|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 146 occurrences of 129 keywords
|
|
|
Results
Found 685 publication records. Showing 685 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Steffen Bartsch |
A calculus for the qualitative risk assessment of policy override authorization. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry M. Golubchikov, Konstantin E. Rumiantsev |
Estimation of influence of error correction and privacy amplification on keys generation rate in QKD systems. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Irina V. Mashkina, Timur Kh. Tukhvatshin, Murat B. Guzairov |
The development of information security operational management system based on the intelligent technologies. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Josef Pieprzyk |
Evolution of cryptographic hashing. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich |
Digital camera identification based on rotated images. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Reza Azadmanesh, Mohsen Sharifi |
Towards a system-wide and transparent security mechanism using language-level information flow control. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Maxim O. Kalinin |
Permanent protection of information systems with method of automated security and integrity control. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alexander G. Chefranov, Ahmed Y. Mahmoud |
Elgamal public key cryptosystem and signature scheme in GU(m, p, n). |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ilker Korkmaz, Mehmet Emin Dalkiliç |
The weak and the strong password preferences: a case study on turkish users. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Carsten Schmoll, Nikolaos Chatzis, Christian Henke |
Protecting user privacy with multi-field anonymisation of ip addresses. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lyudmila K. Babenko, Evgeniya Ishchukova |
Differential analysis of GOST encryption algorithm. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Abdulkadir Akin, Aydin Aysu, Onur Can Ulusel, Erkay Savas |
Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Poonam Gera, Kumkum Garg, Manoj Misra |
Trust based multi-path routing for end to end secure data delivery in manets. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vadim D. Kotov, Vladimir I. Vasilyev |
Immune model based approach for network intrusion detection. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tatiana V. Stepanova, Maxim O. Kalinin, Peter Baranov, Dmitry P. Zegzhda |
Homogeneity analysis of power consumption for information security purposes. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | M. Asif Khan, Mureed Hussain |
Cyber security quantification model. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alexander V. Lyubimov |
Integral engineering technique for information security methodologies. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Sergeevich Mosolov, Olga Viktorovna Grafova |
Review of european patents for methods of security system design. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shunan Ma, Jingsha He, Feng Gao, Yuqiang Zhang |
A trust quantification method based on grey fuzzy theory. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Slava Kisilevich, Florian Mansmann |
Analysis of privacy in online social networks of runet. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia |
Improving first order differential power attacks through digital signal processing. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Suleyman Kondakci, Gökhan Yilmaz |
Implementation and performance evaluation of the RSEP protocol on ARM and intel platforms. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Evgeny Sergeevich Abramov, Denis Valerievich Mordvin, Oleg B. Makarevich |
Automated method for constructing of network traffic filtering rules. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry V. Cheremushkin, Alexander V. Lyubimov |
An application of integral engineering technique to information security standards analysis and refinement. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Behnam Rahnama, Atilla Elçi, Selcuk Celik |
Securing RFID-based authentication systems using ParseKey+. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Tereshkin |
Evil maid goes after PGP whole disk encryption. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | P. Lalith Suresh, Rajbir Kaur, Manoj Singh Gaur, Vijay Laxmi |
A collusion attack detection method for OLSR-based MANETS employing scruple packets. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Taner Tuncer, Yetkin Tatar |
FPGA based programmable embedded intrusion detection system. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Iryna Borysivna Tregubenko |
Reinforcement learning intellectual agent of protection for adapting to surrounding environment. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir I. Vorobiev, Ludmila N. Fedorchenko, Vadim P. Zabolotsky, Alexander V. Lyubimov |
Ontology-based analysis of information security standards and capabilities for their harmonization. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alexis Velarde Pantola, Susan Pancho-Festin, Florante Salvador |
Rating the raters: a reputation system for wiki-like domains. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Oleg B. Makarevich, Atilla Elçi, Mehmet A. Orgun, Sorin A. Huss, Ludmila K. Babenko, Alexander G. Chefranov, Vijay Varadharajan (eds.) |
Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010 |
SIN |
2010 |
DBLP BibTeX RDF |
|
1 | Said Gharout, Abdelmadjid Bouabdallah, Mounir Kellil, Yacine Challal |
Key management with host mobility in dynamic groups. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vinod P. Nair, Harshit Jain, Yashwant K. Golecha, Manoj Singh Gaur, Vijay Laxmi |
MEDUSA: MEtamorphic malware dynamic analysis usingsignature from API. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kazim Yumbul, Erkay Savas |
Efficient, secure, and isolated execution of cryptographic algorithms on a cryptographic unit. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
security, computer architecture, public key cryptography, instruction set extensions, cryptographic algorithms, aes |
1 | Vijay Varadharajan |
Evolution and challenges in trust and security in information system infrastructures. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
trust enhanced security, trust management, trust models |
1 | Alexandr S. Basan, Lyudmila K. Babenko, Oleg B. Makarevich |
A model of mandatory access for current database management systems. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
dbms security, mandatory access model, model, information security |
1 | Haider Abbas, Louise Yngström, Ahmed Hemani |
Adaptability infrastructure for bridging IT security evaluation and options theory. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
it product evaluation, it security evaluation, options theory |
1 | Vinod P. Nair, Vijay Laxmi, Manoj Singh Gaur, G. V. S. S. Phani Kumar, Yadvendra S. Chundawat |
Static CFG analyzer for metamorphic Malware code. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
metamorphic malware, normalization, obfuscation, control flow graph, longest common subsequence |
1 | Simon Edward Parkin, Aad P. A. van Moorsel, Robert Coles |
An information security ontology incorporating human-behavioural implications. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
human behavioural implications, information security ontology, password policy |
1 | Vijay Laxmi, Mudassar N. Khan, Sarath S. Kumar, Manoj Singh Gaur |
Buyer seller watermarking protocol for digital rights management. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
buyer-seller protocol, unbinding., watermark, digital rights management, certificate authority, piracy |
1 | Sari Haj Hussein |
The hush cryptosystem. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
base64, grammatical substitution, randomness degree, redundant data percentage, sentence substitution, word substitution, hidden markov models, statistical tests |
1 | Sumi M., Ebrahim A. Soujeri, Rahim Rajan, Harikrishnan A. I. |
Design of a zigbee-based RFID network for industry applications. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
rfid and zigbee, wns, wireless networks |
1 | Tomi O. Kelo, Jukka A. Koskinen |
Modeling network security competence for certification. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
network security, certification, competence |
1 | Somanath Tripathy |
Effective pair-wise key establishment scheme for wireless sensor networks. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
wireless sensor networks, cellular automata, key distribution, key establishment |
1 | Vadim D. Kotov, Vladimir I. Vasilyev |
Artificial immune system based intrusion detection system. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
negative selection algorithms, artificial immune system, intrusion detection system, system calls |
1 | Francesco Buccafurri, Gianluca Caminiti, Gianluca Lax |
Fortifying the dalì attack on digital signature. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
E-signature, digital signature, vulnerability analysis |
1 | Sanjay Rawat 0001, Ashutosh Saxena |
Danger theory based SYN flood attack detection in autonomic network. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
syn flood attack, intrusion detection, artificial immune system, adaptive threshold, autonomic networks, danger theory |
1 | Feodor Kulishov |
DFA-based and SIMD NFA-based regular expression matching on cell BE for fast network traffic filtering. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
network security, SIMD, regular expressions, cell broadband engine, DFA, NFA |
1 | Erdal Cayirci |
Deployed sensor networks and their security challenges in practice. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
sensor, actuator, secure routing |
1 | Mahdi Dashtbozorgi, Mohammad Abdollahi Azgomi |
A scalable multi-core aware software architecture for high-performance network monitoring. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
high-performance network monitoring, multi-core aware architecture, scalable architecture |
1 | Lie Liu, Chun Yuan |
Trace and revoke systems with short ciphertexts. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
revoke, trace, broadcast encryption, ciphertext |
1 | Sazia Parvin, Shohrab Ali, Song Han 0004, Tharam S. Dillon |
Security against DOS attack in mobile IP communication. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
care-of-address (coa), correspondent node (cn), denial-of-service (dos), distributed denial-of-service (ddos), foreign agent (fa), home agent (ha), mobile host (mh), mobile node (mn) |
1 | Vladimir Mikhailovich Shishkin, Sergey Vitalievich Savkov |
The method of interval estimation in risk-analysis system. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
dispersion of estimation, inaccuracy, uncertainty, probabilistic model, interval analysis, risk estimation |
1 | Andrey P. Kurilo, Natalia G. Miloslavskaya, Svetlana Tolstaya |
Ensuring information security controls for the Russian banking organizations. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
banking organizations, security controls, information security, russia |
1 | Kuldeep Singh, Audun Jøsang, Md. Sadek Ferdous, Ravishankar Borgaonkar |
Spam filter optimality based on signal detection theory. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
signal detection theory (sdt)., optimality, filters, spam, e-mail, tradeoffs |
1 | Mücahit Mutlugün, Oktay Adalier |
Turkish national electronic identity card. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
national identity card, biometrics, smart card, pki |
1 | Anand Singh, David J. Lilja |
Improving risk assessment methodology: a statistical design of experiments approach. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
Plackett-Burman., control, risk assessment, design of experiments |
1 | Xianghan Zheng, Vladimir A. Oleshchuk |
A secure architecture for P2PSIP-based communication systems. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
chord secure proxy, DHT (distributed hash table), session initiation protocol (SIP), peer-to-peer (P2P), chord, P2PSIP |
1 | Ahmed Y. Mahmoud, Alexander G. Chefranov |
Hill cipher modification based on eigenvalues HCM-EE. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
dynamic key, eiqenvalue, hill cipher, exponentiation, matrix, image encryption, pseudorandom number |
1 | Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda |
Extended electronic signature policies. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
extended business model, signature policy, e-commerce, public key infrastructure, electronic signature, ASN.1 |
1 | Dmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich, Anatolij Chumachenko |
Digital sound card identification based on recording path imperfections. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
audio recording device identification, automated identification, stationary components |
1 | Riccardo Bresciani, Andrew Butterfield |
Weakening the Dolev-Yao model through probability. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
protocol verification |
1 | Kemal Bicakci |
Pushing the limits of one-time signatures. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
digital signatures |
1 | Atilla Elçi, Oleg B. Makarevich, Mehmet A. Orgun, Alexander G. Chefranov, Josef Pieprzyk, Yuri Anatolievich Bryukhomitsky, Siddika Berna Örs (eds.) |
Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009 |
SIN |
2009 |
DBLP BibTeX RDF |
|
1 | Sorin Alexander Huss |
Embedded systems for IT security applications: properties and design considerations. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
fpga, embedded systems, cryptography, system-on-chip |
1 | Gökhan Dalkiliç, Devrim Sipahi, Mehmet Hilal Özcanhan |
A simple yet effective spam blocking method. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
SPF, spam blocking, spam |
1 | Samrat Mondal, Shamik Sural |
XML-based policy specification framework for spatiotemporal access control. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
estarbac, permission extent, role extent, spatiotemporal policy specification, xml |
1 | Khaled Salah 0001, Karim Sattar, Zubair A. Baig, Mohammed H. Sqalli, Prasad Calyam |
Resiliency of open-source firewalls against remote discovery of last-matching rules. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
dos attacks, nework security, firewalls |
1 | Anna Kostina, Natalia G. Miloslavskaya, Alexander I. Tolstoy |
Information security incident management process. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
information security incidents, security, management |
1 | Oleg B. Makarevich, Lyudmila K. Babenko |
Research and Education Activities of the Department of Security of Information Technologies of Taganrog Institute of Technology of the Southern Federal University in the Field of Information Security. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
security, education, research |
1 | Iftikhar Ahmad 0002, Azween B. Abdullah, Abdullah Sharaf Alghamdi |
Application of artificial neural network in detection of DOS attacks. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
internet control message protocol, multiple layered perceptron, resilient backpropagation, neural network, artificial neural network, false positive, dataset, false negative, detection rate, denial of service attack |
1 | Vladimir Kotenko, Alexey Evseev, Stas Kotenko, Konstantin E. Rumyantsev |
New approach to evaluate the effectiveness of the audio information protection for determining the identity of virtual speech images. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
effectiveness of the audio information protection, virtual adaptive scrambling, virtual scrambling, redundancy, information security, legibility, scrambling |
1 | R. Suriya, K. Saravanan, Arunkumar Thangavelu |
An integrated approach to detect phishing mail attacks: a case study. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
code script checker, domain name checker, linkguard, phishing |
1 | Elisa Bertino |
Assured information sharing: concepts and issues. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
information lifecycle, policy management systems, security policies, information sharing |
1 | Naveen Kumar 0001, Shrikant Ojha, Kritika Jain, Sangeeta Lal |
BEAN: a lightweight stream cipher. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
S-box, cipher, lightweight cryptography, grain |
1 | Erdal Cayirci, Son Thanh Nguyen, Chunming Rong |
Secure many to many routing for wireless sensor and actuator networks. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
sensor, actuator, secure routing |
1 | Çagdas Cirit, Feza Buzluca |
A UML profile for role-based access control. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
tagged value, role-based access control, model driven architecture, object constraint language, unified modeling language profile, model validation, stereotype, security engineering |
1 | Ashutosh Saxena |
An efficient and secure protocol for DTV broadcasts. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
authenticaion, settop box, bilinear pairing |
1 | Serif Bahtiyar, Murat Cihan, Mehmet Ufuk Çaglayan |
An architectural approach for assessing system trust based on security policy specifications and security mechanisms. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
trust, assessment |
1 | Jukka A. Koskinen, Tomi O. Kelo |
Pure e-learning course in information security. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
education, e-learning, awareness, information security, course |
1 | Christian Schridde, Matthew Smith 0001, Bernd Freisleben |
TrueIP: prevention of IP spoofing attacks using identity-based cryptography. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
network security, denial-of-service, signatures, identity-based cryptography, IP spoofing |
1 | Jayashree Padmanabhan, K. S. Easwarakumar, Gokul B., Harishankar S. |
Trust based traffic monitoring approach for preventing denial of service attacks. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
clustering, networks, trust, denial of service, centroid, dos |
1 | Atilla Elçi, Behnam Rahnama |
AWGN based seed for random noise generator in ParseKey+. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
imperfect use of timestamp, parsekey+, side channel attack, awgn |
1 | Moussa Amir Ehsan, Morteza Amini, Rasool Jalili |
A semantic-based access control mechanism using semantic technologies. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
MA(DL)2, semantic-based access control, semantic technologies, security mechanisms |
Displaying result #601 - #685 of 685 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7] |
|