The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Intruder with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1995 (16) 1996-1999 (15) 2000 (16) 2001-2002 (39) 2003 (35) 2004 (40) 2005 (47) 2006 (51) 2007 (59) 2008 (66) 2009 (43) 2010 (18) 2011-2012 (28) 2013-2014 (27) 2015 (15) 2016-2017 (29) 2018-2019 (18) 2020 (15) 2021 (18) 2022 (15) 2023 (16) 2024 (3)
Publication types (Num. hits)
article(160) book(1) incollection(1) inproceedings(464) phdthesis(3)
Venues (Conferences, Journals, ...)
CoRR(29) ACC(7) CSFW(7) ESORICS(7) RTA(7) CDC(6) EUROCRYPT(6) ARES(5) Formal Aspects in Security and...(5) ICC(5) SMC(5) ACSAC(4) ICCSA (1)(4) ICRA(4) Int. J. Inf. Sec.(4) IROS(4) More (+10 of total 415)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 387 occurrences of 262 keywords

Results
Found 629 publication records. Showing 629 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
10Zeeshan Furqan, Shahabuddin Muhammad, Ratan K. Guha Formal Verification of 802.11i using Strand Space Formalism. Search on Bibsonomy ICN/ICONS/MCL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro Low Rate DoS Attack to Monoprocess Servers. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Zhenchuan Chai, Zhenfu Cao, Rongxing Lu Remote Authentication with Forward Security. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Yongzhong Zhang, Jianhua Yang, Chunming Ye Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Rahul Mangharam, Anthony Rowe 0001, Raj Rajkumar, Ryohei Suzuki Voice over Sensor Networks. Search on Bibsonomy RTSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Pramod Kumar Meher, Jagdish Chandra Patra A new approach to secure distributed storage, sharing and dissemination of digital image. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Eung Soo Kim, Min Sung Kim Design and Fabrication of Security and Home Automation System. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Mathieu Turuani The CL-Atse Protocol Analyser. Search on Bibsonomy RTA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Zhiqiang Yang, Sheng Zhong 0002, Rebecca N. Wright Privacy-Preserving Queries on Encrypted Data. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Sergio Roberto de Lima e Silva Filho, Mauro Roisenberg Continuous Authentication by Keystroke Dynamics Using Committee Machines. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Gregory B. Newby Paths to creativity in security careers. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Mehmet A. Orgun, Ji Ma 0001, Chuchang Liu, Guido Governatori Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Abraham Sánchez López, Rodrigo Cuautle, René Zapata, Maria A. Osorio A Reactive Lazy PRM Approach for Nonholonomic Motion Planning. Search on Bibsonomy IBERAMIA-SBIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Nonholonomic motion planning, deformable virtual zone, lazy PRM
10Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò 0001, David A. Basin Formalizing and Analyzing Sender Invariance. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Ralf Küsters On the decidability of cryptographic protocols with open-ended data structures. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Complexity, Cryptographic protocols, Decidability, Transducers
10David A. Basin, Sebastian Mödersheim, Luca Viganò 0001 OFMC: A symbolic model checker for security protocols. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Model checking, Verification, Formal methods, Constraints, Security protocols
10Stephen E. Fienberg, Aleksandra B. Slavkovic Preserving the Confidentiality of Categorical Statistical Data Bases When Releasing Information for Association Rules. Search on Bibsonomy Data Min. Knowl. Discov. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF conditional tables, marginal tables, association rules, privacy preservation, contingency tables, algebraic geometry, disclosure limitation
10Dong-Soo Kim, Y. J. Jung, Tai-Myung Chung PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label. Search on Bibsonomy J. Supercomput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security management, security label, ESM, ISM
10Abhinav Kamra, Jon Feldman, Vishal Misra, Dan Rubenstein Data persistence in sensor networks: towards optimal encoding for data recovery in partial network failures. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Mohan M. Trivedi, Kohsia S. Huang, Ivana Mikic Dynamic context capture and distributed video arrays for intelligent spaces. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part A The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Ali Iranli, Hanif Fatemi, Massoud Pedram Lifetime-aware intrusion detection under safeguarding constraints. Search on Bibsonomy IPSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Wensheng Zhang 0001, Guohong Cao Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks. Search on Bibsonomy MobiQuitous The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Mourad Debbabi, Mohamed Mostafa Saleh Game Semantics Model for Security Protocols. Search on Bibsonomy ICFEM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Peter C. Lockemann, René Witte Agents and Databases: Friends or Foes? Search on Bibsonomy IDEAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Kamel Adi, Liviu Pene Secrecy Correctness for Security Protocols. Search on Bibsonomy DFMA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Protocol Correctness, Security Protocols, Formal Analysis, Secrecy
10Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Christopher Walstad Specifying Kerberos 5 cross-realm authentication. Search on Bibsonomy WITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Deepak Kapur, Paliath Narendran, Lida Wang A Unification Algorithm for Analysis of Protocols with Blinded Signatures. Search on Bibsonomy Mechanizing Mathematical Reasoning The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Hamdy S. Soliman, Mohammed Omari Application of synchronous dynamic encryption system (SDES) in wireless sensor networks. Search on Bibsonomy PE-WASUN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF deployment knowledge, encryption permutation vectors, power balancing, sensors security primitives, stream ciphers
10Dean A. Jones, Mark A. Turnquist, Linda K. Nozick Simulation of imperfect information in vulnerability modeling for infrastructure facilities. Search on Bibsonomy WSC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Wiebke Dresp Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Soumya Banerjee, Crina Grosan, Ajith Abraham IDEAS: Intrusion Detection based on Emotional Ants for Sensors. Search on Bibsonomy ISDA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Jianhua Yang, Shou-Hsuan Stephen Huang Improved Thumbprint and Its Application for Intrusion Detection. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Wensheng Zhang 0001, Guohong Cao Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Pradeep Kannadiga, Mohammad Zulkernine DIDMA: A Distributed Intrusion Detection System Using Mobile Agents. Search on Bibsonomy SNPD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network security and distributed systems, mobile agents, Intrusion detection, distributed attacks
10Khin Mi Mi Aung, Kiejin Park, Jong Sou Park A rejuvenation methodology of cluster recovery. Search on Bibsonomy CCGRID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki Towards Modeling Wireless Location Privacy. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Ana Paula R. da Silva, Marcelo H. T. Martins, Bruno P. S. Rocha, Antonio Alfredo Ferreira Loureiro, Linnyer Beatrys Ruiz, Hao Chi Wong Decentralized intrusion detection in wireless sensor networks. Search on Bibsonomy Q2SWinet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, wireless sensor networks, intrusion detection
10Mehdi Azadmehr, Jens Petter Abrahamsen, Philipp Häfliger A foveated AER imager chip [address event representation]. Search on Bibsonomy ISCAS (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Sindhu Karthikeyan, Mikhail Nesterenko RFID security without extensive cryptography. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, privacy, RFID
10Chung-Ming Huang, Jian-Wei Li Authentication and Key Agreement Protocol for UMTS with Low Bandwidth Consumption. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Jean Goubault-Larrecq, Fabrice Parrennes Cryptographic Protocol Analysis on Real C Code. Search on Bibsonomy VMCAI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Takashi Minohara, Satoshi Ishikawa, Masahiro Amano Centralized Surveillance of Unused Address Space by using Virtual Networks. Search on Bibsonomy PRDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Hans Hüttel, Jirí Srba Recursion Versus Replication in Simple Cryptographic Protocols. Search on Bibsonomy SOFSEM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Chin-Chen Chang 0001, Jung-San Lee Improvement on an Optimized Protocol for Mobile Network Authentication and Security. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Rob Delicata, Steve A. Schneider A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Nicolas Sklavos 0001, Nick A. Moldovyan, Vladimir Gorodetsky, Odysseas G. Koufopavlou Computer Network Security: Report from MMM-ACNS. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF WMMM, ACNS, architectures, mathematical models, conference
10Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee A key authentication scheme with non-repudiation. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF non-repudiation security, authentication, certificate, discrete logarithm, public key
10Stéphanie Delaune, Florent Jacquemard A decision procedure for the verification of security protocols with explicit destructors. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF formal methods, security protocols, constraint solving
10Simone Giannecchini, Marco Caccamo, Chi-Sheng Shih 0001 Collaborative Resource Allocation in Wireless Sensor Networks. Search on Bibsonomy ECRTS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Traian Marius Truta, Farshad Fotouhi, Daniel C. Barth-Jones Disclosure risk measures for the sampling disclosure control method. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF disclosure risk and sampling, data privacy, microdata, statistical disclosure
10Weiqiang Kong, Kazuhiro Ogata 0001, Jianwen Xiang, Kokichi Futatsugi Formal Analysis of an Anonymous Fair Exchange E-Commerce Protocol. Search on Bibsonomy CIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Rakesh Agrawal 0001, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu Order-Preserving Encryption for Numeric Data. (PDF / PS) Search on Bibsonomy SIGMOD Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Yongjian Li, Rui Xue Design of a CIL Connector to SPIN. Search on Bibsonomy COMPSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Shichao Ou, Deepak R. Karuppiah, Andrew H. Fagg, Edward M. Riseman An Augmented Virtual Reality Interface for Assistive Monitoring of Smart Spaces. Search on Bibsonomy PerCom The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Ralf Küsters, Thomas Wilke Automata-Based Analysis of Recursive Cryptographic Protocols. Search on Bibsonomy STACS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Miyoung Kim, Misun Kim, Youngsong Mun Design and Implementation of the HoneyPot System with Focusing on the Session Redirection. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Dong-Soo Kim, Tai-Myung Chung A Design of Preventive Integrated Security Management System Using Security Labels and a Brief Comparison with Existing Models. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Yonghak Ahn, Kiok Ahn, Oksam Chae Detection of Moving Objects Edges to Implement Home Security System in a Wireless Environment. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Alessandro Armando, Luca Compagna SATMC: A SAT-Based Model Checker for Security Protocols. Search on Bibsonomy JELIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Jianguo Ding, Shihao Xu, Bernd J. Krämer, Yingcai Bai, Hansheng Chen 0003, Jun Zhang Probabilistic Inference Strategy in Distributed Intrusion Detection Systems. Search on Bibsonomy ISPA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Janica Edmonds, Mauricio Papa Cryptographic Protocol Analysis using Goal Extraction. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Sjouke Mauw, Jan Verschuren, Erik P. de Vink A Formalization of Anonymity and Onion Routing. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Kwong H. Yung Using Self-Consistent Naive-Bayes to Detect Masquerades. Search on Bibsonomy PAKDD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF self-consistent naive-Bayes, intrusion detection, anomaly detection, expectation-maximization algorithm, semisupervised learning, masquerade detection
10Jun-Chou Chuang, Chin-Chen Chang 0001 Detection and Restoration of a Tampered Medical Image. Search on Bibsonomy MIAR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Authentication, watermarking, medical imaging, confidentiality
10Laurent Mazaré Decidability of Opacity with Non-Atomic Keys. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Dolev-Yao Constraints, Security, Formal Verification, Decidability, Rewriting Systems, Opacity
10Charles A. Shoniregun, Adebola Omoegun, Diepriye Brown-West, Oleksandr Logvynovskiy Can eCRM and Trust Improve eC Customer Base? Search on Bibsonomy CEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Ramana Rao Kompella, Sumeet Singh, George Varghese On scalable attack detection in the network. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, scalability, denial of service
10Maxim Peysakhov, Donovan Artz, Evan Sultanik, William C. Regli Network Awareness for Mobile Agents on Ad Hoc Networks. Search on Bibsonomy AAMAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Josep Domingo-Ferrer, Vicenç Torra Disclosure risk assessment in statistical microdata protection via advanced record linkage. Search on Bibsonomy Stat. Comput. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF disclosure risk for microdata, record linkage, statistical disclosure control, re-identification
10Luca Durante, Riccardo Sisto, Adriano Valenzano Automatic testing equivalence verification of spi calculus specifications. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF equivalence verification, Cryptographic protocols, state space exploration
10Jonathan Hui, Zhiyuan Ren, Bruce H. Krogh Sentry-Based Power Management in Wireless Sensor Networks. Search on Bibsonomy IPSN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF wireless sensor networks, tracking, Power management
10Xinyuan Wang 0005, Douglas S. Reeves Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF intrusion tracing, robustness, correlation, stepping stones
10Ramkumar Chinchani, Shambhu J. Upadhyaya, Kevin A. Kwiat A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors. Search on Bibsonomy IWIA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10Traian Marius Truta, Farshad Fotouhi, Daniel C. Barth-Jones Privacy and confidentiality management for the microaggregation disclosure control method: disclosure risk and information loss measures. Search on Bibsonomy WPES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF information loss and microaggregation, data privacy, microdata, disclosure risk, statistical disclosure
10Kui Jia, Liyanage C. De Silva Combined Face Detection/Recognition System for Smart Rooms. Search on Bibsonomy AVBPA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10Kwong H. Yung Using Feedback to Improve Masquerade Detection. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF feedback-on-alarm, feedback policy, sequential classifier, online classifier, adaptive classifier, masquerading session, masquerading user, intrusion detection, naive-Bayes classifier, masquerade detection
10Seung-Hyun Seo, Sang-Ho Lee A Secure Mobile Agent System Using Multi-signature Scheme in Electronic Commerce. Search on Bibsonomy Human.Society@Internet 2003 The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Multi-signature scheme, Mobile agent system
10Lingxuan Hu, David Evans 0001 Secure Aggregation for Wireless Network. Search on Bibsonomy SAINT Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10Tobias Hauser, Christian Wenz DRM Under Attack: Weaknesses in Existing Systems. Search on Bibsonomy Digital Rights Management The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10David A. Basin, Sebastian Mödersheim, Luca Viganò 0001 An On-the-Fly Model-Checker for Security Protocol Analysis. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10Pedro Alípio, Paulo Carvalho 0002, José Neves 0001 Using CLIPS to Detect Network Intrusions. Search on Bibsonomy EPIA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Intrusion detection, CLIPS, SNORT, attack scenarios, certainty factors
10Yongge Wang, Yuliang Zheng 0001 Fast and Secure Magnetic WORM Storage Systems. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10John P. McDermott, Anya Kim, Judith N. Froscher Merging paradigms of survivability and security: stochastic faults and designed faults. Search on Bibsonomy NSPW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10Duncan S. Wong An optimized authentication protocol for mobile network reconsidered. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Mancini Remus: a security-enhanced operating system. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF privileged tasks, system penetration, Access control, Linux, system calls interception
10Michael J. Butler On the Use of Data Refinement in the Development of Secure Communications Systems. Search on Bibsonomy Formal Aspects Comput. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Refinement, Security protocols, CSP, B, Action systems
10Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis. Search on Bibsonomy ISSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Philippa J. Broadfoot, A. W. Roscoe 0001 Capturing Parallel Attacks within the Data Independence Framework. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Paolo Maggi, Riccardo Sisto Using SPIN to Verify Security Properties of Cryptographic Protocols. Search on Bibsonomy SPIN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Giorgio Giacinto, Fabio Roli Intrusion Detection in Computer Networks by Multiple Classifier Systems. Search on Bibsonomy ICPR (2) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Chong-Woo Woo, Jin-Woo Choi, Martha W. Evens Web-Based ITS for Training System Managers on the Computer Intrusion. Search on Bibsonomy Intelligent Tutoring Systems The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Marco Bozzano, Giorgio Delzanno Automated protocol verification in linear logic. Search on Bibsonomy PPDP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF model checking, linear logic, authentication protocols, bottom-up evaluation
10Michele Boreale, Maria Grazia Buscemi A Framework for the Analysis of Security Protocols. Search on Bibsonomy CONCUR The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Ralf Küsters On the Decidability of Cryptographic Protocols with Open-Ended Data Structures. Search on Bibsonomy CONCUR The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Gene Itkis Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Luigi Catuogno, Ivan Visconti A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Gene Itkis, Leonid Reyzin SiBIR: Signer-Base Intrusion-Resilient Signatures. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Timothy W. Rauenbusch The mediation algorithm for real time negotiation. Search on Bibsonomy AAMAS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Giampaolo Bella Mechanising a Protocol for Smart Cards. Search on Bibsonomy E-smart The full citation details ... 2001 DBLP  DOI  BibTeX  RDF smart card protocols, Inductive Approach, authentication, confidentiality, key distribution
Displaying result #501 - #600 of 629 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license