The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "NSS"( http://dblp.L3S.de/Venues/NSS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/nss

Publication years (Num. hits)
2009 (90) 2010 (91) 2011 (58) 2012 (40) 2013 (72) 2014 (48) 2015 (42) 2016 (36) 2017 (60) 2018 (37) 2019 (48) 2020 (27) 2021 (25) 2022 (42) 2023 (22)
Publication types (Num. hits)
inproceedings(723) proceedings(15)
Venues (Conferences, Journals, ...)
NSS(738)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 215 occurrences of 177 keywords

Results
Found 738 publication records. Showing 738 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Rosanne English, Ron Poet Measuring the revised guessability of graphical passwords. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Boris Rozenberg, Yaron Gonen, Ehud Gudes, Nurit Gal-Oz, Erez Shmueli Tracking end-users in web databases. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Patryk Szewczyk Usability of Internet Security Software: Have they got it right? Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Steffen Bartsch Exploring twisted paths: Analyzing authorization processes in organizations. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1V. Koulolias, A. Kountzeris, Herbert Leitold, Bernd Zwattendorfer, A. Crespo, M. Stern STORK e-privacy and security. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Peter Amthor 0001, Winfried E. Kühnhauser, Anja Pölck Model-based safety analysis of SELinux security policies. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Pierangela Samarati, Sara Foresti, Jiankun Hu, Giovanni Livraga (eds.) 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011 Search on Bibsonomy NSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Martin Mihajlov, Saso Josimovski, Borka Jerman-Blazic A conceptual framework for evaluating usable security in authentication mechanisms - usability perspectives. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Amani S. Ibrahim, James H. Hamlyn-Harris, John Grundy 0001, Mohamed Almorsy CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud model. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Christoph Böhm 0003, Maximilian Hofer, Wolfgang Pribyl A microcontroller SRAM-PUF. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Rosanne English, Ron Poet Towards a metric for recognition-based graphical password security. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Serge Chaumette, Olivier Ly, Renaud Tabary Automated extraction of polymorphic virus signatures using abstract interpretation. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake Automatic security verification for 3-party authentication and key exchange protocols. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Marco Botta, Davide Cavagnino, Victor Pomponiu KL-F: Karhunen-Loève based fragile watermarking. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bassem Bakhache, Joseph M. Ghazal, Safwan El Assad Enhancement of ZigBee and Wi-Fi security by a robust and fast chaotic algorithm. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mirko Montanari, Roy H. Campbell Attack-resilient compliance monitoring for large distributed infrastructure systems. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1David Zage, Charles Edwin Killian, Cristina Nita-Rotaru Removing the blinders: Using information to mitigate adversaries in adaptive overlays. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ziyad S. Al-Salloum, Stephen D. Wolthusen A propagation model of a vulnerability mitigation computer worm - seawave. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yuanyuan Zhang 0002, Wassim Znaidi, Cédric Lauradoux, Marine Minier Flooding attacks against network coding and countermeasures. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Eesa A. Alsolami, Colin Boyd, Andrew J. Clark, Irfan Ahmed 0001 User-representative feature selection for keystroke dynamics. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sabrina De Capitani di Vimercati, Pierangela Samarati, Sara Foresti, Jiankun Hu Foreword from the Conference Chairs. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Arash Afshar, Mehran S. Fallah Reconstructing security types for automated policy enforcement in FABLE. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nataliia Bielova, Dominique Devriese, Fabio Massacci, Frank Piessens Reactive non-interference for a browser model. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Marta Fernández-Diego, Julián Marcelo-Cocho Modelling self-protected networks and dynamic systems. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Abdulbasit Ahmed, Alexei Lisitsa 0001, Clare Dixon A misuse-based network Intrusion Detection System using Temporal Logic and stream processing. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bernd Zwattendorfer, Arne Tauber, Thomas Zefferer A privacy-preserving eID based Single Sign-On solution. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nathan S. Evans, Christian Grothoff R5N: Randomized recursive routing for restricted-route networks. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yang Zhong, Hirofumi Yamaki, Hiroki Takakura A grid-based clustering for low-overhead anomaly intrusion detection. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Martine Bellaïche, Jean-Charles Grégoire Avoiding DDoS with active management of backlog queues. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Florian Kerschbaum Secure conjunctive keyword searches for unstructured text. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Robert Koch 0002, Dominik Holzapfel, Gabi Dreo Rodosek Data control in social networks. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Cynthia Wagner, Jérôme François, Radu State, Thomas Engel 0001 DANAK: Finding the odd! Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Huiyun Li, Qi Zhang, Hai Yuan Channel state information based key generation vs. side-channel analysis key information leakage. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mazdak Alimadadi, Mehran S. Fallah A distributed client-puzzle mechanism to mitigate bandwidth attacks. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Samia A. Ali, Refaat M. Mohamed, Mahmoud H. Fahim RCHB: Light-weight, provably-secure variants of the HB protocol using rotation and complementation. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jiang Ming 0002, Haibin Zhang, Debin Gao Towards ground truthing observations in gray-box anomaly detection. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xabier Ugarte-Pedrero, Igor Santos, Pablo García Bringas, Mikel Gastesi, José Miguel Esparza Semi-supervised learning for packed executable detection. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Amir Averbuch, Michael Kiperberg, Nezer Zaidenberg An efficient VM-based software protection. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sophie Gastellier-Prevost, Maryline Laurent Defeating pharming attacks at the client-side. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sheng Wei 0001, Miodrag Potkonjak Scalable consistency-based hardware trojan detection and diagnosis. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Khalid Nasr, Anas Abou El Kalam, Christian Fraboul A holistic methodology for evaluating wireless Intrusion Detection Systems. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yu Wang 0017, Yang Xiang 0001, Jun Zhang 0010, Shun-Zheng Yu A novel semi-supervised approach for network traffic clustering. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ravi Jhawar, Philip Inglesant, Nicolas T. Courtois, Martina Angela Sasse Make mine a quadruple: Strengthening the security of graphical one-time PIN authentication. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Panagiotis Rizomiliotis, Evangelos Rekleitis, Stefanos Gritzalis Designing secure RFID authentication protocols is (still) a non-trivial task. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nizar Ben Neji, Adel Bouhoula Towards safe and optimal filtering rule reordering for complex packet filters. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bofeng Zhang, Yuan Li, Yujing Liu, Jinshu Su Analysis of prefix hijacking based on AS hierarchical model. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nathalie Baracaldo, Amirreza Masoumzadeh 0001, James Joshi A secure, constraint-aware role-based access control interoperation framework. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alessio Bonti, Ming Li 0010, Wen Shi Improving P2P IPTV random peers search through user similarity. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hataichanok Saevanee, Nathan L. Clarke, Steven Furnell SMS linguistic profiling authentication on mobile device. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Renato Accornero, Daniele Rispoli, Francesco Bergadano Privacy-enhanced identity via browser extensions and linking services. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Roberto Gallo, Henrique Kawakami, Ricardo Dahab FORTUNA - A probabilistic framework for early design stages of hardware-based secure systems. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ayda Saïdane, Nicolas Guelfi Towards improving security testability of AADL architecture models. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Maurizio Adriano Strangio On the security of the ECKE-1N and EECKE-1N elliptic-curve key agreement protocols. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tony Cheneau, Andrei Vlad Sambra, Maryline Laurent A Trustful Authentication and Key Exchange Scheme (TAKES) for ad hoc networks. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sami Alsouri, Stefan Katzenbeisser 0001, Sebastian Biedermann Trustable outsourcing of business processes to cloud computing environments. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Valentim Oliveira, Tito Silva The power of credit card numbers and long CVVs. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yini Wang, Sheng Wen, Yang Xiang 0001 Modeling worms propagation on probability. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ahmad Ali Iqbal, Maximilian Ott, Aruna Seneviratne Resource Selection from Distributed Semantic Web Stores. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xu Huang 0001, Shirantha Wijesekera, Dharmendra Sharma 0001 Secure Communication in 802.11 Networks with a Novel Protocol Using Quantum Cryptography. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Matthieu-P. Schapranow, Alexander Zeier, Hasso Plattner A Dynamic Mutual RFID Authentication Model Preventing Unauthorized Third Party Access. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Shan Juan Xie, Sook Yoon, Hui Gong, Jin Wook Shin, Dong Sun Park Fingerprint Reference Point Determination Based on Orientation Features. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Juan E. Tapiador, John A. Clark Information-Theoretic Detection of Masquerade Mimicry Attacks. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yi Zhuang 0001 A Pivot-Based Distributed Pseudo Facial Image Retrieval in Manifold Spaces: An Efficiency Study. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alban Gabillon, Léo Letouzey A View Based Access Control Model for SPARQL. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yuping Wang 0003, Lei Fan A Smoothing Evolutionary Algorithm with Circle Search for Global Optimization. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Chunli Lv, Xiaoqi Jia, Lijun Tian, Jiwu Jing, Mingli Sun Efficient Ideal Threshold Secret Sharing Schemes Based on EXCLUSIVE-OR Operations. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lili Sun, Hua Wang 0002, Raj Jururajin, Sri Sriprakash A Purpose Based Access Control in XML Databases System. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Shamsul Kamal Ahmad Khalid, Jacob Zimmermann, Diane Corney, Colin J. Fidge Automatic Generation of Assertions to Detect Potential Security Vulnerabilities in C Programs That Use Union and Pointer Types. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Islam Tharwat Abdel-Halim, Hossam M. A. Fahmy, Ayman M. Bahaa El-Din, Mohamed H. El-Shafey Agent-Based Trusted On-Demand Routing Protocol for Mobile Ad Hoc Networks. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Rong-Jian Chen, Yu-Cheng Peng, Jun-Jian Lin, Jui-Lin Lai, Shi-Jinn Horng Novel Multi-bit Bitwise Adaptive Embedding Algorithms with Minimum Error for Data Hiding. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yinghua Guo, Ivan Lee Forensic Analysis of DoS Attack Traffic in MANET. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Min-Hua Shao, Ying-Chih Chin A Novel Approach to Dynamic ID-Based Remote User Authentication Scheme for Multi-server Environment. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Eder Mateus Nunes Gonçalves An Approach to Specify Knowledge in Multi-agent Systems Using Petri Nets. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Min Li, Hua Wang 0002 Specifying Usage Control Model with Object Constraint Language. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Adonis P. H. Fung, K. W. Cheung 0003 HTTPSLock: Enforcing HTTPS in Unmodified Browsers with Cached Javascript. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Steven Simpson, Adam T. Lindsay, David Hutchison 0001 Identifying Legitimate Clients under Distributed Denial-of-Service Attacks. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Reginald Lal, Andrew Chiou Computational Intelligence Utilisation in Simulation of Congestion Control in TCP/IP Edge Network. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1António Rosado, João M. P. Cardoso A Query Processing Strategy for Conceptual Queries Based on Object-Role Modeling. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Chaabane Abdelberi, Pere Manils, Mohamed Ali Kâafar Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Girija Chetty, Monica Biswas, Rashmi Singh Digital Video Tamper Detection Based on Multimodal Fusion of Residue Features. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Len Bui, Dat Tran 0001, Xu Huang 0001, Girija Chetty Face Gender Recognition Based on 2D Principal Component Analysis and Support Vector Machine. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Farzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini A Rights Management Approach to Securing Data Distribution in Coalitions. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ion Alberdi, Vincent Nicomette, Philippe Owezarski Luth: Composing and Parallelizing Midpoint Inspection Devices. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Fengyu Wang, Bin Gong, Shanqing Guo, Xiaofeng Wang Monitoring Heavy-Hitter Flows in High-Speed Network Concurrently. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Chuan-Long Wang, Yan-Ping Wang The Convergences of Multisplitting Parallel Methods for Non-Hermitian Positive Definite Systems. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kun Peng, Feng Bao 0001 Efficient Proof of Validity of Votes in Homomorphic E-Voting. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1M. Manzur Murshed, Tishna Sabrina, Anindya Iqbal, Kh Mahmudul Alam A Novel Anonymization Technique to Trade Off Location Privacy and Data Integrity in Participatory Sensing Systems. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mansoor Alicherry, Angelos D. Keromytis DIPLOMA: Distributed Policy Enforcement Architecture for MANETs. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Qussai Yaseen, Brajendra Panda Organizing Access Privileges: Maximizing the Availability and Mitigating the Threat of Insiders' Knowledgebase. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Liang Fu Lu, Mao Lin Huang, Mehmet A. Orgun, Jiawan Zhang An Improved Wavelet Analysis Method for Detecting DDoS Attacks. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ahmad Jabas, Wael Abdulal, Ramachandram Sirandas An Efficient and High Scalable Key Distribution Scheme for Mobile Ad Hoc Network through Mining Traffic Meta-data Patterns. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Cynthia Wagner, Gérard Wagener, Radu State, Thomas Engel 0001, Alexandre Dulaunoy Breaking Tor Anonymity with Game Theory and Data Mining. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Chih-Lun Chou, Gwo-Jiun Horng, Sheng-Tzong Cheng Fast IPTV Channel Switching Using Hot-View and Personalized Channel Preload over IEEE 802.16e. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ji Zhang An Efficient and Effective Duplication Detection Method in Large Database Applications. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ray Hunt, Jill Slay The Design of Real-Time Adaptive Forensically Sound Secure Critical Infrastructure. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hao Gao, Jun Yan 0005, Yi Mu 0001 Dynamic Trust Model for Federated Identity Management. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Pål Halvorsen, Dag Johansen, Bjørn Olstad, Tomas Kupka, Sverre Tennøe vESP: A Video-Enabled Enterprise Search Platform. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Fabrício da Costa Dias, Ryan Ribeiro de Azevedo, Cleyton Mário de Oliveira Rodrigues, Eric Rommel Dantas Galvão, Guilherme Ataíde Dias, Roberto Souto Maior de Barros OntoPsic: Leveraging the Knowledge in the Treatment and Diagnosis of Telepsychiatry. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xu Huang, John Campbell 0001, Frank Gao Scalar Multiplication of a Dynamic Window with Fuzzy Controller for Elliptic Curve Cryptography. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ping Li 0037, Guangdong Huang Credit Spread Option Pricing by Dynamic Copulas. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 738 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license