The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICISSP"( http://dblp.L3S.de/Venues/ICISSP )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icissp

Publication years (Num. hits)
2015 (44) 2016 (67) 2017 (81) 2018 (70) 2019 (84) 2020 (94) 2021 (89) 2022 (76) 2023 (91) 2024 (101)
Publication types (Num. hits)
inproceedings(787) proceedings(10)
Venues (Conferences, Journals, ...)
ICISSP(797)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 797 publication records. Showing 797 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Hussein Oudah, Bogdan V. Ghita, Taimur Bakhshi A Novel Features Set for Internet Traffic Classification using Burstiness. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Michael Sonntag Malicious DNS Traffic in Tor: Analysis and Countermeasures. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ilan Ben-Bassat, Erez Rokah Locality-Sensitive Hashing for Efficient Web Application Security Testing. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Luigi Catuogno, Clemente Galdi A Fine-grained General Purpose Secure Storage Facility for Trusted Execution Environment. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Daniel Augot, Hervé Chabanne, William George Practical Solutions to Save Bitcoins Applied to an Identity System Proposal. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mohammad Anagreh, Eero Vainikko, Peeter Laud Accelerate Performance for Elliptic Curve Scalar Multiplication based on NAF by Parallel Computing. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Takafumi Mori, Hiroaki Kikuchi Robust Person Identification based on DTW Distance of Multiple-Joint Gait Pattern. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sherif Saad, William Briguglio, Haytham Elmiligi The Curious Case of Machine Learning in Malware Detection. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hoai Phuong Nguyen, Florent Retraint, Frédéric Morain-Nicolier, Agnès Delahaies An Image Forgery Detection Solution based on DCT Coefficient Analysis. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Shun Yonamine, Youki Kadobayashi, Daisuke Miyamoto, Yuzo Taenaka Towards Automated Characterization of Malware's High-level Mechanism using Virtual Machine Introspection. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone Spyware Detection using Temporal Logic. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Thomas Ulz, Markus Feldbacher, Thomas W. Pieber, Christian Steger Sensing Danger: Exploiting Sensors to Build Covert Channels. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Dayana Spagnuelo, Ana Ferreira 0001, Gabriele Lenzini Accomplishing Transparency within the General Data Protection Regulation. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Steffen Pfrang, Mark Giraud, Anne Borcherding, David Meier, Jürgen Beyerer Design of an Example Network Protocol for Security Tests Targeting Industrial Automation Systems. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Oluwafemi Olukoya, Lewis Mackenzie, Inah Omoronyia Permission-based Risk Signals for App Behaviour Characterization in Android Apps. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ricardo Hormann, Eric Fischer Detecting Anomalies by using Self-Organizing Maps in Industrial Environments. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Clemens Brunner 0002, Fabian Knirsch, Dominik Engel SPROOF: A Platform for Issuing and Verifying Documents in a Public Blockchain. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hervé Chabanne, Emmanuelle Dottax, Franck Rondepierre Smart-card Deployment of an Electronic Voting Protocol. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Roberto Di Pietro Next Generation Information Warfare: Challenges and Research Directions. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  BibTeX  RDF
1Eric Filiol, Abhilash Hota Solving a Hard Instance of Suspicious Behaviour Detection with Sparse Binary Vectors Clustering. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yuya Sato, Hirokazu Hasegawa, Hiroki Takakura Construction of Secure Internal Networks with Communication Classifying System. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nadir Khan, Sven Nitzsche, Jürgen Becker 0001 A Secure Framework with Remote Configuration of Intellectual Property. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Gerald Quirchmayr Challenges of GDPR and the NIS Directive. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  BibTeX  RDF
1Said Daoudagh, Francesca Lonetti, Eda Marchetti A Decentralized Solution for Combinatorial Testing of Access Control Engine. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Stephanie Weinhardt, Olamide Omolola Usability of Policy Authoring Tools: A Layered Approach. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Niket Bhodia, Pratikkumar Prajapati, Fabio Di Troia, Mark Stamp 0001 Transfer Learning for Image-based Malware Classification. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Khondker Jahid Reza, Md Zahidul Islam 0001, Vladimir Estivill-Castro Privacy Preservation of Social Network Users Against Attribute Inference Attacks via Malicious Data Mining. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Saud Alotaibi, Abdulrahman Alruban, Steven Furnell, Nathan L. Clarke A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Doudou Fall, Youki Kadobayashi The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy? Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Florian Patzer, Ankush Meshram, Maximilian Heß Automated Incident Response for Industrial Control Systems Leveraging Software-defined Networking. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Michael Kiperberg, Roee Leon, Amit Resh, Asaf Algawi, Nezer Zaidenberg Hypervisor-assisted Atomic Memory Acquisition in Modern Systems. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Shahlaa Mashhadani, Nathan L. Clarke, Fudong Li 0001 Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Takuya Ezure, Masaki Inamura An Order-specified Aggregate Authority-transfer Signature. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Bernhards Blumbergs Remote Exploit Development for Cyber Red Team Computer Network Operations Targeting Industrial Control Systems. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Lorenz Schwittmann, Matthäus Wander, Torben Weis Mobile Devices as Digital Sextants for Zero-Permission Geolocation. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Paul Calderon, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada Malware Detection based on HTTPS Characteristic via Machine Learning. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mona Hamidi, Mina Sheikhalishahi, Fabio Martinelli Secure Two-party Agglomerative Hierarchical Clustering Construction. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gaby G. Dagher, Praneeth Babu Marella, Matea Milojkovic, Jordan Mohler BroncoVote: Secure Voting System using Ethereum's Blockchain. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1José Torres, Sergio de los Santos Malicious PDF Documents Detection using Machine Learning Techniques - A Practical Approach with Cloud Computing Applications. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jasper Huang, Fabio Di Troia, Mark Stamp 0001 Acoustic Gait Analysis using Support Vector Machines. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yuanyuan Gao, Kunpeng Wang Probability Preservation Property with Relative Error and Its Applications. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, Roman Fiedler AECID: A Self-learning Anomaly Detection Approach based on Light-weight Log Parser Models. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alessandro Bacci, Alberto Bartoli, Fabio Martinelli, Eric Medvet, Francesco Mercaldo, Corrado Aaron Visaggio Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Günther Eibl, Sebastian Burkhart, Dominik Engel Unsupervised Holiday Detection from Low-resolution Smart Metering Data. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rainer Diesch, Matthias Pfaff, Helmut Krcmar Prerequisite to Measure Information Security - A State of the Art Literature Review. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Constantinos Patsakis, Efthimios Alepis Knock-Knock: The Unbearable Lightness of Android Notifications. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Asmaa El Kandoussi, Hanan El Bakkali Novel Access Control Approach for Inter-organizational Workflows. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  BibTeX  RDF
1Stefanie Jasser, Katja Tuma, Riccardo Scandariato, Matthias Riebisch Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric Software Development Process. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wenbo Wang, Tianning Zang, Yuqing Lan The Rapid Extraction of Suspicious Traffic from Passive DNS. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Iman Sharafaldin, Arash Habibi Lashkari, Ali A. Ghorbani 0001 Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone Who's Driving My Car? A Machine Learning based Approach to Driver Identification. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Marco Silva 0004, António Nogueira, Paulo Salvador 0001 Modular Platform for Customer-Side Detection of BGP Redirection Attacks. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sravani Yajamanam, Vikash Raja Samuel Selvin, Fabio Di Troia, Mark Stamp 0001 Deep Learning versus Gist Descriptors for Image-based Malware Classification. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ana Ferreira 0001, Pedro Manuel Vieira Marques Phishing Through Time: A Ten Year Story based on Abstracts. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alexandre Ninassi, Sylvain Vernois, Christophe Rosenberger Privacy Compliant Multi-biometric Authentication on Smartphones. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Robert Luh, Marlies Temper, Simon Tjoa, Sebastian Schrittwieser APT RPG: Design of a Gamified Attacker/Defender Meta Model. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Thomas Gougeon, Patrick Lacharme How to Break CaptchaStar. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alessandro Bacci, Fabio Martinelli, Eric Medvet, Francesco Mercaldo VizMal: A Visualization Tool for Analyzing the Behavior of Android Malware. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Aaron Hunter 0001, Ken Wong Decoy Systems with Low Energy Bluetooth Communication. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Henrik Waagsnes, Nils Ulltveit-Moe Intrusion Detection System Test Framework for SCADA Systems. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kim Trong Nguyen, Cathel Zitzmann, Florent Retraint, Agnès Delahaies, Frédéric Morain-Nicolier, Hoai Phuong Nguyen Face Spoofing Detection for Smartphones using a 3D Reconstruction and the Motion Sensors. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vincent Haupert, Tilo Müller On App-based Matrix Code Authentication in Online Banking. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ismini Vasileiou, Steven Furnell Enhancing Security Education - Recognising Threshold Concepts and Other Influencing Factors. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan, Itzel Vázquez Sandoval A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wei-Han Lee, Jorge Ortiz 0001, Bongjun Ko, Ruby B. Lee Inferring Smartphone Users' Handwritten Patterns by using Motion Sensors. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dilpreet Singh, Ron Ruhl, Hamman Samuel Attack Tree for Modelling Unauthorized EMV Card Transactions at POS Terminals. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone Cluster Analysis for Driver Aggressiveness Identification. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohamed Abomhara, Geir M. Køien, Vladimir A. Oleshchuk, Mohamed Hamid Towards Risk-aware Access Control Framework for Healthcare Information Sharing. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Michael Meinig, Christoph Meinel Securing the Flow - Data Flow Analysis with Operational Node Structures. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Onur Hakbilen, Piraveen Perinparajan, Michael Eikeland, Nils Ulltveit-Moe SAFEPASS - Presenting a Convenient, Portable and Secure Password Manager. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Peter Maynard 0001, Kieran McLaughlin, Sakir Sezer Using Application Layer Metrics to Detect Advanced SCADA Attacks. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ohud Alqahtani, Zhiyuan Chen, Qiong Huang, Karthik Gottipati Is Bigger Safer? Analyzing Factors Related to Data Breaches using Publicly Available Information. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  BibTeX  RDF
1Lara Mauri, Stelvio Cimato, Ernesto Damiani A Comparative Analysis of Current Cryptocurrencies. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Abdullah Alshehri 0001, Frans Coenen, Danushka Bollegala Spectral Analysis of Keystroke Streams: Towards Effective Real-time Continuous User Authentication. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Christophe Ponsard, Jeremy Grandclaudon, Gautier Dallons Towards a Cyber Security Label for SMEs: A European Perspective -. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Paolo Mori, Steven Furnell, Olivier Camp (eds.) Proceedings of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, Funchal, Madeira - Portugal, January 22-24, 2018. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  BibTeX  RDF
1Aleksandr Eremin, Konstantin Kogos Incoming Call Implicit User Authentication - User Authentication via Hand Movement Pattern. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Christophe Rosenberger Evaluation of Biometric Template Protection Schemes based on a Transformation. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Eric Filiol, J. Nicolas, Maxence Delong Statistical and Combinatorial Analysis of the TOR Routing Protocol - Structural Weaknesses Identified in the TOR Network. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rumana Nazmul, Md. Rafiqul Islam 0001, Ahsan Raja Chowdhury Alignment-free Cancellable Template Generation for Fingerprint based Authentication. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone Identifying Insecure Features in Android Applications using Model Checking. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Charles Morisset, David Sanchez VisABAC: A Tool for Visualising ABAC Policies. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ross Anderson 0001 Sustainable Security - an Internet of Durable Goods. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  BibTeX  RDF
1Steffen Pfrang, David Meier, Michael Friedrich 0003, Jürgen Beyerer Advancing Protocol Fuzzing for Industrial Automation and Control Systems. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Christoph Stach, Bernhard Mitschang ACCESSORS - A Data-Centric Permission Model for the Internet of Things. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Oliver Eigner, Philipp Kreimel, Paul Tavolato Attacks on Industrial Control Systems - Modeling and Anomaly Detection. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Pedro Fortuna, Nuno Pereira 0001, Ismail Butun A Framework for Web Application Integrity. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Christoph Stach Big Brother is Smart Watching You - Privacy Concerns about Health and Fitness Applications. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Radja Badji, Fida Kamal Dankar A Risk-aware Access Control Model for Biomedical Research Platforms. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Feten Ben Fredj, Nadira Lammari, Isabelle Comyn-Wattiau Relational Database Anonymization - A Model-driven Guiding Approach. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Roman Graf, Ross King Cyber Threat Information Classification and Life Cycle Management using Smart Contracts. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Prathiba Nagarajan, Fabio Di Troia, Thomas H. Austin, Mark Stamp 0001 Autocorrelation Analysis of Financial Botnet Traffic. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Denis Migdal, Christophe Rosenberger Towards a Personal Identity Code Respecting Privacy. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Henrik Karlzén, Johan E. Bengtsson, Jonas Hallberg A Test of Structured Threat Descriptions for Information Security Risk Assessments. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Christina-Angeliki Toli, Bart Preneel Privacy-preserving Biometric Authentication Model for e-Finance Applications. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Benoît Vibert, Christophe Charrier, Jean-Marie Le Bars, Christophe Rosenberger Towards an Optimal Template Reduction for Securing Embedded Fingerprint Devices. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kaiyan Zheng, Peng Wang 0009 Encryption Schemes based on a Single Permutation: PCBC, POFB, PCFB and PCTR. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sascha Alpers, Roman Pilipchuk, Andreas Oberweis, Ralf H. Reussner Identifying Needs for a Holistic Modelling Approach to Privacy Aspects in Enterprise Software Systems. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1David Jacoby Hacking the Security Industry for Fun and Profit and Humanity. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  BibTeX  RDF
1Matthias Hummer, Sebastian Groll, Michael Kunz, Ludwig Fuchs, Günther Pernul Measuring Identity and Access Management Performance - An Expert Survey on Possible Performance Indicators. Search on Bibsonomy ICISSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 797 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license