The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SecureComm"( http://dblp.L3S.de/Venues/SecureComm )

URL (DBLP): http://dblp.uni-trier.de/db/conf/securecomm

Publication years (Num. hits)
2005 (51) 2006 (56) 2007 (62) 2008 (43) 2009 (27) 2010 (29) 2011 (36) 2012 (22) 2013 (28) 2015 (49) 2016 (49) 2017 (47) 2018-2022 (44) 2023 (1)
Publication types (Num. hits)
inproceedings(531) proceedings(13)
Venues (Conferences, Journals, ...)
SecureComm(544)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 544 publication records. Showing 544 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Khaled Masmoudi, Mureed Hussain, Hossam Afifi, Dominique Seret Short paper: Tri-party TLS Adaptation for Trust Delegation in Home Networks. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Tassos Dimitriou A Lightweight RFID Protocol to protect against Traceability and Cloning attacks. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yu Liu, Yang Li 0057, Hong Man Short Paper: A Distributed Cross-Layer Intrusion Detection System for Ad Hoc Networks. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Y. Dong, H. W. Go, Ai Fen Sui, Victor O. K. Li, Lucas Chi Kwong Hui, Siu-Ming Yiu Providing Distributed Certificate Authority Service in Mobile Ad Hoc Networks. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1David Llewellyn-Jones, Madjid Merabti, Qi Shi 0001, Bob Askwith Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Thomas E. Daniels, Mani Mina, Steve Russell Short Paper: A Signal Fingerprinting Paradigm for General Physical Layer and Sensor Network Security and Assurance. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Li Zhou, Jinfeng Ni, Chinya V. Ravishankar Short Paper: GKE: Efficient Group-based Key Establishment for Large Sensor Networks. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1A. Karygiannis, Aggelos Kiayias, Yiannis Tsiounis A Solution for Wireless Privacy and Payments based on E-cash. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jyh-How Huang, Jason Buckingham, Richard Han 0001 A Level Key Infrastructure for Secure and Efficient Group Communication in Wireless Sensor Network. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jing Deng 0002, Carl Hartung, Richard Han 0001, Shivakant Mishra A Practical Study of Transitory Master Key Establishment ForWireless Sensor Networks. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Danfeng Yao, Roberto Tamassia, Seth Proctor On Improving the Performance of Role-Based Cascaded Delegation in Ubiquitous Computing. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Caimu Tang, Anthony T. Chronopoulos, Cauligi S. Raghavendra Soft-Timeout Distributed Key Generation for Digital Signature based on Elliptic Curve D-log for Low-Power Devices. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Baik Hoh, Marco Gruteser Protecting Location Privacy Through Path Confusion. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sachin Garg, Navjot Singh 0001, Timothy K. Tsai Short Paper: Schemes for Enhancing the Denial-of-Service Tolerance of SRTP. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Tuomas Aura, Michael Roe Reducing Reauthentication Delay in Wireless Networks. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ziv Kfir, Avishai Wool Picking Virtual Pockets using Relay Attacks on Contactless Smartcard. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jukka Ylitalo, Patrik Salmela, Hannes Tschofenig SPINAT: Integrating IPsec into Overlay Routing. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Venkatesan Balakrishnan, Vijay Varadharajan Short Paper: Fellowship in Mobile Ad hoc Networks. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ophir Levy, Avishai Wool Uniform Framework for Cryptanalysis of the Bluetooth E₀ Cipher. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yongguang Zhang, Yi-an Huang, Wenke Lee An Extensible Environment for Evaluating Secure MANET. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Timothy W. van der Horst, Kent E. Seamons Short Paper: Thor - The Hybrid Online Repository. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Daniele Quercia, Stephen Hailes MOTET: Mobile Transactions using Electronic Tickets. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Issa M. Khalil, Saurabh Bagchi, Cristina Nita-Rotaru DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Roberto Di Pietro, Stefano Chessa, Piero Maestrini Computation, Memory and Bandwidth Efficient Distillation Codes to Mitigate DoS in Multicast. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Vagner J. do Sacramento Rodrigues, Markus Endler, Fernando N. Nascimento A Privacy Service for Context-aware Mobile Computing. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ioannis Pavlosoglou, Mark S. Leeson, Roger J. Green Applying Emergence to the Design of Routing Protocols for the Security of Wireless Ad Hoc Networks. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Wassim Itani, Ayman I. Kayssi, Ali Chehab Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yen-Chieh Ouyang, Chung-Hua Chu Short Paper: A Secure Interworking Scheme for UMTS-WLAN. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Baruch Awerbuch, Reza Curtmola, David Holmer, Herbert Rubens, Cristina Nita-Rotaru On the Survivability of Routing Protocols in Ad Hoc Wireless Networks. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Hahnsang Kim, Kang G. Shin, Walid Dabbous Improving Cross-domain Authentication overWireless Local Area Networks. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Katrin Hoeper, Guang Gong Short Paper: Limitations of Key Escrow in Identity-Based Schemes in Ad Hoc Networks. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Roberto Di Pietro, Antonio Durante, Luigi V. Mancini, Vishwas Patil Short Paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1David Sánchez Sánchez, Heribert Baldus A Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Urs Hengartner, Peter Steenkiste Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Gerhard P. Hancke 0002, Markus G. Kuhn An RFID Distance Bounding Protocol. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia Securing Topology Maintenance Protocols for Sensor Networks. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Dhananjay S. Phatak Spread-Identity mechanisms for DOS resilience and Security. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Nicholas Bambos Short Paper: Dynamic Risk Mitigation for 'Self-defending' Network Security. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1H. Ragab Hassan, Abdelmadjid Bouabdallah, Hatem Bettahar, Yacine Challal An Efficient Key Management Algorithm for Hierarchical Group Communication. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Stefan Schlott, Frank Kargl, Michael Weber 0001 Short paper: Random IDs for preserving location privacy. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ari Juels, David Molnar, David A. Wagner 0001 Security and Privacy Issues in E-passports. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jing Deng 0002, Richard Han 0001, Shivakant Mishra Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sandro Grech, Pasi Eronen Implications of Unlicensed Mobile Access (UMA) for GSM security. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Svetlana Radosavac, Karl Seamon, John S. Baras Short Paper: bufSTAT - a tool for early detection and classification of buffer overflow attacks. Search on Bibsonomy SecureComm The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #544 of 544 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license