|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1928 occurrences of 929 keywords
|
|
|
Results
Found 2507 publication records. Showing 2507 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
14 | Nevena Stolba, Marko Banek, A Min Tjoa |
The Security Issue of Federated Data Warehouses in the Area of Evidence-Based Medicine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 329-339, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough |
DSO: Dependable Signing Overlay. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, pp. 33-49, 2006, 3-540-34703-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
P2P overlay, digital signing service, fault-tolerance, dependable, intrusion-tolerance |
14 | Ulrich Flegel, Joachim Biskup |
Requirements of Information Reductions for Cooperating Intrusion Detection Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETRICS ![In: Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings, pp. 466-480, 2006, Springer, 3-540-34640-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Erkut Sinan Ayla, Attila Ozgit |
An architecture for end-to-end and inter-domain trusted mail delivery service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCN ![In: Proceedings of the International Symposium on Computer Networks, ISCN 2006, June 16-18, 2006, Istanbul, Turkey, pp. 220-225, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Heiko Rossnagel, Tobias Scherner |
Secure Mobile Notifications of Civilians in Case of a Disaster. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings, pp. 33-42, 2006, Springer, 3-540-47820-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Yiliang Han, Xiaoyuan Yang 0002, Ping Wei 0005, Yuming Wang, Yupu Hu |
ECGSC: Elliptic Curve Based Generalized Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, Third International Conference, UIC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 956-965, 2006, Springer, 3-540-38091-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Dimitris K. Tasoulis, Elena C. Laskari, Gerasimos C. Meletiou, Michael N. Vrahatis |
Privacy Preserving Unsupervised Clustering over Vertically Partitioned Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (5) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part V, pp. 635-643, 2006, Springer, 3-540-34079-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Jong-Hyuk Roh, Seunghun Jin, Kyoon-Ha Lee |
Topology-Aware Key Management Scheme for Secure Overlay Multicast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Advances in Data Communications and Wireless Networks, International Conference, ICOIN 2006, Sendai, Japan, January 16-19, 2006, Revised Selected Papers, pp. 733-742, 2006, Springer, 3-540-48563-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Stephen E. Fienberg, William J. Fulp, Aleksandra B. Slavkovic, Tracey A. Wrobel |
"Secure" Log-Linear and Logistic Regression Analysis of Distributed Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedings, pp. 277-290, 2006, Springer, 3-540-49330-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Zhiqiang Yang, Sheng Zhong 0002, Rebecca N. Wright |
Privacy-Preserving Queries on Encrypted Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings, pp. 479-495, 2006, Springer, 3-540-44601-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Himanshu Khurana, Jin Heo, Meenal Pant |
From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 260-281, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Ashish Kundu, Elisa Bertino |
Secure Dissemination of XML Content Using Structure-based Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 16-20 October 2006, Hong Kong, China, pp. 153-164, 2006, IEEE Computer Society, 0-7695-2558-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Youtao Zhang, Jun Yang 0002, Yongjing Lin, Lan Gao |
Architectural support for protecting user privacy on trusted processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGARCH Comput. Archit. News ![In: SIGARCH Comput. Archit. News 33(1), pp. 118-123, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | David Dagon, Wenke Lee, Richard J. Lipton |
Protecting Secret Data from Insider Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 16-30, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Jong-Hyuk Roh, Kyoon-Ha Lee |
Key Management for Secure Overlay Multicast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 336-345, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Key hierarchy, Key Management, Overlay Multicast, Secure Multicast |
14 | David J. Power, Mark Slaymaker, Eugenia A. Politou, Andrew C. Simpson |
Protecting sensitive patient data via query modification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 224-230, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, medical databases, query modification |
14 | Chad D. Mano, Aaron Striegel |
Trusted Security Devices for Bandwidth Conservation in IPSec Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2005: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, 4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005, Proceedings, pp. 166-177, 2005, Springer, 3-540-25809-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Gérard Boudol |
On Typing Information Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTAC ![In: Theoretical Aspects of Computing - ICTAC 2005, Second International Colloquium, Hanoi, Vietnam, October 17-21, 2005, Proceedings, pp. 366-380, 2005, Springer, 3-540-29107-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Tao Zhang 0037, Xiaotong Zhuang, Santosh Pande |
Building Intrusion-Tolerant Secure Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CGO ![In: 3nd IEEE / ACM International Symposium on Code Generation and Optimization (CGO 2005), 20-23 March 2005, San Jose, CA, USA, pp. 255-266, 2005, IEEE Computer Society, 0-7695-2298-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Josenildo Costa da Silva, Matthias Klusch |
Inference on Distributed Data Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MLDM ![In: Machine Learning and Data Mining in Pattern Recognition, 4th International Conference, MLDM 2005, Leipzig, Germany, July 9-11, 2005, Proceedings, pp. 610-619, 2005, Springer, 3-540-26923-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Johannes Gehrke |
Models and methods for privacy-preserving data publishing and analysis: invited tutorial. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 13-15, 2005, Baltimore, Maryland, USA, pp. 316, 2005, ACM, 1-59593-062-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Manhee Lee, Eun Jung Kim 0001, Mazin S. Yousif |
Security Enhancement in InfiniBand Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), CD-ROM / Abstracts Proceedings, 4-8 April 2005, Denver, CO, USA, 2005, IEEE Computer Society, 0-7695-2312-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Fuwen Liu, Hartmut König |
A Token Based Key Distribution Protocol for Closed Group Meetings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Net-Con ![In: Network Control and Engineering for QoS, Security and Mobility, IV, Fourth IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, Lannion, France, November 14-18, 2005, Proceedings, pp. 29-43, 2005, Springer, 978-0-387-49689-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Fuwen Liu, Hartmut König |
Efficient Key Distribution for Closed Meetings in the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings, pp. 271-272, 2005, Springer, 3-540-28791-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Yonghwan Lee, Eunmi Choi, Dugki Min |
An Authenticated Key Exchange Mechanism Using One-Time Shared Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II, pp. 187-194, 2005, Springer, 3-540-25861-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
One-Time Shared key, Authentication, Key Exchange, Diffie- Hellman |
14 | Fuwen Liu, Hartmut König |
Secure and efficient key distribution for collaborative applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Proceedings of the 1st International Conference on Collaborative Computing: Networking, Applications and Worksharing, San Jose, CA, USA, December 19-21, 2005, 2005, IEEE Computer Society / ICST, 1-4244-0030-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | G. Nacira, A. Abdelaziz |
Secured net-banking by θ-Vigenere in Syverson's protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), January 3-6, 2005, Cairo, Egypt, pp. 67, 2005, IEEE Computer Society, 0-7803-8735-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Jun Li 0001, Xun Kang |
mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA, pp. 397-408, 2005, IEEE Computer Society, 0-7695-2461-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Tom Walcott, Matt Bishop |
Traducement: A model for record security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(4), pp. 576-590, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
traducement, Integrity, security policy, recordation |
14 | Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell |
KNOW Why your access was denied: regulating feedback for usable security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 52-61, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
policy protection, security, privacy, usability, access control, feedback |
14 | Pawan Jadia, Anish Mathuria |
Efficient Secure Aggregation in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HiPC ![In: High Performance Computing - HiPC 2004, 11th International Conference, Bangalore, India, December 19-22, 2004, Proceedings, pp. 40-49, 2004, Springer, 3-540-24129-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Tawfiq S. M. Barhoom, Shen-sheng Zhang |
Trusted Exam Marks System at IUG Using XML-Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 2004 International Conference on Computer and Information Technology (CIT 2004), 14-16 September 2004, Wuhan, China, pp. 288-294, 2004, IEEE Computer Society, 0-7695-2216-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
XML Digital Signature, Multi-Signed Document, non-repudiation, XML security |
14 | Eduardo Fernández-Medina, Juan Trujillo 0001, Rodolfo Villarroel, Mario Piattini |
Extending UML for Designing Secure Data Warehouses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ER ![In: Conceptual Modeling - ER 2004, 23rd International Conference on Conceptual Modeling, Shanghai, China, November 2004, Proceedings, pp. 217-230, 2004, Springer, 3-540-23723-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Secure data warehouses, OCL, multidimensional modeling, UML extension |
14 | Danny Hesse, Jana Dittmann, Andreas Lang 0001 |
Network Based Intrusion Detection to Detect Steganographic Communication Channels - On the Example of Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO ![In: 30th EUROMICRO Conference 2004, 31 August - 3 September 2004, Rennes, France, pp. 453-456, 2004, IEEE Computer Society, 0-7695-2199-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Luke McAven, Reihaneh Safavi-Naini, Moti Yung |
Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings, pp. 148-161, 2004, Springer, 3-540-24130-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Seung-Hyun Seo, Sang-Ho Lee |
A Secure and Flexible Multi-signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part IV, pp. 689-697, 2004, Springer, 3-540-22060-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Signcryption, multi-signature |
14 | Juan José Salazar González, Philip Lowthian, Caroline Young, Giovanni Merola, Stephen Bond, David Brown |
Getting the Best Results in Controlled Rounding with the Least Effort. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases: CASC Project International Workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004. Proceedings, pp. 58-72, 2004, Springer, 3-540-22118-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Silvia Polettini |
Maximum entropy simulation for microdata protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Stat. Comput. ![In: Stat. Comput. 13(4), pp. 307-320, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
business microdata, record re-identification, simulation, regression, maximum entropy, disclosure limitation |
14 | Farzin Deravi, Michael C. Fairhurst, Richard M. Guest, Nick Jeremy Mavity, Anne M. P. Canuto |
Intelligent agents for the management of complexity in multimodal biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Univers. Access Inf. Soc. ![In: Univers. Access Inf. Soc. 2(4), pp. 293-304, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Universal access, Multimodal biometrics, Intelligent software agents |
14 | Stefano Chessa, Piero Maestrini |
Dependable and Secure Data Storage and Retrieval in Mobile, Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2003 International Conference on Dependable Systems and Networks (DSN 2003), 22-25 June 2003, San Francisco, CA, USA, Proceedings, pp. 207-216, 2003, IEEE Computer Society, 0-7695-1952-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Jian Yin 0002, Jean-Philippe Martin, Arun Venkataramani, Lorenzo Alvisi, Michael Dahlin |
Towards a Practical Approach to Confidential Byzantine Fault Tolerance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Directions in Distributed Computing ![In: Future Directions in Distributed Computing, Research and Position Papers, pp. 51-56, 2003, Springer, 3-540-00912-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Xavier Leroy |
Computer Security from a Programming Language and Static Analysis Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESOP ![In: Programming Languages and Systems, 12th European Symposium on Programming, ESOP 2003, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2003, Warsaw, Poland, April 7-11, 2003, Proceedings, pp. 1-9, 2003, Springer, 3-540-00886-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Dong Jin Kwak, Sang-Jae Moon |
Efficient Distributed Signcryption Scheme as Group Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings, pp. 403-417, 2003, Springer, 3-540-20208-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Public-key Cryptography, Group signature, Signcryption |
14 | Shoichi Sakane, Nobuo Okabe, Kenichi Kamada, Hiroshi Esaki |
Applying Kerberos to the Communication Environment for Information Appliances. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003 - Orlando, FL, USA, Proceedings, pp. 214-217, 2003, IEEE Computer Society, 0-7695-1873-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Jian Yin 0002, Jean-Philippe Martin, Arun Venkataramani, Lorenzo Alvisi, Michael Dahlin |
Separating agreement from execution for byzantine fault tolerant services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, SOSP 2003, Bolton Landing, NY, USA, October 19-22, 2003, pp. 253-267, 2003, ACM, 1-58113-757-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
confidentialiy, trustworthy systems, security, reliability, byzantine fault tolerance, state machine replication |
14 | Rogardt Heldal, Fredrik Hultin |
Bridging Model-Based and Language-Based Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings, pp. 235-252, 2003, Springer, 3-540-20300-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Lantian Zheng, Stephen Chong, Andrew C. Myers, Steve Zdancewic |
Using Replication and Partitioning to Build Secure Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2003 IEEE Symposium on Security and Privacy (S&P 2003), 11-14 May 2003, Berkeley, CA, USA, pp. 236-250, 2003, IEEE Computer Society, 0-7695-1940-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Michael C. Fairhurst |
Document Identity, Authentication and Ownership: The Future of Biometric Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: 7th International Conference on Document Analysis and Recognition (ICDAR 2003), 2-Volume Set, 3-6 August 2003, Edinburgh, Scotland, UK, pp. 1108-, 2003, IEEE Computer Society, 0-7695-1960-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | David Sands 0001 |
Probability and Timing: Challenges for Secure Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAPM-PROBMIV ![In: Process Algebra and Probabilistic Methods, Performance Modeling and Verification, Second Joint International Workshop PAPM-PROBMIV 2002, Copenhagen, Denmark, July 25-26, 2002, Proceedings, pp. 16, 2002, Springer, 3-540-43913-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Soichi Furuya, Kouichi Sakurai |
Single-Path Authenticated-Encryption Scheme Based on Universal Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers, pp. 94-109, 2002, Springer, 3-540-00622-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
real-or-random security, Stream cipher, provable security, message authentication, mode of operation |
14 | Refik Molva, Alain Pannetrat |
Network Security in the Multicast Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING Tutorials ![In: Advanced Lectures on Networking, NETWORKING 2002 [This book presents the revised version of seven tutorials given at the NETWORKING 2002 Conference in Pisa, Italy in May 2002], pp. 59-82, 2002, Springer, 3-540-00165-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Joonsang Baek, Ron Steinfeld, Yuliang Zheng 0001 |
Formal Proofs for the Security of Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002, Proceedings, pp. 80-98, 2002, Springer, 3-540-43168-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Domenico Cotroneo, Antonino Mazzeo, Luigi Romano, Stefano Russo 0001 |
Implementing a CORBA-Based Architecture for Leveraging the Security Level of Existing Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM ![In: On the Move to Meaningful Internet Systems, 2002 - DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 2002 Irvine, California, USA, October 30 - November 1, 2002, Proceedings, pp. 723-736, 2002, Springer, 3-540-00106-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Steve Zdancewic, Andrew C. Myers |
Robust Declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada, pp. 15-23, 2001, IEEE Computer Society, 0-7695-1146-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Elena Dasseni, Vassilios S. Verykios, Ahmed K. Elmagarmid, Elisa Bertino |
Hiding Association Rules by Using Confidence and Support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 4th International Workshop, IHW 2001, Pittsburgh, PA, USA, April 25-27, 2001, Proceedings, pp. 369-383, 2001, Springer, 3-540-42733-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Donald E. Brown, Louise F. Gunderson, Marc H. Evans |
Interactive Analysis of Computer Crimes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 33(8), pp. 69-77, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
14 | Jay J. Wylie, Michael W. Bigrigg, John D. Strunk, Gregory R. Ganger, Han Kiliççöte, Pradeep K. Khosla |
Survivable Information Storage Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 33(8), pp. 61-68, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
14 | Virgil D. Gligor, Matt Blaze, John Ioannidis |
Denial of Service - Panel Discussion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 194-203, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
14 | Hartmut Pohl, Dietrich Cerny |
Enterprise Key Recovery: Vertrauenswürdige Server mit skalierbarer Sicherheit zur Archivierung von Konzelationsschlüsseln. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inform. Spektrum ![In: Inform. Spektrum 22(2), pp. 110-121, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Sicherheitsarchitektur, Sicherheitsniveau, Skalierbarkeit, Unternehmen, Verschlüsselung, Electronic commerce, Key recovery, Sicherheit |
14 | Janice Singer, Norman G. Vinson |
Empirical Software Engineering Research Ethics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE METRICS ![In: 6th IEEE International Software Metrics Symposium (METRICS 1999), 4-6 November 1999, Boca Raton, FL, USA, pp. 326, 1999, IEEE Computer Society, 0-7695-0403-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
14 | Stefan Pütz, Roland Schmitz, Benno Tietz |
Secure Transport of Authentication Data in Third Generation Mobile Phone Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CQRE ![In: Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30 - December 2, 1999, Proceedings, pp. 142-152, 1999, Springer, 3-540-66800-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
14 | David Rosenthal, Francis Fung |
A Test for Non-Disclosure in Security Level Translations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1999 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 9-12, 1999, pp. 196-206, 1999, IEEE Computer Society, 0-7695-0176-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
14 | Jean-François Blanchette, Deborah G. Johnson |
Cryptography, data retention, and the panopticon society (abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Policy ![In: ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings, pp. 1-2, 1998, ACM, 1-58113-038-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
14 | Sumitra Mukherjee, George T. Duncan |
Disclosure Limitation through Additive Noise Data Masking: Analysis of Skewed Sensitive Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (3) ![In: 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 7-10 January 1997, Maui, Hawaii, USA, pp. 581-, 1997, IEEE Computer Society, 0-8186-7734-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
14 | Masayuki Abe, Eiichiro Fujisaki |
How to Date Blind Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings, pp. 244-251, 1996, Springer, 3-540-61872-4. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
14 | Marjan Jurecic, Herbert Bunz |
Exchange of Patient Records - Prototype Implementation of a Security Attributes Service in X.500. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994., pp. 30-38, 1994, ACM, 0-89791-732-4. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
14 | Josep Domingo-Ferrer |
Untransferable Rights in a Client-Independent Server Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings, pp. 260-266, 1993, Springer, 3-540-57600-2. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
14 | Steven P. Reiss |
Practical Data-Swapping: The First Steps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 9(1), pp. 20-37, 1984. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
14 | Eric Affum, Marian Enchill |
Data Confidentiality in Machine Learning: Exploring Multivariate Regression and Its Application on Encrypted Medical Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 5(4), pp. 355, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Jean Liénardy, Frédéric Lafitte |
A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Lett. ![In: Inf. Process. Lett. 183, pp. 106404, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Iuon-Chang Lin, Yi-Hsuan Kuo, Ching-Chun Chang, Jui-Chuan Liu, Chin-Chen Chang 0001 |
Symmetry in Blockchain-Powered Secure Decentralized Data Storage: Mitigating Risks and Ensuring Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 16(2), pp. 147, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Ali Afraz, Mahdieh Montazeri, Mahin Eslami Shahrbabaki, Leila Ahmadian, Yunes Jahani |
The viewpoints of parents of children with mental disorders regarding the confidentiality and security of their children's information in the Iranian national electronic health record system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Medical Informatics ![In: Int. J. Medical Informatics 183, pp. 105334, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Elmehdi Illi, Marwa K. Qaraqe, Saud Althunibat, Abdullah Al-Hasanat, Moath Alsafasfeh, Marcus de Ree, Georgios Mantas, Jonathan Rodriguez 0001, Waqas Aman, Saif Al-Kuwari |
Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Surv. Tutorials ![In: IEEE Commun. Surv. Tutorials 26(1), pp. 347-388, Firstquarter 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Yuechen Tao, Bo Li 0001, Baochun Li |
On Atomicity and Confidentiality Across Blockchains Under Failures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 36(2), pp. 766-780, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Jonathan Evertz, Merlin Chlosta, Lea Schönherr, Thorsten Eisenhofer |
Whispers in the Machine: Confidentiality in LLM-integrated Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.06922, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Ingo Weber, Hendrik Linka, Daniel Mertens, Tamara Muryshkin, Heinrich Opgenoorth, Stefan Langer |
FhGenie: A Custom, Confidentiality-preserving Chat AI for Corporate and Scientific Use. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.00039, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Qiuhao Wang, Xu Yang, Saiyu Qi, Yong Qi |
SecGraph: Towards SGX-based Efficient and Confidentiality-Preserving Graph Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.19531, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Rongwu Xu, Zhixuan Fang |
Tempo: Confidentiality Preservation in Cloud-Based Neural Network Training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.11531, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Haodi Wang, Yu Guo 0003, Rongfang Bie, Xiaohua Jia |
Verifiable Arbitrary Queries With Zero Knowledge Confidentiality in Decentralized Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 19, pp. 1071-1085, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Zhang Wenhua, Mohammad Kamrul Hasan, Norleyza Binti Jailani, Shayla Islam, Nurhizam Safie 0001, Hussain Mobarak Albarakati, Abeer Aljohani, Muhammad Attique Khan |
A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Hum. Behav. ![In: Comput. Hum. Behav. 153, pp. 108134, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Daxing Xu, Zhiqiang Chen, Hailun Wang |
Event-Triggered confidentiality fusion estimation against eavesdroppers in cyber-physical systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EURASIP J. Adv. Signal Process. ![In: EURASIP J. Adv. Signal Process. 2024(1), pp. 56, December 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Bernard McWeeney, Ilya Mudritskiy, Renaat Verbruggen |
Analysis of Payload Confidentiality for the IoT/ LPWAN Technology 'Lora'. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 10th International Conference on Information Systems Security and Privacy, ICISSP 2024, Rome, Italy, February 26-28, 2024., pp. 90-102, 2024, SCITEPRESS, 978-989-758-683-5. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Shamiek Mangipudi, Pavel Chuprikov, Patrick Eugster, Malte Viering, Savvas Savvides |
Generalized Policy-Based Noninterference for Efficient Confidentiality-Preservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Program. Lang. ![In: Proc. ACM Program. Lang. 7(PLDI), pp. 267-291, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Irfan Alam, Manoj Kumar |
A novel authentication protocol to ensure confidentiality among the Internet of Medical Things in covid-19 and future pandemic scenario. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Things ![In: Internet Things 22, pp. 100797, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Mostefa Kara, Abdelkader Laouid, Ahcène Bounceur, Mohammad Hammoudeh, Muath AlShaikh |
Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using One-Time Pad Method with a Single Pre-Shared Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Sci. Eng. ![In: J. Inf. Sci. Eng. 39(1), pp. 183-195, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
14 | Públio M. Lima, Lilian K. Carvalho, Marcos V. Moreira |
Ensuring confidentiality of cyber-physical systems using event-based cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 621, pp. 119-135, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Trupti Shripad Tagare, Rajashree Narendra |
Confidentiality Enhancement Using Spread Spectrum Modulation Technique for Aggregated Data in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Commun. ![In: J. Commun. 18(5), pp. 294-300, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Sandesh Achar, Nuruzzaman Faruqui, Anusha Bodepudi, Manjunath Reddy |
Confimizer: A Novel Algorithm to Optimize Cloud Resource by Confidentiality-Cost Trade-Off Using BiLSTM Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 89205-89217, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Maximilian Walter, Sebastian Hahner, Tomás Bures, Petr Hnetynka, Robert Heinrich, Ralf H. Reussner |
Architecture-based attack propagation and variation analysis for identifying confidentiality issues in Industry 4.0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autom. ![In: Autom. 71(6), pp. 443-452, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Bin Zhang, Bahbibi Rahmatullah, Shir Li Wang, A. A. Zaidan 0001, B. B. Zaidan, Penghui Liu |
A review of research on medical image confidentiality related technology coherent taxonomy, motivations, open challenges and recommendations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 82(14), pp. 21867-21906, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Lal Said Khan, Majid Khan, Mohammad Mazyad Hazzazi, Sajjad Shaukat Jamal |
A novel combination of information confidentiality and data hiding mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 82(5), pp. 6917-6941, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Amina Souyah |
Multimedia contents confidentiality preservation in constrained environments: a dynamic approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 82(14), pp. 21775-21800, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Amna Zafar, Ammar S. Alanazi, Majid Khan, Iqtadar Hussain |
New image confidentiality mechanism based on Arneodos chaotic dynamical system and quadratic congruential generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 82(11), pp. 17263-17281, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Florian Wohner |
Outsourced Computations Maintaining Confidentiality and Authenticity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ERCIM News ![In: ERCIM News 2023(133), 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
14 | Megan Schröder, Sam H. A. Muller, Eleni Vradi, Johanna Mielke, Yvonne M. F. Lim, Fabrice Couvelard, Menno Mostert, Stefan Koudstaal, Marinus J. C. Eijkemans, Christoph Gerlinger |
Sharing Medical Big Data While Preserving Patient Confidentiality in Innovative Medicines Initiative: A Summary and Case Report from BigData@Heart. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Big Data ![In: Big Data 11(6), pp. 399-407, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Jahanpour Alipour, Yousef Mehdipour, Afsaneh Karimi, Mohadeseh Khorashadizadeh, Maryam Akbarpour |
Security, confidentiality, privacy and patient safety in the hospital information systems from the users' perspective: A cross-sectional study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Medical Informatics ![In: Int. J. Medical Informatics 175, pp. 105066, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Jegadeesan Subramani, Maria Azees, Arun Sekar Rajasekaran, Fadi M. Al-Turjman |
EPF-FDA: Efficient Pairing Free and Confidentiality Preserving Fog-Based Data Aggregation Scheme for WBANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Instrum. Meas. Mag. ![In: IEEE Instrum. Meas. Mag. 26(8), pp. 10-16, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Maria A. Poltavtseva, E. A. Rudnitskaya |
Confidentiality of Machine Learning Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autom. Control. Comput. Sci. ![In: Autom. Control. Comput. Sci. 57(8), pp. 975-982, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Lakshmanarao Namamula, Daniel Chaytor |
Enhancing the Confidentiality and Integrity of Uncertain Dynamic Data Workflows of B2C (Business-2-Consumers) Using Blockchain Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Uncertain Syst. ![In: J. Uncertain Syst. 16(1), pp. 2242009:1-2242009:17, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Lionel Morel, Damien Couroussé, Thomas Hiscock |
Code Polymorphism Meets Code Encryption: Confidentiality and Side-Channel Protection of Software Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.07327, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #600 of 2507 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|