The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for owner with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1974-1990 (17) 1991-1996 (15) 1997-1998 (15) 1999 (17) 2000 (26) 2001 (30) 2002 (41) 2003 (49) 2004 (63) 2005 (90) 2006 (91) 2007 (105) 2008 (77) 2009 (77) 2010-2011 (22) 2012-2013 (21) 2014-2015 (28) 2016 (27) 2017 (18) 2018 (19) 2019 (24) 2020 (25) 2021 (26) 2022 (25) 2023 (29) 2024 (3)
Publication types (Num. hits)
article(219) book(2) incollection(4) inproceedings(752) phdthesis(3)
Venues (Conferences, Journals, ...)
CoRR(16) HICSS(13) ARES(10) ICDE(9) ACISP(8) CHI Extended Abstracts(8) SAC(8) DEXA Workshops(7) ICICS(7) SIGMOD Conference(7) ICIS(6) SEC(6) WPES(6) ACM Trans. Database Syst.(5) AGILE(5) CCGRID(5) More (+10 of total 610)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 838 occurrences of 624 keywords

Results
Found 980 publication records. Showing 980 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
8Daniel Denev, Georgy Totkov, Rositsa Doneva, Nikolay Kasakliev Experimental software solution for e-projects and e-documents management. Search on Bibsonomy CompSysTech The full citation details ... 2007 DBLP  DOI  BibTeX  RDF conference management system, library management, project management
8Hitesh Ballani, Paul Francis, Xinyang Zhang A study of prefix hijacking and interception in the internet. Search on Bibsonomy SIGCOMM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hijacking, routing, BGP, interception
8Karen Griffiths, Tammie Kramolis Twelve steps to recovery: my co-dependent relationship with tivoli. Search on Bibsonomy SIGUCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF baylor resnet, bearweb, heat®, software support, tivoli storage manager®, security, ITS, help desk, relationship, data storage, information technology services, data recovery
8Yichun Liu, Zemao Zhao Payment Scheme for Multi-Party Cascading P2P Exchange. Search on Bibsonomy I3E (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Anupama Gannoruwa, Janaka Y. Ruwanpura Construction noise prediction and barrier optimization using special purpose simulation. Search on Bibsonomy WSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Shih Y. Chin, Anselmo R. P. Neto, Eduardo V. G. Filho Application of the traveling salesman problem heuristics to the reallocation of equipment in a small-size bakery aiming at minimizing bread production time. Search on Bibsonomy WSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Luciano Baresi, Sam Guinea, Pierluigi Plebani Policies and Aspects for the Supervision of BPEL Processes. Search on Bibsonomy CAiSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Yuancheng Li, Kehe Wu, Yinglong Ma, Shipeng Zhang Image Digital Watermarking Technique Based on Kernel Independent Component Analysis. Search on Bibsonomy RSFDGrC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF image digital watermarking, Kernel Independent Component Analysis, wavelet transform
8Nouha Oualha, Pietro Michiardi, Yves Roudier A Game Theoretic Model of a Protocol for Data Possession Verification. Search on Bibsonomy WOWMOM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Xiaojuan Xu, Hong Peng 0001, Chengyuan He DWT-Based Audio Watermarking Using Support Vector Regression and Subsampling. Search on Bibsonomy WILF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Chen Li 0001, Houtan Shirani-Mehr, Xiaochun Yang 0001 Protecting Individual Information Against Inference Attacks in Data Publishing. Search on Bibsonomy DASFAA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Nai-Wei Lo, Kuo-Hui Yeh Novel RFID Authentication Schemes for Security Enhancement and System Efficiency. Search on Bibsonomy Secure Data Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Privacy, Authentication, RFID
8Junqi Zhang, Yan Wang 0002, Vijay Varadharajan Mobile Agent and Web Service Integration Security Architecture. Search on Bibsonomy SOCA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Toshikazu Hori, Mitoshi Fujimoto Practical product management using RFID technology in recycling system. Search on Bibsonomy SMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Saied Yousefi, Keith W. Hipel, Tarek Hegazy, James A. Witmer, Peter Gray Negotiationcharacteristics in brownfield redevelopment projects. Search on Bibsonomy SMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Timo Kasper, Dario Carluccio, Christof Paar An Embedded System for Practical Security Analysis of Contactless Smartcards. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Low Level Reader, Fake RFID Tag, RFID, Relay Attack
8Mingyu Guo, Vincent Conitzer Worst-case optimal redistribution of VCG payments. Search on Bibsonomy EC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF payment redistribution, mechanism design, Vickrey-Clarke-Groves mechanism
8George Brancovici, Christian Müller-Schloer A Generic and Modular System Architecture for Trustworthy, Autonomous Applications. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Shiyu Li, Masahiro Okuda Watermarking for Progressive Human Motion Animation. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Anolan Milanés, Noemi de La Rocque Rodriguez, Bruno Schulze A classification for the implementations of heterogeneous strong migration of computations. Search on Bibsonomy CCGRID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Krzysztof Rzadca, Denis Trystram, Adam Wierzbicki Fair Game-Theoretic Resource Management in Dedicated Grids. Search on Bibsonomy CCGRID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Farzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini Enforcing P3P Policies Using a Digital Rights Management System. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Ivanoe De Falco, Antonio Della Cioppa, Umberto Scafuri, Ernesto Tarantino A Multiobjective Evolutionary Approach for Multisite Mapping on Grids. Search on Bibsonomy PPAM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Grid computing, mapping, Differential Evolution
8Bok-Min Goi, Raphael C.-W. Phan, Hean-Teik Chuah Cryptanalysis of Two Non-anonymous Buyer-Seller Watermarking Protocols for Content Protection. Search on Bibsonomy ICCSA (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security issues in UMS, Authentication in UMS, content protection and DRM, digital watermarking and fingerprinting, protocol
8Hyoungshick Kim, S. Jae Oh Self-authorized Public Key Management for Home Networks. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authorization, home network, identity-based encryption, public key, security framework
8Mingbiao Li, Xinmeng Chen, Feng Jiao, Zhijian Wu Optimization of Grid Resource Allocation Combining Fuzzy Theory with Generalized Assignment Problem. Search on Bibsonomy GCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Akitoshi Izumi, Yoshifumi Ueshige A proposal of efficient scheme of key management using ID-based encryption and Biometrics. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Zhan Gao, Siwei Luo, Ding Ding A Scheduling Mechanism Considering Simultaneous Running of Grid Tasks and Local Tasks in the Computational Grid. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Yide Liang, Xueli Yu, Rui Wang Triple Space Computing Based Semantic Web Services Communication. Search on Bibsonomy IITA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Toshiki Watanabe, Takahiro Hara, Yuki Kido, Shojiro Nishio An Update Propagation Strategy for Delay Reduction and Node Failure Tolerance in Peer-to-Peer Networks. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Vladimir Estivill-Castro, Ahmed HajYasien Fast Private Association Rule Mining by A Protocol for Securely Sharing Distributed Data. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Arnie Miles, Chad La Joie, Charlie Leonhardt, Jess Cannata Taking a Fresh Perspective on Middleware for Resource Sharing. Search on Bibsonomy WETICE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin Hu Towards trust-aware access management for ad-hoc collaborations. Search on Bibsonomy CollaborateCom The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Ángel M. Pérez-Bellido, Sancho Salcedo-Sanz, José Antonio Portilla-Figueras, Emilio G. Ortíz-García, Pilar García-Díaz An Agent System for Bandwidth Allocation in Reservation-Based Networks Using Evolutionary Computing and Vickrey Auctions. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Christian Tischer 0002, Andreas Müller 0014, Markus Ketterer, Lars Geyer Why does it take that long? Establishing Product Lines in the Automotive Domain. Search on Bibsonomy SPLC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Mike Lowery, Marcus Evans Scaling Product Ownership. Search on Bibsonomy AGILE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Changjun Hu, Jilin Zhang, Jue Wang 0013, Jianjiang Li Parallel iteration space alternate tiling Gauss-Seidel solver. Search on Bibsonomy CLUSTER The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Steven Trimberger Trusted Design in FPGAs. Search on Bibsonomy DAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Omaima Bamasak, Ning Zhang 0001 Reputation management and signature delegation: A distributed approach. Search on Bibsonomy Electron. Commer. Res. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Signature delegation, Mobile agent-based e-commerce, Proxy signature, Reputation management
8Jan Arild Audestad, Alexei A. Gaivoronski, Adrian S. Werner Extending the stochastic programming framework for the modeling of several decision makers: pricing and competition in the telecommunication sector. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Modeling of competition, Virtual operators, Pricing, Stochastic programming
8John Musacchio, Jean C. Walrand WiFi access point pricing as a dynamic game. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF WiFi pricing, game theory, network pricing
8Yu Cheng 0003, Weihua Zhuang Dynamic inter-SLA resource sharing in path-oriented differentiated services networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bandwidth borrowing, inter-SLA resource sharing, resource allocation, service level agreement, diffServ
8Leszek Lilien, Bharat K. Bhargava A scheme for privacy-preserving data dissemination. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part A The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Shu-Fen Tu, Ching-Sheng Hsu A DCT-based ownership identification method with gray-level and colorful signatures. Search on Bibsonomy Pattern Anal. Appl. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Ownership identification, Copyright protection scheme, Discrete cosine transform
8Einar Mykletun, Maithili Narasimha, Gene Tsudik Authentication and integrity in outsourced databases. Search on Bibsonomy ACM Trans. Storage The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Outsourced databases, signature aggregation, authentication, integrity, data integrity, storage, data authenticity
8H. Vicky Zhao, K. J. Ray Liu Traitor-Within-Traitor Behavior Forensics: Strategy and Risk Minimization. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Piotr Jaskowski, Anna Sobotka Multicriteria construction project scheduling method using evolutionary algorithm. Search on Bibsonomy Oper. Res. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Construction Project Scheduling, Contractor Selection, Multicriteria Optimization
8Åsa Lindström, Pontus Johnson, Erik Johansson, Mathias Ekstedt, Mårten Simonsson A survey on CIO concerns-do enterprise architecture frameworks support them? Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Strategic information system management, Enterprise architecture, IT management, Chief information officer (CIO), Enterprise architecture frameworks
8Steffen Kern, Torsten Dettborn, Ronny Eckhaus, Yang Ji, Christian Erfurth, Wilhelm R. Rossak, Peter Braun 0002 Assistant-Based Mobile Supply Chain Management. Search on Bibsonomy ECBS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Joan Esteve Riasol, Fatos Xhafa Juxta-Cat: a JXTA-based platform for distributed computing. Search on Bibsonomy PPPJ The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Java
8Éric Garcia, Julien Henriet, Jean-Christophe Lapayre Validation of a Protocol for Communication Management in CSCW Systems Using a Coloured-Petri Net Modelization. Search on Bibsonomy PDP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Alberto Trombetta, Elisa Bertino Private Updates to Anonymous Databases. Search on Bibsonomy ICDE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Privacy, anonymity, data management, secure computation
8Vikram Goyal, Shyam K. Gupta 0001, Indira Meshram, Anand Gupta PRINDA: Architecture and Design of Non-Disclosure Agreements in Privacy Policy Framework. Search on Bibsonomy ICDE Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Wael Adi, Rolf Ernst, Bassel Soudan, Abdulrahman Hanoun VLSI Design Exchange with Intellectual Property Protection in FPGA Environment Using both Secret and Public-Key Cryptography. Search on Bibsonomy ISVLSI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Alex Potanin, James Noble 0001, Dave Clarke 0001, Robert Biddle Generic ownership for generic Java. Search on Bibsonomy OOPSLA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Java, generics, type systems, ownership
8Berardina De Carolis, Giovanni Cozzolongo, Sebastiano Pizzutilo A Butler Agent for Personalized House Control. Search on Bibsonomy ISMIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Jaechun No, Chang Won Park, Sung-Soon Park 0001 The Consistent Data Replication Service for Distributed Computing Environments. Search on Bibsonomy ISMIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Fei Guo, Jianmin Wang 0001, Deyi Li Fingerprinting relational databases. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF database, robustness, watermark, fingerprint
8Mike Burmester, Judie Mulholland The advent of trusted computing: implications for digital forensics. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF specifications, encryption, file systems, trusted computing, forensics, cybercrime, data recovery
8Maryam Najafian Razavi, Lee Iverson A grounded theory of information sharing behavior in a personal learning space. Search on Bibsonomy CSCW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF user modeling, information sharing, weblog, grounded theory, information privacy, ePortfolio
8Ban Al-Ani, Susan Elliott Sim So, You Think You Are a Requirements Engineer? Search on Bibsonomy RE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Christof Ebert, Sjaak Brinkkemper Have You Spoken to Your Product Manager Recently? Search on Bibsonomy RE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Ralph Young Putting Requirements Theory into Practice at Northrop Grumman. Search on Bibsonomy RE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Arjan Durresi, Lyn Evans, Vamsi Paruchuri, Leonard Barolli Secure 3G User Authentication in Adhoc Serving Networks. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Wolfgang Wahlster, Alexander Kröner, Dominik Heckmann SharedLife: Towards Selective Sharing of Augmented Personal Memories. Search on Bibsonomy Reasoning, Action and Interaction in AI Theories and Systems The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Arnd Poetzsch-Heffter, Kathrin Geilmann, Jan Schäfer 0002 Infering Ownership Types for Encapsulated Object-Oriented Program Components. Search on Bibsonomy Program Analysis and Compilation The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Jaechun No, Chang Won Park, Sung-Soon Park 0001 The Replica Management for Wide-Area Distributed Computing Environments. Search on Bibsonomy NGITS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Agusti Solanas, Josep Domingo-Ferrer Watermarking Non-numerical Databases. Search on Bibsonomy MDAI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Private watermarking, Non-numerical databases, Data hiding, Database security
8You-Ru Lin, Hui-Yu Huang, Wen-Hsing Hsu An embedded watermark technique in video for copyright protection. Search on Bibsonomy ICPR (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Alois Ferscha Everyobjects in the Pervasive Computing Landscape. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Adeniyi Onabajo, Jens H. Jahnke Properties of Confidentiality Requirements. Search on Bibsonomy CBMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Feifei Li 0001, Marios Hadjieleftheriou, George Kollios, Leonid Reyzin Dynamic authenticated index structures for outsourced databases. Search on Bibsonomy SIGMOD Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF outsourced databases, authentication, cryptography, indexing, merkle trees
8Dirk Henrici, Joachim Götze, Paul Müller 0001 A Hash-based Pseudonymization Infrastructure for RFID Systems. Search on Bibsonomy SecPerU The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Feng Zhu 0010, Matt W. Mutka, Lionel M. Ni The Master Key: A Private Authentication Approach for Pervasive Computing Environments. Search on Bibsonomy PerCom The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Frode Hansen, Vladimir A. Oleshchuk Location-based Security Framework for use of Handheld Devices in Medical Information Systems. Search on Bibsonomy PerCom Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Greg T. Elliott, Bill Tomlinson PersonalSoundtrack: context-aware playlists that adapt to user pace. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2006 DBLP  DOI  BibTeX  RDF inherent feedback, mobility, interaction design, wearable computing, interactive music, emotional state
8Raghu K. Ganti, Praveen Jayachandran, Tarek F. Abdelzaher, John A. Stankovic SATIRE: a software architecture for smart AtTIRE. Search on Bibsonomy MobiSys The full citation details ... 2006 DBLP  DOI  BibTeX  RDF human activity identification, personal monitoring, smart attire
8Maithili Narasimha, Gene Tsudik Authentication of Outsourced Databases Using Signature Aggregation and Chaining. Search on Bibsonomy DASFAA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Elisabetta Farella, M. Sile O'Modhrain, Luca Benini, Bruno Riccò Gesture Signature for Ambient Intelligence Applications: A Feasibility Study. Search on Bibsonomy Pervasive The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Michael Verhaart, Kinshuk An Annotation Framework for a Virtual Learning Portfolio. Search on Bibsonomy ICALT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Yongdong Wu Protection of Video Logos with Randomization. Search on Bibsonomy ICME The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Keunho Yun, Seokwon Choi, Daijin Kim 0001 A Robust Location Tracking Using Ubiquitous RFID Wireless Network. Search on Bibsonomy UIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Jaechun No, Chang Park, Sung-Soon Park 0001 Data Replication Techniques for Data-Intensive Applications. Search on Bibsonomy International Conference on Computational Science (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Adarsh Golikeri, Panos Nasiopoulos, Z. Jane Wang 0001 An improved scalar quantization-based digital video watermarking scheme for H.264/AVC. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Guofu Gui, Ling-ge Jiang, Chen He 0001 A new watermarking system for joint ownership verification. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Yin-Jun Chen, Ching-Chung Chen, Shou-Nian Wang, Han-En Lin, Roy Chaoming Hsu GPSenseCar - A Collision Avoidance Support System Using Real-Time GPS Data in a Mobile Vehicular Network. Search on Bibsonomy ICSNC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Frank A. Zdarsky, Ivan Martinovic, Jens B. Schmitt On Self-coordination in Wireless Community Networks. (PDF / PS) Search on Bibsonomy PWC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Wireless LANs, contention, self-coordination
8Yanbing Liu, Yi Jian Performance evaluation and modeling in Grid Resource Management. Search on Bibsonomy GCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Aline Gouget, Jacques Patarin Probabilistic Multivariate Cryptography. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Vincenzo D'Andrea, G. R. Gangadharan Licensing Services: An "Open" Perspective. (PDF / PS) Search on Bibsonomy OSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Jacob Sparre Andersen, Tofta Teld Collaborative Personalised TV Programming. Search on Bibsonomy AXMEDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Qutaiba Albluwi, Ibrahim Kamel Watermarking Essential Data Structures for Copyright Protection. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Amir Houman Sadr, Shahrokh Ghaemmaghami A Collusion-Resistant Video Watermarking Scheme. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Alois Ferscha, Manfred Hechinger, Andreas Riener, Heinrich Schmitzberger, Marquart Franz, Marcos dos Santos Rocha, Andreas Zeidler Context-Aware Profiles. Search on Bibsonomy ICAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Context-Aware Profiles, Profile Matching, Peer-to- Peer, Semistructured Data, Proximity, Self Description
8Melissa Chase, Anna Lysyanskaya On Signatures of Knowledge. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Weiwei Jing, Liusheng Huang, Yonglong Luo, Weijiang Xu, Yifei Yao An Algorithm for Privacy-Preserving Quantitative Association Rules Mining. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Mikhail J. Atallah Security Issues in Collaborative Computing. Search on Bibsonomy COCOON The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Chae Hoon Lim, Taekyoung Kwon 0002 Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Yinglian Xie, Michael K. Reiter, David R. O'Hallaron Protecting Privacy in Key-Value Search Systems. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Rui Li 0049, Shenghua Bao, Jin Wang, Yuanjie Liu, Yong Yu 0001 Web Scale Competitor Discovery Using Mutual Information. Search on Bibsonomy ADMA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 980 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license