Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Rosanne English, Ron Poet |
Measuring the revised guessability of graphical passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 364-368, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Boris Rozenberg, Yaron Gonen, Ehud Gudes, Nurit Gal-Oz, Erez Shmueli |
Tracking end-users in web databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 105-112, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Patryk Szewczyk |
Usability of Internet Security Software: Have they got it right? ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 337-341, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Steffen Bartsch |
Exploring twisted paths: Analyzing authorization processes in organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 216-223, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | V. Koulolias, A. Kountzeris, Herbert Leitold, Bernd Zwattendorfer, A. Crespo, M. Stern |
STORK e-privacy and security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 234-238, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Peter Amthor 0001, Winfried E. Kühnhauser, Anja Pölck |
Model-based safety analysis of SELinux security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 208-215, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Pierangela Samarati, Sara Foresti, Jiankun Hu, Giovanni Livraga (eds.) |
5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011 ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![IEEE, 978-1-4577-0458-1 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Martin Mihajlov, Saso Josimovski, Borka Jerman-Blazic |
A conceptual framework for evaluating usable security in authentication mechanisms - usability perspectives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 332-336, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Amani S. Ibrahim, James H. Hamlyn-Harris, John Grundy 0001, Mohamed Almorsy |
CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 113-120, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Christoph Böhm 0003, Maximilian Hofer, Wolfgang Pribyl |
A microcontroller SRAM-PUF. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 269-273, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Rosanne English, Ron Poet |
Towards a metric for recognition-based graphical password security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 239-243, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Serge Chaumette, Olivier Ly, Renaud Tabary |
Automated extraction of polymorphic virus signatures using abstract interpretation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 41-48, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake |
Automatic security verification for 3-party authentication and key exchange protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 254-258, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Marco Botta, Davide Cavagnino, Victor Pomponiu |
KL-F: Karhunen-Loève based fragile watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 65-72, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bassem Bakhache, Joseph M. Ghazal, Safwan El Assad |
Enhancement of ZigBee and Wi-Fi security by a robust and fast chaotic algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 300-304, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mirko Montanari, Roy H. Campbell |
Attack-resilient compliance monitoring for large distributed infrastructure systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 192-199, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | David Zage, Charles Edwin Killian, Cristina Nita-Rotaru |
Removing the blinders: Using information to mitigate adversaries in adaptive overlays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 129-136, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ziyad S. Al-Salloum, Stephen D. Wolthusen |
A propagation model of a vulnerability mitigation computer worm - seawave. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 347-352, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yuanyuan Zhang 0002, Wassim Znaidi, Cédric Lauradoux, Marine Minier |
Flooding attacks against network coding and countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 305-309, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Eesa A. Alsolami, Colin Boyd, Andrew J. Clark, Irfan Ahmed 0001 |
User-representative feature selection for keystroke dynamics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 229-233, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sabrina De Capitani di Vimercati, Pierangela Samarati, Sara Foresti, Jiankun Hu |
Foreword from the Conference Chairs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Arash Afshar, Mehran S. Fallah |
Reconstructing security types for automated policy enforcement in FABLE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 358-363, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nataliia Bielova, Dominique Devriese, Fabio Massacci, Frank Piessens |
Reactive non-interference for a browser model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 97-104, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Marta Fernández-Diego, Julián Marcelo-Cocho |
Modelling self-protected networks and dynamic systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 327-331, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Abdulbasit Ahmed, Alexei Lisitsa 0001, Clare Dixon |
A misuse-based network Intrusion Detection System using Temporal Logic and stream processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 1-8, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bernd Zwattendorfer, Arne Tauber, Thomas Zefferer |
A privacy-preserving eID based Single Sign-On solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 295-299, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nathan S. Evans, Christian Grothoff |
R5N: Randomized recursive routing for restricted-route networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 316-321, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yang Zhong, Hirofumi Yamaki, Hiroki Takakura |
A grid-based clustering for low-overhead anomaly intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 17-24, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Martine Bellaïche, Jean-Charles Grégoire |
Avoiding DDoS with active management of backlog queues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 310-315, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Florian Kerschbaum |
Secure conjunctive keyword searches for unstructured text. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 285-289, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Robert Koch 0002, Dominik Holzapfel, Gabi Dreo Rodosek |
Data control in social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 274-279, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Cynthia Wagner, Jérôme François, Radu State, Thomas Engel 0001 |
DANAK: Finding the odd! ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 161-168, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Huiyun Li, Qi Zhang, Hai Yuan |
Channel state information based key generation vs. side-channel analysis key information leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 264-268, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mazdak Alimadadi, Mehran S. Fallah |
A distributed client-puzzle mechanism to mitigate bandwidth attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 145-152, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Samia A. Ali, Refaat M. Mohamed, Mahmoud H. Fahim |
RCHB: Light-weight, provably-secure variants of the HB protocol using rotation and complementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 244-248, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jiang Ming 0002, Haibin Zhang, Debin Gao |
Towards ground truthing observations in gray-box anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 25-32, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xabier Ugarte-Pedrero, Igor Santos, Pablo García Bringas, Mikel Gastesi, José Miguel Esparza |
Semi-supervised learning for packed executable detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 342-346, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Amir Averbuch, Michael Kiperberg, Nezer Zaidenberg |
An efficient VM-based software protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 121-128, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sophie Gastellier-Prevost, Maryline Laurent |
Defeating pharming attacks at the client-side. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 33-40, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sheng Wei 0001, Miodrag Potkonjak |
Scalable consistency-based hardware trojan detection and diagnosis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 176-183, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Khalid Nasr, Anas Abou El Kalam, Christian Fraboul |
A holistic methodology for evaluating wireless Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 9-16, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yu Wang 0017, Yang Xiang 0001, Jun Zhang 0010, Shun-Zheng Yu |
A novel semi-supervised approach for network traffic clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 169-175, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ravi Jhawar, Philip Inglesant, Nicolas T. Courtois, Martina Angela Sasse |
Make mine a quadruple: Strengthening the security of graphical one-time PIN authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 81-88, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Panagiotis Rizomiliotis, Evangelos Rekleitis, Stefanos Gritzalis |
Designing secure RFID authentication protocols is (still) a non-trivial task. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 73-80, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nizar Ben Neji, Adel Bouhoula |
Towards safe and optimal filtering rule reordering for complex packet filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 153-160, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bofeng Zhang, Yuan Li, Yujing Liu, Jinshu Su |
Analysis of prefix hijacking based on AS hierarchical model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 322-326, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nathalie Baracaldo, Amirreza Masoumzadeh 0001, James Joshi |
A secure, constraint-aware role-based access control interoperation framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 200-207, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Alessio Bonti, Ming Li 0010, Wen Shi |
Improving P2P IPTV random peers search through user similarity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 137-144, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hataichanok Saevanee, Nathan L. Clarke, Steven Furnell |
SMS linguistic profiling authentication on mobile device. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 224-228, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Renato Accornero, Daniele Rispoli, Francesco Bergadano |
Privacy-enhanced identity via browser extensions and linking services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 89-96, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Gallo, Henrique Kawakami, Ricardo Dahab |
FORTUNA - A probabilistic framework for early design stages of hardware-based secure systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 184-191, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ayda Saïdane, Nicolas Guelfi |
Towards improving security testability of AADL architecture models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 353-357, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Maurizio Adriano Strangio |
On the security of the ECKE-1N and EECKE-1N elliptic-curve key agreement protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 259-263, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tony Cheneau, Andrei Vlad Sambra, Maryline Laurent |
A Trustful Authentication and Key Exchange Scheme (TAKES) for ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 249-253, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sami Alsouri, Stefan Katzenbeisser 0001, Sebastian Biedermann |
Trustable outsourcing of business processes to cloud computing environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 280-284, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Valentim Oliveira, Tito Silva |
The power of credit card numbers and long CVVs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 290-294, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yini Wang, Sheng Wen, Yang Xiang 0001 |
Modeling worms propagation on probability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 49-56, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Ali Iqbal, Maximilian Ott, Aruna Seneviratne |
Resource Selection from Distributed Semantic Web Stores. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 470-476, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xu Huang 0001, Shirantha Wijesekera, Dharmendra Sharma 0001 |
Secure Communication in 802.11 Networks with a Novel Protocol Using Quantum Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 594-599, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Matthieu-P. Schapranow, Alexander Zeier, Hasso Plattner |
A Dynamic Mutual RFID Authentication Model Preventing Unauthorized Third Party Access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 371-376, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shan Juan Xie, Sook Yoon, Hui Gong, Jin Wook Shin, Dong Sun Park |
Fingerprint Reference Point Determination Based on Orientation Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 216-222, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Juan E. Tapiador, John A. Clark |
Information-Theoretic Detection of Masquerade Mimicry Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 183-190, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yi Zhuang 0001 |
A Pivot-Based Distributed Pseudo Facial Image Retrieval in Manifold Spaces: An Efficiency Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 508-514, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alban Gabillon, Léo Letouzey |
A View Based Access Control Model for SPARQL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 105-112, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yuping Wang 0003, Lei Fan |
A Smoothing Evolutionary Algorithm with Circle Search for Global Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 412-418, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chunli Lv, Xiaoqi Jia, Lijun Tian, Jiwu Jing, Mingli Sun |
Efficient Ideal Threshold Secret Sharing Schemes Based on EXCLUSIVE-OR Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 136-143, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lili Sun, Hua Wang 0002, Raj Jururajin, Sri Sriprakash |
A Purpose Based Access Control in XML Databases System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 486-493, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shamsul Kamal Ahmad Khalid, Jacob Zimmermann, Diane Corney, Colin J. Fidge |
Automatic Generation of Assertions to Detect Potential Security Vulnerabilities in C Programs That Use Union and Pointer Types. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 351-356, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Islam Tharwat Abdel-Halim, Hossam M. A. Fahmy, Ayman M. Bahaa El-Din, Mohamed H. El-Shafey |
Agent-Based Trusted On-Demand Routing Protocol for Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 255-262, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Rong-Jian Chen, Yu-Cheng Peng, Jun-Jian Lin, Jui-Lin Lai, Shi-Jinn Horng |
Novel Multi-bit Bitwise Adaptive Embedding Algorithms with Minimum Error for Data Hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 306-311, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yinghua Guo, Ivan Lee |
Forensic Analysis of DoS Attack Traffic in MANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 293-298, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Min-Hua Shao, Ying-Chih Chin |
A Novel Approach to Dynamic ID-Based Remote User Authentication Scheme for Multi-server Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 548-553, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Eder Mateus Nunes Gonçalves |
An Approach to Specify Knowledge in Multi-agent Systems Using Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 456-461, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Min Li, Hua Wang 0002 |
Specifying Usage Control Model with Object Constraint Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 391-397, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Adonis P. H. Fung, K. W. Cheung 0003 |
HTTPSLock: Enforcing HTTPS in Unmodified Browsers with Cached Javascript. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 269-274, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Steven Simpson, Adam T. Lindsay, David Hutchison 0001 |
Identifying Legitimate Clients under Distributed Denial-of-Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 365-370, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Reginald Lal, Andrew Chiou |
Computational Intelligence Utilisation in Simulation of Congestion Control in TCP/IP Edge Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 191-198, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | António Rosado, João M. P. Cardoso |
A Query Processing Strategy for Conceptual Queries Based on Object-Role Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 398-403, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chaabane Abdelberi, Pere Manils, Mohamed Ali Kâafar |
Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 167-174, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Girija Chetty, Monica Biswas, Rashmi Singh |
Digital Video Tamper Detection Based on Multimodal Fusion of Residue Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 606-613, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Len Bui, Dat Tran 0001, Xu Huang 0001, Girija Chetty |
Face Gender Recognition Based on 2D Principal Component Analysis and Support Vector Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 579-582, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Farzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini |
A Rights Management Approach to Securing Data Distribution in Coalitions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 560-567, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ion Alberdi, Vincent Nicomette, Philippe Owezarski |
Luth: Composing and Parallelizing Midpoint Inspection Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 9-16, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Fengyu Wang, Bin Gong, Shanqing Guo, Xiaofeng Wang |
Monitoring Heavy-Hitter Flows in High-Speed Network Concurrently. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 160-166, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chuan-Long Wang, Yan-Ping Wang |
The Convergences of Multisplitting Parallel Methods for Non-Hermitian Positive Definite Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 430-434, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kun Peng, Feng Bao 0001 |
Efficient Proof of Validity of Votes in Homomorphic E-Voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 17-23, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | M. Manzur Murshed, Tishna Sabrina, Anindya Iqbal, Kh Mahmudul Alam |
A Novel Anonymization Technique to Trade Off Location Privacy and Data Integrity in Participatory Sensing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 345-350, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mansoor Alicherry, Angelos D. Keromytis |
DIPLOMA: Distributed Policy Enforcement Architecture for MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 89-98, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Qussai Yaseen, Brajendra Panda |
Organizing Access Privileges: Maximizing the Availability and Mitigating the Threat of Insiders' Knowledgebase. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 312-317, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Liang Fu Lu, Mao Lin Huang, Mehmet A. Orgun, Jiawan Zhang |
An Improved Wavelet Analysis Method for Detecting DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 318-322, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Jabas, Wael Abdulal, Ramachandram Sirandas |
An Efficient and High Scalable Key Distribution Scheme for Mobile Ad Hoc Network through Mining Traffic Meta-data Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 287-292, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Cynthia Wagner, Gérard Wagener, Radu State, Thomas Engel 0001, Alexandre Dulaunoy |
Breaking Tor Anonymity with Game Theory and Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 47-54, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chih-Lun Chou, Gwo-Jiun Horng, Sheng-Tzong Cheng |
Fast IPTV Channel Switching Using Hot-View and Personalized Channel Preload over IEEE 802.16e. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 502-507, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ji Zhang |
An Efficient and Effective Duplication Detection Method in Large Database Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 494-501, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ray Hunt, Jill Slay |
The Design of Real-Time Adaptive Forensically Sound Secure Critical Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 328-333, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hao Gao, Jun Yan 0005, Yi Mu 0001 |
Dynamic Trust Model for Federated Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 55-61, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Pål Halvorsen, Dag Johansen, Bjørn Olstad, Tomas Kupka, Sverre Tennøe |
vESP: A Video-Enabled Enterprise Search Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 534-541, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Fabrício da Costa Dias, Ryan Ribeiro de Azevedo, Cleyton Mário de Oliveira Rodrigues, Eric Rommel Dantas Galvão, Guilherme Ataíde Dias, Roberto Souto Maior de Barros |
OntoPsic: Leveraging the Knowledge in the Treatment and Diagnosis of Telepsychiatry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 515-520, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xu Huang, John Campbell 0001, Frank Gao |
Scalar Multiplication of a Dynamic Window with Fuzzy Controller for Elliptic Curve Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 600-605, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ping Li 0037, Guangdong Huang |
Credit Spread Option Pricing by Dynamic Copulas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 450-455, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|