The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SECRYPT"( http://dblp.L3S.de/Venues/SECRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/secrypt

Publication years (Num. hits)
2006 (73) 2007 (67) 2008 (83) 2009 (62) 2010 (71) 2011 (68) 2012 (67) 2013 (71) 2014 (64) 2015 (53) 2016 (52) 2017 (67) 2021 (96) 2022 (85) 2023 (100)
Publication types (Num. hits)
inproceedings(1064) proceedings(15)
Venues (Conferences, Journals, ...)
SECRYPT(1079)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 1079 publication records. Showing 1079 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Geoffrey Charles Fox Cyberinfrastructure for eScience and eBusiness from Clouds to Exascale. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Nirali R. Nanavati, Devesh C. Jinwala Privacy Preserving Approaches for Global Cycle Detections for Cyclic Association Rules in Distributed Databases. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Denis Efremov, Nikolay V. Pakulin Sevigator: Network Confinement of Malware Applications and Untrusted Operating Systems. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Apostolos P. Fournaris Distributed Threshold Certificate based Encryption Scheme with No Trusted Dealer. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Marcelo Carlomagno Carlos, Jean Everson Martina, Geraint Price, Ricardo Felipe Custódio A Proposed Framework for Analysing Security Ceremonies. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Xun Yi, Raylin Tso, Eiji Okamoto Identity-based Password-Authenticated Key Exchange for Client/Server Model. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Liran Lerman, Olivier Markowitch, Jorge Nakahara Jr. Key Management as a Service. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Mehdi Fallahpour, David Megías 0001, Hossein Najaf-Zadeh Adaptive Speech Watermarking in Wavelet Domain based on Logarithm. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Byoung-Koo Kim, Ikkyun Kim, Tai-Myoung Chung Network-based Executable File Extraction and Analysis for Malware Detection. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Venu Govindaraju Making Sense of All Things Handwritten - From Postal Addresses to Tablet Notes. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Yuyu Chou, Jan Oetting, Olga Levina Building the Security Foundation to Embrace Public Software-as-a-Service (SaaS) - Security Policies for SaaS Data Protection. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Leyli Javid Khayati, Erkay Savas, Berkant Ustaoglu, Cengiz Örencik Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Igor V. Kotenko, Olga Polubelova, Igor Saenko 0001 Data Repository for Security Information and Event Management in Service Infrastructures. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Johan Garcia 0001 Quantifying the Benefits of File Size Information for Forensic Hash Matching. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Igor V. Kotenko, Andrey Chechulin, Evgenia Novikova Attack Modelling and Security Evaluation for Security Information and Event Management. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Martin Schütte, Thomas Scheffler, Bettina Schnor Development of a Snort IPv6 Plugin - Detection of Attacks on the Neighbor Discovery Protocol. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Constantinos Patsakis, Kleanthis Dellios Securing In-vehicle Communication and Redefining the Role of Automotive Immobilizer. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Tzachy Reinman, Erez Waisbard PPiTTA - Preserving Privacy in TV Targeted Advertising. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Stefan Rass, Michal Koza On Secure Communication over Wireless Sensor Networks. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Julian Schütte, Hervais Simo Fhom, Mark Gall Security Policies in Dynamic Service Compositions. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Benjamin Vetter, Osman Ugus, Dirk Westhoff, Christoph Sorge Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Henrich Christopher Pöhls, Kai Samelin, Hermann de Meer, Joachim Posegga Flexible Redactable Signature Schemes for Trees - Extended Security Model and Construction. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Min Li, Yulong Zhang, Kun Bai, Wanyu Zang, Meng Yu 0001, Xubin He Improving Cloud Survivability through Dependency based Virtual Machine Placement. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Andreas C. Sonnenbichler, Andreas Geyer-Schulz ADQL: A Flexible Access Definition and Query Language to Define Access Control Models. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Michael Tunstall Improved "Partial Sums"-based Square Attack on AES. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Nagaraj V. Dharwadkar, B. B. Amberker Reversible Steganographic Scheme with High Embedding Capacity using Dual Cover Images. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Anna Sojka, Krzysztof Piotrowski lmRNG: A Lightweight Pseudorandom Number Generator for Wireless Sensor Networks. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Chiara Valentina Schiavo, Andrea Visconti An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Keita Emura, Mohammad Shahriar Rahman Constructing Secure-channel Free Searchable Encryption from Anonymous IBE with Partitioned Ciphertext Structure. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Florian Legendre, Gilles Dequen, Michaël Krajecki Inverting Thanks to SAT Solving - An Application on Reduced-step MD*. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Harris E. Michail, George Athanasiou, Andreas Gregoriades, George Theodoridis, Costas E. Goutis On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Sushil Jajodia A Mission-centric Framework for Cyber Situational Awareness. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Rodolphe Lampe, Jacques Patarin Analysis of Some Natural Variants of the PKP Algorithm. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Ali Hammami, Noëmie Simoni Secure and Seamless Session Management in Mobile and Heterogeneous Environment. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Alessio Di Mauro, Alessandro Mei, Sushil Jajodia Secure File Allocation and Caching in Large-scale Distributed Systems. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Marek Klonowski, Piotr Syga, Wojciech Wodo Some Remarks on Keystroke Dynamics - Global Surveillance, Retrieving Information and Simple Countermeasures. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Deepthi N. Ratnayake, Hassan B. Kazemian, Syed A. Yusuf Improved Detection of Probe Request Attacks - Using Neural Networks and Genetic Algorithm. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Matt Henricksen Two Dragons - A Family of Fast Word-based Stream Ciphers. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Guillaume Barbu, Philippe Hoogvorst, Guillaume Duc Tampering with Java Card Exceptions - The Exception Proves the Rule. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Leonardo Maccari A Collaborative Firewall for Wireless Ad-Hoc Social Networks. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Keith B. Frikken Cryptographic Enforcement of Access Control while Mitigating Key Sharing. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Domenico Vitali, Antonio Villani, Angelo Spognardi, Roberto Battistoni, Luigi V. Mancini DDoS Detection with Information Theory Metrics and Netflows - A Real Case. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Julien Bringer, Alain Patey VLR Group Signatures - How to Achieve Both Backward Unlinkability and Efficient Revocation Checks. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Pierangela Samarati, Wenjing Lou, Jianying Zhou 0001 (eds.) SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Luís M. Correia A Perspective of the Networks of the Future and Smart Cities. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Michael Brenner 0003, Henning Perl, Matthew Smith 0001 Practical Applications of Homomorphic Encryption. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1George Athanasiou, Chara I. Chalkou, D. Bardis, Harris E. Michail, George Theodoridis, Costas E. Goutis High-throughput Hardware Architectures of the JH Round-three SHA-3 Candidate - An FPGA Design and Implementation Approach. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Seungyong Yoon, Jintae Oh, Ikkyun Kim, Jongsoo Jang Defense Against TCP Flooding Attack. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Sandra Diaz-Santiago, Debrup Chakraborty On Securing Communication from Profilers. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Anup Kumar Bhattacharya, Abhijit Das 0004, Dipanwita Roy Chowdhury, Bhargav Bellur, Aravind Iyer SIMD-based Implementations of Eta Pairing Over Finite Fields of Small Characteristics. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Rainer Schick, Christoph Ruland Non-repudiation of Forwarding - Traceability of Confidential Data Via Multiple Recipients. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Yonglin Sun, Yongjun Wang, Yi Zhang Self-ad-MCNHA-SLOS - A Self-adaptive Minimum-Cost Network Hardening Algorithm based on Stochastic Loose Optimize Strategy. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Denis Butin, Giampaolo Bella Verifying Privacy by Little Interaction and No Process Equivalence. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Jesus Luna Garcia, Hamza Ghani, Tsvetoslava Vateva, Neeraj Suri Quantitative Assessment of Cloud Security Level Agreements - A Case Study. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Keita Emura, Takashi Sato Flexible Group Key Exchange with On-demand Computation of Subgroup Keys Supporting Subgroup Key Randomization. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Masaki Inamura, Keiichi Iwamura, Ryu Watanabe, Makoto Nishikawa, Toshiaki Tanaka A New Tree-structure-specified Multisignature Scheme for a Document Circulation System. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Enrique Cabello Face Biometrics without Intrusion in Airport. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Xun Yi, Raylin Tso, Eiji Okamoto Three-party Password-authenticated Key Exchange without Random Oracles. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Isao Nakanishi, Sadanao Baba, Masahiro Inoue Driver Authentication using Brain Waves While Route Tracing as a Mental Task. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Yaser Esmaeili Salehani, Amr M. Youssef Differential Fault Analysis of Hummingbird. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Javier López 0001, Pierangela Samarati (eds.) SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Michael E. Farmer, William Arthur Study of the Phenomenology of DDOS Network Attacks in Phase Space. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Nicolas Friot, Christophe Guyeux, Jacques M. Bahi Chaotic Iterations for Steganography - Stego-security and Chaos-security. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Saptarsi Das, Keshavan Varadarajan, Ganesh Garga, Rajdeep Mondal, Ranjani Narayan, S. K. Nandy 0001 A Method for Flexible Reduction over Binary Fields using a Field Multiplier. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Praloy Kr. Biswas, Dipanwita Roy Chowdhury, Kankar S. Dasgupta Fast Selective Encryption Scheme for MP3 Files - Using GRAIN Stream Cipher. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Yanling Chen, A. J. Han Vinck A Fresh Look into the Biometric Authentication - Perspective from Shannon's Secrecy System and a Special Wiretap Channel. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Michael J. Fischer, Michaela Iorga, René Peralta 0001 A Public Randomness Service. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Imen Brahmi, Sadok Ben Yahia, Pascal Poncelet A Snort-based Mobile Agent for a Distributed Intrusion Detection System. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Björn Stelte Byzantine Decisions for Inferring Trust in Sensor Networks. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Almudena Alcaide, Esther Palomar, Israel Barroso-Perez, Ali E. Abdallah Privacy-enhancing Cryptography-based Materials. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Xin Xie, Fenlin Liu, Bin Lu 0003, Tao Zhao, Hanning Li A Static Software Birthmark based on Use-define Chains for Detecting the Theft of Java Programs. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Nicolas T. Courtois, Theodosis Mourouzis Black-box Collision Attacks on the Compression Function of the GOST Hash Function. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Guillermo Suarez-Tangil, Esther Palomar, Sergio Pastrana, Arturo Ribagorda Artificial Immunity-based Correlation System. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Fabio Piva, Ricardo Dahab E-Commerce and Fair Exchange - The Problem of Item Validation. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Carlo Maiero, Marino Miculan Unobservable Intrusion Detection based on Call Traces in Paravirtualized Systems. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Bechara al Bouna, Richard Chbeir, Alban Gabillon The Image Protector - A Flexible Security Rule Specification Toolkit . Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Stefan Rass, Peter Schartner Information-leakage in Hybrid Randomized Protocols. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Rafael Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro Garcia-Teodoro Analysis of Botnets through Life-cycle. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Andreas Kasten Towards an Information Control Policy Model - Achieving More Transparency in Internet Filtering Approaches. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Apostolos P. Fournaris Distributed Threshold Cryptography Certification with No Trusted Dealer. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1John Solis Private Searching for Sensitive File Signatures. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Antonio Vincenzo Taddeo, Luis Germán García Morales, Alberto Ferrante A Framework for Security and Workload Gradual Adaptation. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Han-Chieh Chao WiMAX? - A Case Study on Minimizing Construction Cost for IEEE 802.16j Multi-hop Relay Networks. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Nikos Vrakas, Dimitris Geneiatakis, Costas Lambrinoudakis IS IP Multimedia Subsystem Affected by ‘Malformed Message' Attacks? - An Evaluation of OpenIMS. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Winfried Lamersdorf Paradigms of Distributed Software Systems - Services, Processes, and Self-organization. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Carlos Javier Hernández-Castro, Arturo Ribagorda, Julio César Hernández Castro On the Strength of Egglue and Other Logic CAPTCHAs. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Kazumaro Aoki, Günther Roland, Yu Sasaki, Martin Schläffer Byte Slicing Grøstl - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Alexios Mylonas, Stelios Dritsas, Bill Tsoumas, Dimitris Gritzalis Smartphone Security Evaluation - The Malware Attack Case . Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Chunfang Yang, Tao Zhao, Hanning Li, Fenlin Liu Embedding Ratio Estimation based on Weighted Stego Image for Embedding in 2LSB. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Vincenzo Piuri, Fabio Scotti Biometrics Privacy - Technologies and Applications. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Xiaolin Cao, Máire O'Neill A Forward Private Protocol based on PRNG and LPN for Low-cost RFID . Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Zongbin Liu, Luning Xia, Jiwu Jing, Peng Liu 0005 A Tiny RSA Coprocessor based on Optimized Systolic Montgomery Architecture. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Iria Prieto, Eduardo Magaña, Daniel Morató, Mikel Izal Botnet Detection based on DNS Records and Active Probing. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Michel Embe Jiague, Marc Frappier, Frédéric Gervais, Pierre Konopacki, Régine Laleau, Jérémy Milhau, Richard St-Denis A Four-concern-oriented Secure IS Development Approach. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Giuseppe Di Modica, Orazio Tomarchio Semantic Annotations for Security Policy Matching in WS-policy. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Julian Schütte Apollon: Towards a Semantically Extensible Policy Framework. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Marek Klonowski, Michal Koza, Miroslaw Kutylowski How to Transmit Messages via WSN in a Hostile Environment. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Maria-Camilla Fiazza, Michele Peroli, Luca Viganò 0001 Attack Interference in Non-collaborative Scenarios for Security Protocol Analysis. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Abdesselam Redouane Towards a Calculus for Non Repudiation Protocols. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
Displaying result #601 - #700 of 1079 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license