sec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy-preserving computation, neural networks
17Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Elena Ferrari, Indrakshi Ray Trust Negotiations with Customizable Anonymity. Search on Bibsonomy IAT Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Wentian Lu, Jun Li 0022, XianPing Tao, Xiaoxing Ma, Jian Lu 0001 Shadow: A Middleware in Pervasive Computing Environment for User Controllable Privacy Protection. Search on Bibsonomy EuroSSC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Kyung-Sang Sung, Seung-Heon Lee, Bo-Hyun Wang, Hae-Seok Oh Digital Watermark System based on improved security through Pre-Processing of watermarked data using Information of Image Discrete Frequency. Search on Bibsonomy SERA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Barbara Carminati, Elena Ferrari Confidentiality Enforcement for XML Outsourced Data. Search on Bibsonomy EDBT Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Zhengping Wu, Alfred C. Weaver Using web service enhancements to bridge business trust relationships. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF web service enhancements, web service, trust management, trust establishment
17Wenqi Liu, Jianhua Yang, Lei Wei A Secure Threshold Proxy Signature Scheme for Mobile Agent-Based Electronic Commerce Transactions. Search on Bibsonomy PDCAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17David Molnar, Andrea Soppera, David A. Wagner 0001 A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Günter Karjoth, Paul A. Moskowitz Disabling RFID tags with visible confirmation: clipped tags are silenced. Search on Bibsonomy WPES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privacy, RFID
17Basie von Solms, Bobby L. Tait Biovault: Solving the Problem of Replay in Biometrics. Search on Bibsonomy I3E The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Biometric Tokens, Authentication, Electronic Commerce, Biometrics, Identification, Replay, Identity theft
17HweeHwa Pang, Arpit Jain, Krithi Ramamritham, Kian-Lee Tan Verifying Completeness of Relational Query Results in Data Publishing. Search on Bibsonomy SIGMOD Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Juggapong Natwichai, Xue Li 0001, Maria E. Orlowska Hiding Classification Rules for Data Sharing with Privacy Preservation. Search on Bibsonomy DaWaK The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Ganesh Ramesh Can Attackers Learn from Samples? Search on Bibsonomy Secure Data Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Jianhong Zhang, Jiancheng Zou, Yumin Wang A Novel and Secure Non-designated Proxy Signature Scheme for Mobile Agents. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Bob Blakley 0001, G. R. Blakley All Sail, No Anchor III: Risk Aggregation and Time's Arrow. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Patrick R. Eaton, Hakim Weatherspoon, John Kubiatowicz Efficiently Binding Data to Owners in Distributed Content-Addressable Storage Systems. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Hung-Min Sun, Chen-Jung Hong, Chiung-Hsun Chen A new approach to feature-based copyright protection of images. Search on Bibsonomy ITRE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Ernö Jeges, Zoltán Hornák, Csaba Körmöczi Encoding Private Key in Fingerprint. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Frances M. T. Brazier, Anja Oskamp, Corien Prins, Maurice Schellekens, Niek J. E. Wijngaards Law-abiding and integrity on the Internet: A case for agents. Search on Bibsonomy Artif. Intell. Law The full citation details ... 2004 DBLP  DOI  BibTeX  RDF agent migration, integrity, software agents, legal aspects, agent platforms, liability
17Keith B. Frikken, Mikhail J. Atallah Privacy preserving route planning. Search on Bibsonomy WPES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF privacy, pervasive computing, security protocols
17Kay Connelly, Ashraf Khalil On Negotiating Automatic Device Configuration in Smart Environments. Search on Bibsonomy PerCom Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Goran Martinovic, Leo Budin Human in computational grid establishment. Search on Bibsonomy SMC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Gwo-Chin Tai, Long-Wen Chang Visual Cryptography for Digital Watermarking in Still Images. Search on Bibsonomy PCM (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF wavelet packet transform, digital watermarking, Visual cryptography
17Ludwig Seitz, Jean-Marc Pierson, Lionel Brunie Semantic Access Control for Medical Applications in Grid Environments. Search on Bibsonomy Euro-Par The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Matei Ciobanu Morogan, Sead Muftic Certificate Management in Ad Hoc Networks. Search on Bibsonomy SAINT Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Pino Persiano, Ivan Visconti An Anonymous Credential System and a Privacy-Aware PKI. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Shiguang Ju, Héctor J. Hernández, Lan Zhang A Security Access Control Mechanism for a Multi-layer Heterogeneous Storage Structure. Search on Bibsonomy GCC (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Object-relational data structure, Spatial databases, Mandatory Access Control, Discretionary Access Control
17Liang Zhang, Jiannong Cao 0001, Sajal K. Das 0001 A Mailbox-Based Scheme for Improving Mobile IP Performance. Search on Bibsonomy ICDCS Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Navin Goyal, Michael E. Saks, Srinivasan Venkatesh 0001 Optimal Separation of EROW and CROWPRAMs. Search on Bibsonomy CCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng An Efficient Public-Key Framework. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17PeiZong Lee, Zvi M. Kedem Automatic data and computation decomposition on distributed memory parallel computers. Search on Bibsonomy ACM Trans. Program. Lang. Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Computation decomposition, dominant data array, iteration space mapping vector, spatial dependence vector, temporal dependence vector, tiling techniques, parallelizing compilers, data distribution, distributed-memory computers, data alignment
17Michael Factor, Assaf Schuster, Konstantin Shagin Execution of monolithic Java programs on large non-dedicated collections of commodity workstations. Search on Bibsonomy Java Grande The full citation details ... 2002 DBLP  DOI  BibTeX  RDF high-level programming paradigm, non-dedicated environment, utilization of idle resources, fault tolerance, distributed shared memory
17Michelle Mills Strout, Larry Carter, Jeanne Ferrante, Jonathan Freeman, Barbara Kreaseck Combining Performance Aspects of Irregular Gauss-Seidel Via Sparse Tiling. Search on Bibsonomy LCPC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Paul A. Buhler, Michael N. Huhns Agents on the Web: Trust and Persistence. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Josep Domingo-Ferrer Mobile Agent Route Protection through Hash-Based Mechanisms. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF agent route protection, Mobile agent security, Merkle trees, hash collisions
17Spyridoula M. Armeni, Dimitris Christodoulakis, Ioannis Kostopoulos, Polychronis D. Kountrias, Yannis C. Stamatiou, Michalis Nik Xenos An Information Hiding Method Based on Computational Intractable Problems. Search on Bibsonomy Panhellenic Conference on Informatics The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Artur Romão, Miguel Mira da Silva Secure Mobile Agent Digital Signatures with Proxy Certificates. Search on Bibsonomy E-Commerce Agents The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Tage Stabell-Kulø Smartcards: Hot to Put them to Use in a User-Centric System. Search on Bibsonomy HUC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Francis Zane Efficient Watermark Detection and Collusion Security. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Alessandra Lumini, Dario Maio A Wavelet-Based Image Watermarking Scheme. Search on Bibsonomy ITCC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Dirk Westhoff, Markus Schneider 0002, Claus Unger, Firoz Kaderali Methods for Protecting a Mobile Agent's Route. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Yi Mu 0001, Vijay Varadharajan, Khanh Quoc Nguyen Delegated Decryption. Search on Bibsonomy IMACC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Robert S. Gray, David Kotz, George Cybenko, Daniela Rus D'Agents: Security in a Multiple-Language, Mobile-Agent System. Search on Bibsonomy Mobile Agents and Security The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Xun Yi, Xiao Feng Wang, Kwok-Yan Lam A Secure Intelligent Trade Agent System. Search on Bibsonomy Trends in Distributed Systems for Electronic Commerce The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Richard Pikes The role of truth maintenance in model-based reasoning (abstract only). Search on Bibsonomy ACM Conference on Computer Science The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
17Patrick W. Dymond, Walter L. Ruzzo Parallel RAMs with Owned Global Memory and Deterministic Context-Free Language Recognition (Extended Abstract). Search on Bibsonomy ICALP The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
17Dennis Tsichritzis Comments on Advantages of the Relational View. Search on Bibsonomy SIGMOD Workshop, Vol. 2 The full citation details ... 1974 DBLP  DOI  BibTeX  RDF
8Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta Security validation tool for business processes. Search on Bibsonomy SACMAT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
8Matthew Canton The presence table: a reactive surface for ambient connection. Search on Bibsonomy TEI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
8Prashanth G. Reddy, Nigamanth Sridhar Lakon: a middle-ground approach to high-frequency data acquisition and in-network processing in sensor networks. Search on Bibsonomy IPSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF wireless sensor networks, digital signal processing
8Virgilio Rodriguez, Rudolf Mathar Simple decentralised market-oriented management of OFDMA femto-cells. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF femto-cells, subchannel, scheduling, game theory, resource allocation, power, auction, WiMAX, interference, pricing, OFDMA, LTE, microeconomics
8Gregory Neven Privacy-enhanced access control in primelife. Search on Bibsonomy Digital Identity Management The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
8Michal Sramka, Reihaneh Safavi-Naini, Jörg Denzinger, Mina Askari A practice-oriented framework for measuring privacy and utility in data sanitization systems. Search on Bibsonomy EDBT/ICDT Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
8Apurva Mohan, Douglas M. Blough An attribute-based authorization policy framework with dynamic conflict resolution. Search on Bibsonomy IDtrust The full citation details ... 2010 DBLP  DOI  BibTeX  RDF attribute-based authorization, conflict resolution, authorization policy
8Frank Stajano Foot-driven computing: our first glimpse of location privacy issues. Search on Bibsonomy ACM SIGSPATIAL Special The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Aboul Ella Hassanien, Ajith Abraham, Crina Grosan Spiking neural network and wavelets for hiding iris data in digital images. Search on Bibsonomy Soft Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Jean-Marie Bonnin, Imed Lassoued, Zied Ben Hamouda Automatic Multi-Interface Management Through Profile Handling. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF vertical handover middleware, ubiquitous computing, heterogeneous networks, profile management
8Suleyman Serdar Kozat, Michail Vlachos, Claudio Lucchese, Helga Van Herle, Philip S. Yu Embedding and Retrieving Private Metadata in Electrocardiograms. Search on Bibsonomy J. Medical Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ECG, Fragile watermark, Robust watermark
8Yanfang Ye 0001, Lifei Chen, Dingding Wang 0001, Tao Li 0001, Qingshan Jiang, Min Zhao SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Andreas Klenk, Holger Kinkelin, Christoph Eunicke, Georg Carle Preventing identity theft with electronic identity cards and the trusted platform module. Search on Bibsonomy EUROSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication with TPM, electronic ID, identity system
8Donald Gray, Ziang Zhang, Constantin Apostoaia, Chang Xu A neural network based approach for the detection of faults in the brushless excitation of a synchronous motor. Search on Bibsonomy EIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Jan-Erik Ekberg, Sven Bugiel Trust in a small package: minimized MRTM software implementation for mobile secure environments. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mobile trusted module, platform security, mobile phones, trusted computing, secure hardware
8René Korthaus, Ahmad-Reza Sadeghi, Christian Stüble, Jing Zhan A practical property-based bootstrap architecture. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mobile trusted module (mtm), property-based attestation, trusted computing (tc), secure boot
8Xiaoyuan Yang 0002, Yao Guo, Ke Niu 0001, Xiang Wu An Authenticating Algorithm with Multi-compression Compatible in DCT Domain. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Man Lung Yiu, Gabriel Ghinita, Christian S. Jensen, Panos Kalnis Outsourcing Search Services on Private Spatial Data. Search on Bibsonomy ICDE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Stavros Papadopoulos 0001, Dimitris Papadias, Weiwei Cheng, Kian-Lee Tan Separating Authentication from Query Execution in Outsourced Databases. Search on Bibsonomy ICDE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Gheorghita Ghinea, Bendik Bygstad, Christoph Schmitz Multi-dimensional Moderation in Online Communities: Experiences with Three Norwegian Sites. Search on Bibsonomy HCI (12) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF prototype, online communities, social media, moderation
8Mihoko Otake, Motoichiro Kato, Toshihisa Takagi, Hajime Asama Coimagination Method: Communication Support System with Collected Images and Its Evaluation via Memory Task. Search on Bibsonomy HCI (5) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Steven Fraser 0001, Ethan Hadar, Irit Hadar, Dennis Mancl, Grenville (Randy) Miller, Bill Opdyke Architecture in an agile world. Search on Bibsonomy OOPSLA Companion The full citation details ... 2009 DBLP  DOI  BibTeX  RDF design, software architecture, agile development
8Oliver Creighton, Ruth Barbara Demmel, Harald Stangl, Asa MacWilliams Video-based requirements engineering for pervasive computing applications: an example of preventing water damage. Search on Bibsonomy OOPSLA Companion The full citation details ... 2009 DBLP  DOI  BibTeX  RDF software cinema, video-based requirements engineering, requirements engineering, scenario- based design
8Stefano Giordani, Marin Lujak, Francesco Martinelli A Decentralized Scheduling Policy for a Dynamically Reconfigurable Production System. Search on Bibsonomy HoloMAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-agent system, negotiation, Dynamic scheduling
8Hector Miguel Chavez, Wuwei Shen, Shaoying Liu An approach to detection of UML-based ownership violation. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF UML, Eclipse, class diagram, ownership, model checker
8David Lievens, William Harrison Symmetric encapsulated multi-methods to abstract over application structure. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF symmetric methods, software evolution, type system, language design, multiple dispatch
8Zvika Brakerski, Shafi Goldwasser, Guy N. Rothblum, Vinod Vaikuntanathan Weak Verifiable Random Functions. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Ping Xu, Xiang-Yang Li 0001 Online market driven spectrum scheduling and auction. Search on Bibsonomy CoRoNet@MobiCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wireless networks, competitive ratio, preemption, online scheduling, spectrum, penalty
8Ingo J. Timm, René Schumann Performance measurement of multiagent systems: towards dependable MAS. Search on Bibsonomy SpringSim The full citation details ... 2009 DBLP  DOI  BibTeX  RDF simulation, multiagent systems, performance measurement
8Amre Shakimov, Alexander Varshavsky, Landon P. Cox, Ramón Cáceres Privacy, cost, and availability tradeoffs in decentralized OSNs. Search on Bibsonomy WOSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy, cloud computing, virtual machines, replication, online social networks, utility computing
8Oualid Ktata, Ghislain Lévesque Agile development: issues and avenues requiring a substantial enhancement of the business perspective in large projects. Search on Bibsonomy C3S2E The full citation details ... 2009 DBLP  DOI  BibTeX  RDF scrum and business modeling, software valuation, requirements engineering, project management, decision making, agile development, goal oriented approaches
8Maureen Biggers, Tuba Yilmaz, Monica Sweat Using collaborative, modified peer led team learning to improve student success and retention in intro cs. Search on Bibsonomy SIGCSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cs 1/2, peer led team learning, student success, computer science education, collaborative learning, retention
8Marcos F. Caetano, Jacir Luiz Bordim, Mário Antônio Ribeiro Dantas A collaborative cache approach for mobile ad hoc networks. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Keith B. Frikken Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DNA matching, Cryptography, Privacy-Preserving Protocols
8Hao Hu, Hao Li, Dengguo Feng L-UCON: Towards Layered Access Control with UCON. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Nicolai Kuntze, Andreas Fuchs 0002, Carsten Rudolph Reliable Identities Using Off-the-Shelf Hardware Security in MANETs. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Brian David Eoff, Tracy Anne Hammond Who dotted that 'i'?: context free user differentiation through pressure and tilt pen data. Search on Bibsonomy Graphics Interface The full citation details ... 2009 DBLP  BibTeX  RDF
8Janne Tuomikoski, Ilkka Tervonen Absorbing Software Testing into the Scrum Method. Search on Bibsonomy PROFES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Scrum method, team structure, exploratory testing, test manager
8Casey T. Deccio, Chao-Chih Chen, Jeff Sedayao, Krishna Kant 0001, Prasant Mohapatra Quality of Name Resolution in the Domain Name System. Search on Bibsonomy ICNP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Jin Sop Kum Dim Sum. Search on Bibsonomy SIGGRAPH ASIA Animations The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Gilberto A. Urueta, Christopher Thraves, Marcin Solarski, Pablo Vidales MetroSim: a planning tool for metropolitan WiFi networks. Search on Bibsonomy SimuTools The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wireless networks, software systems, network planning
8Florian Alt, Albrecht Schmidt 0001, Richard Atterer, Paul Holleis Bringing Web 2.0 to the Old Web: A Platform for Parasitic Applications. Search on Bibsonomy INTERACT (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Dimitrios Koukopoulos, Georgios D. Styliaras Security in collaborative multimedia art communities. Search on Bibsonomy EATIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authorization control, digital art project, role-based access, security, digital watermarking, collaborative environments, multimedia content, intellectual property rights
8Stavros Papadopoulos 0001, Yin Yang 0001, Spiridon Bakiras, Dimitris Papadias Continuous Spatial Authentication. Search on Bibsonomy SSTD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Joshua Alewo Atah, W. Gareth J. Howells Key Generation in a Voice Based Template Free Biometric Security System. Search on Bibsonomy COST 2101/2102 Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Template-free, Voice features, Security, Biometrics
8Jihah Nah, JongWeon Kim, Jaeseok Kim A new robust forensic marking using peak position modulation for video. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF peak position modulation, video forensic marking, robustness, spread spectrum, 3D wavelet transform, payload
Displaying result #401 - #500 of 980 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license