The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Intruder with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1995 (16) 1996-1999 (15) 2000 (16) 2001-2002 (39) 2003 (35) 2004 (40) 2005 (47) 2006 (51) 2007 (59) 2008 (66) 2009 (43) 2010 (18) 2011-2012 (28) 2013-2014 (27) 2015 (15) 2016-2017 (29) 2018-2019 (18) 2020 (15) 2021 (18) 2022 (15) 2023 (16) 2024 (3)
Publication types (Num. hits)
article(160) book(1) incollection(1) inproceedings(464) phdthesis(3)
Venues (Conferences, Journals, ...)
CoRR(29) ACC(7) CSFW(7) ESORICS(7) RTA(7) CDC(6) EUROCRYPT(6) ARES(5) Formal Aspects in Security and...(5) ICC(5) SMC(5) ACSAC(4) ICCSA (1)(4) ICRA(4) Int. J. Inf. Sec.(4) IROS(4) More (+10 of total 415)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 387 occurrences of 262 keywords

Results
Found 629 publication records. Showing 629 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
10Michaël Rusinowitch, Mathieu Turuani Protocol Insecurity with Finite Number of Sessions is NP-Complete. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Lawrence C. Paulson SET Cardholder Registration: The Secrecy Proofs. Search on Bibsonomy IJCAR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Daniel F. Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley Holliday, Travis Reid Autonomic Response to Distributed Denial of Service Attacks. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Sung-Ming Yen Practical Key Recovery Schemes. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Yevgeniy Dodis, Amit Sahai, Adam D. Smith On Perfect and Adaptive Security in Exposure-Resilient Cryptography. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Yannick Chevalier, Laurent Vigneron A Tool for Lazy Verification of Security Protocols. Search on Bibsonomy ASE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Giorgio Delzanno, Sandro Etalle Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols. Search on Bibsonomy LOPSTR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Sang-Min Park, Kyung-Yong Chwa, Jae-Ha Lee Characterization of Rooms Searchable by Two Guards. Search on Bibsonomy ISAAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
10Kamel Adi, Mourad Debbabi, Mohamed Mejri A New Logic for Electronic Commerce Protocols. Search on Bibsonomy AMAST The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
10Catherine Meadows 0001 Invariant Generation Techniques in Cryptographic Protocol Analysis. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
10Iliano Cervesato, Nancy A. Durgin, John C. Mitchell, Patrick Lincoln, Andre Scedrov Relating Strands and Multiset Rewriting for Security Protocol Analysis. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
10Giampaolo Bella Lack of Explicitness Strikes Back. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
10Giampaolo Bella Lack of Explicitness Strikes Back (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
10Thomas Genet, Francis Klay Rewriting for Cryptographic Protocol Verification. Search on Bibsonomy CADE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
10Johann Schumann PIL/SETHEO: A Tool for the Automatic Analysis of Authentication Protocols. Search on Bibsonomy CAV The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
10Riccardo Focardi, Fabio Martinelli A Uniform Approach for the Definition of Security Properties. Search on Bibsonomy World Congress on Formal Methods The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
10Zhongzhi Shi, Ju Wang, Hu Cao The Security Mechanism In Multiagent System AOSDE. Search on Bibsonomy PRIMA The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
10Luciano Paschoal Gaspary, Liane Margarida Rockenbach Tarouco Characterization and Measurements of Enterprise Network Traffic with RMON 2. Search on Bibsonomy DSOM The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
10Richard C. Linger, Nancy R. Mead, Howard F. Lipson Requirements Definition for Survivable Network Systems. Search on Bibsonomy ICRE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
10Mihir Bellare, Russell Impagliazzo, Moni Naor Does Parallel Repetition Lower the Error in Computationally Sound Protocols? Search on Bibsonomy FOCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
10Chun-I Fan, Chin-Laung Lei A Multi-Recastable Ticket Scheme for Electronic Elections. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
10Daniel E. O'Leary Some Privacy Issues in Knowledge Discovery: The OECD Personal Privacy Guidelines. Search on Bibsonomy IEEE Expert The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
10Chih-Hung Wang, Tzonelih Hwang, Jiun-Jang Tsai On the Matsumoto and Imai's Human Identification Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
10Robert Cooper Experience with Causally and Totally Ordered Communication Support, A cautionary tale. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
10Peter Gemmell, Moni Naor Codes for Interactive Authentication. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
10Jean-Charles Fabre, Brian Randell An Object-Oriented View of Fragmented Data Processing for Fault and Intrusion Tolerance in Distributed Systems. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
10George I. Davida, Yvo Desmedt, René Peralta 0001 A Key Distribution System Based On Any One-Way Function (Extended Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
10Andrew J. Clark Physical Protection of Cryptographic Devices. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
10Andreas Pfitzmann, Michael Waidner Networks Without User Observability: Design Options. Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #629 of 629 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license