The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SECRYPT"( http://dblp.L3S.de/Venues/SECRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/secrypt

Publication years (Num. hits)
2006 (73) 2007 (67) 2008 (83) 2009 (62) 2010 (71) 2011 (68) 2012 (67) 2013 (71) 2014 (64) 2015 (53) 2016 (52) 2017 (67) 2021 (96) 2022 (85) 2023 (100)
Publication types (Num. hits)
inproceedings(1064) proceedings(15)
Venues (Conferences, Journals, ...)
SECRYPT(1079)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 1079 publication records. Showing 1079 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Hidehito Gomi Data and Access Management using Access Tokens for Delegating Authority to Persons and Software. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Mohammad Reza Sohizadeh Abyaneh Colluding Tags Attack on the ECC-based Grouping Proofs for Rfids. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Houda Jouhari, El Mamoun Souidi A New Steganographic Scheme based on First Order Reed Muller Codes - A New Steganographic Scheme. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Jesus Luna Garcia, Hamza Ghani, Daniel Germanus, Neeraj Suri A Security Metrics Framework for the Cloud. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Jan Hajny, Lukas Malina, Vaclav Zeman Practical Anonymous Authentication - Designing Anonymous Authentication for Everyday Use. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Borja Sanz 0001, Pablo García Bringas Anomaly-based Spam Filtering. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Igor Santos, Carlos Laorden, Pablo García Bringas Collective Classification for Unknown Malware Detection. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Jinying Yu, Philipp Brune No Security by Obscurity - Why Two Factor Authentication Should Be based on an Open Design. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Jorge Bernal Bernabé, Juan Manuel Marín Pérez, José M. Alcaraz Calero, Félix J. García Clemente, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta Towards an Authorization System for Cloud Infrastructure Providers. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Ali Noorollahi Ravari, Mehran S. Fallah A Logical View of Nonmonotonicity in Access Control. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Jing Xu 0002, Wen Tao Zhu, Dengguo Feng A Smart Card based Generic Construction for Anonymous Authentication in Mobile Networks. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Wassim Itani, Ayman I. Kayssi, Ali Chehab Policy-based Security Channels for Protecting Network Communication in Mobile Cloud Computing. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Michael Brenner 0003, Jan Wiebelitz, Gabriele von Voigt, Matthew Smith 0001 A Smart-gentry based Software System for Secret Program Execution. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Stefan Popoveniuc, John Kelsey, Eugen Leontie On the Privacy Threats of Electronic Poll Books. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Marina Blanton, Mehrdad Aliasgari On the (Non-)reusability of Fuzzy Sketches and Extractors and Security in the Computational Setting. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Tobias Jeske Privacy-preserving Smart Metering without a Trusted-third-party. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Bogdan Groza, Pal-Stefan Murvay Higher Layer Authentication for Broadcast in Controller Area Networks. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Serge Vaudenay Related-key Attack against Triple Encryption based on Fixed Points. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Angel Jesus Varela-Vaca, Rafael M. Gasca, Sergio Pozo OPBUS: Risk-aware Framework for the Conformance of Security-quality Requirements in Business Processes. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Günther Lackner On the Security of Location Determination and Verification Methods for Wireless Networks. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan CCA Secure Certificateless Encryption Schemes based on RSA. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Danilo Gligoroski, Svein Johan Knapskog, Jørn Amundsen, Rune Erlend Jensen Internationally Standardized Efficient Cryptographic Hash Function. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Aline Bousquet, Patrice Clemente, Jean-François Lalande SYNEMA: Visual Monitoring of Network and System Security Sensors. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
1Dibyendu Mallik, Debdeep Mukhopadhyay New Pseudo Near Collision Attack on Tiger. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Anja Fischer, Winfried E. Kühnhauser Efficient Algorithmic Safety Analysis of HRU Security Models. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Aristeidis Chatzipoulidis, Ioannis Mavridis An ICT Security Management Framework. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Kashi Neupane, Rainer Steinwandt Server-assisted Long-term Secure 3-party Key Establishment. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Antonio Vincenzo Taddeo, Marcello Mura, Alberto Ferrante QoS and Security in Energy-harvesting Wireless Sensor Networks. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Avinash Darapureddi, Radhesh Mohandas, Alwyn Roshan Pais Throttling DDoS Attacks using Discrete Logarithm Problem. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Nikolaos G. Bourbakis Information Security: The SCAN - Secure Processor with Crypto-Biometrics Capabilities. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Ian F. Akyildiz Nanonetworks - A New Frontier in Communications. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Vahid R. Karimi, Donald D. Cowan Access Control Models for Business Processes. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Mihaela Ion, Giovanni Russello, Bruno Crispo Providing Confidentiality in Content-based Publish/subscribe Systems. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai Adaptive and Composable Non-interactive String-commitment Protocols. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Eliana Stavrou, Andreas Pitsillides, George C. Hadjichristofi, Christoforos N. Hadjicostis Security in Future Mobile Sensor Networks - Issues and Challenges. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Elisa Mannes, Eduardo da Silva, Michele Nogueira Lima, Aldri Luiz dos Santos Implications of Misbehaving Attacks on Probabilistic Quorum System for MANETs. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Stamatios V. Kartalopoulos Chaotic Quantum Cryptography - The Ultimate for Network Security. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Meng Yu 0001, Alex Hai Wang, Wanyu Zang, Peng Liu 0005 Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Swarun Kumar, Shivank Agrawal, Ramarathnam Venkatesan, Satyanarayana V. Lokam, C. Pandu Rangan Forcing Out a Confession - Threshold Discernible Ring Signatures. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Bo Lang Trust Degree based Access Control for Social Networks. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Harris E. Michail, George Athanasiou, Angeliki Kritikakou, Costas E. Goutis, Andreas Gregoriades, Vicky G. Papadopoulou Ultra High Speed SHA-256 Hashing Cryptographic Module for IPSec Hardware/Software Codesign. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Stefan Popoveniuc, Eugen Leontie Safe RPC - Auditing Mixnets Safely using Randomized Partial Checking. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka On a Construction of Stream-cipher-based Hash Functions. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Alex Hai Wang Don't Follow Me - Spam Detection in Twitter. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Jorge Munilla, Andrés Ortiz 0001, Alberto Peinado What can RFID do for Vanets? - A Cryptographic Point of View. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Kun Peng, Feng Bao 0001 Vulnerability of a Non-membership Proof Scheme. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Jan Hajny, Tomas Pelka, Vaclav Zeman Privacy Protection for user Authentication. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Benjamin Aziz, Alvaro Arenas, Ian Johnson, Matej Artac, Ales Cernivec, Philip Robinson Management of Security Policies in Virtual Organisations. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Khan Ferdous Wahid, Javier Rubio-Loyola Secure Bridging in Large Scale Deployment of Ethernet. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Christoforos Panos, Christos Xenakis, Ioannis Stavrakakis A Novel Intrusion Detection System for MANETs. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Marcia Gibson, Marc Conrad, Carsten Maple Infinite Alphabet Passwords - A Unified Model for a Class of Authentication Systems. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1George Yee, Xingli Xie, Shikharesh Majumdar Automated Threat Identification for UML. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Mihai-Lica Pura, Victor Valeriu Patriciu, Ion Bica Formal Verification of G-PAKE Using Casper/FDR2 - Securing a Group PAKE Protocol Using Casper/FDR2. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Lwin Khin Shar, Hee Beng Kuan Tan Auditing the Defense Against Cross Site Scripting in Web Applications. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Karim Tabia, Philippe Leray 0001 Handling IDS' Reliability in Alert Correlation - A Bayesian Network-based Model for Handling IDS's Reliability and Controlling Prediction/False Alarm Rate Tradeoffs. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Nicola Zannone, Milan Petkovic, Sandro Etalle Towards Data Protection Compliance. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Veena H. Bhat, S. Krishna 0001, P. Deepa Shenoy, K. R. Venugopal 0001, Lalit M. Patnaik HUBFIRE - A Multi-class SVM based JPEG Steganalysis using HBCL Statistics and FR Index. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Oliver Gmelch, Günther Pernul Preventing Malicious Portlets from Communicating and Intercepting in Collaboration Portals. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Petar M. Djuric From Nature to Methods and Back to Nature. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Mebae Ushida, Kazuo Ohta, Yutaka Kawai, Kazuki Yoneyama Proxiable Designated Verifier Signature. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1María Isabel González Vasco, Somayeh Heidarvand, Jorge L. Villar Anonymous Subscription Schemes - A Flexible Construction for On-line Services Access. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Jonny Milliken, Alan Marshall 0001 The Threat-Victim Table - A Security Prioritisation Framework For Diverse WLAN Network Topographies. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Nick Papanikolaou 0001, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson EnCoRe: Towards a Holistic Approach to Privacy. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Vittorio Ottaviani, Alberto Zanoni, Massimo Regoli Conjugation as Public Key Agreement Protocol in Mobile Cryptography. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Mahjoub Langar, Mohamed Mejri, Kamel Adi Rewriting-based Security Enforcement of Concurrent Systems - A Formal Approach. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Xiaoyu Wu, Duncan S. Wong, Qing Li Extended Visual Cryptography Scheme for Color Images with no Pixel Expansion. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Ahmed Al-Khazzar, Nick Savage 0001 Graphical Authentication based on user Behaviour. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Luan Ibraimi, Muhammad Asim 0007, Milan Petkovic An Encryption Scheme for a Secure Policy Updating. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Bradley Baker, C. Edward Chow HTEE: An HMAC based Tamper Evident Encryption. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Amin Milani Fard, Ke Wang 0001 An Effective Clustering Approach to Web Query Log Anonymization. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1José Antonio Álvarez-Cubero, Pedro J. Zufiria A C++ Class for Analysing Vector Boolean Functions from a Cryptographic Perspective. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Dimitrios Michalopoulos, Ioannis Mavridis Towards Risk based Prevention of Grooming Attacks. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Carlos Javier Hernández-Castro, Arturo Ribagorda, Yago Sáez Side-channel Attack on the HumanAuth CAPTCHA. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Daniel Slamanig, Stefan Rass Anonymous but Authorized Transactions Supporting Selective Traceability. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Christophe Guyeux, Jacques M. Bahi A New Chaos-based Watermarking Algorithm. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Keith B. Frikken, Yihua Zhang Confidentiality and Integrity for SUM Aggregation in Sensor Networks. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Alfonso Muñoz Muñoz, Justo Carracedo Gallardo, Irina Arguelles Álvarez Improving N-Gram Linguistic Steganography based on Templates. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Alex Biryukov, Deike Priemuth-Schmid, Bin Zhang 0003 Analysis of SNOW 3G⊕ Resynchronization Mechanism. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Shailesh Vaya Realizing Secure Multiparty Computation on Incomplete Networks. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Dipankar Dasgupta, Sudip Saha, Aregahegn Negatu Techniques for Validation and Controlled Execution of Processes, Codes and Data - A Survey. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Xiaoyi Zhou, Jixin Ma 0001, Wencai Du, Bo Zhao, Miltos Petridis, Yongzhe Zhao BMQE System - A MQ Equations System based on Ergodic Matrix. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1David M. Williams, Helen Treharne, Anthony T. S. Ho On the Importance of One-time Key Pairs in Buyer-seller Watermarking Protocols. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Glenford E. Mapp, Mahdi Aiash, Aboubaker Lasebae, Raphael Chung-Wei Phan Security Models for Heterogeneous Networking. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Murthy S. Andukuri, C. Edward Chow Efficient Asymmetric IPSec for Secure iSCSI. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1S. Sharmila Deva Selvi, S. Sree Vivek, Sakhi S. Anand, C. Pandu Rangan An Identity based Ring Signcryption Scheme with Public Verifiability. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Giovanni Cabiddu, Emanuele Cesena, Davide Vernizzi Anonymous Services - Enhancing End-user Privacy Exploiting Anonymous Networks. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Vipul Patel, Radhesh Mohandas, Alwyn R. Pais Attacks on Web Services and Mitigation Schemes. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Anna Sojka, Krzysztof Piotrowski, Peter Langendörfer Short ECC - A Lightweight Security Approach for Wireless Sensor Networks. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1John A. Clark, Juan E. Tapiador, John A. McDermid, Pau-Chen Cheng, Dakshi Agrawal, Natalie Ivanic, Dave Slogget Risk based Access Control with Uncertain and Time-dependent Sensitivity. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Abdelhalim Zaidi, Nazim Agoulmine, Tayeb Kenaza Piecewise Classification of Attack Patterns for Efficient Network Intrusion Detection. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Tim Dörflinger, Anna Voth, Juliane Krämer, Ronald Fromm "My Smartphone is a Safe!" - The User's Point of View Regarding Novel Authentication Methods and Gradual Security Levels on Smartphones. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Sandeep S. Kumar Anonymous Social Stamps - Authenticating Anonymous Statements to Friends with Privacy. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Sokratis K. Katsikas, Pierangela Samarati (eds.) SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
1Mihai-Lica Pura, Victor Valeriu Patriciu, Ion Bica Simulation of an Identity-based Cryptography Scheme for Ad Hoc Networks. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Guanhan Chew, Aileen Zhang, Khoongming Khoo Resynchronization Attack on Stream Ciphers Filtered by Maiorana-McFarland Functions. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Mohsen Hajsalehi Sichani, Ali Movaghar 0001 A New Analysis of RC4 - A Data Mining Approach (J48). Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Beatriz Gallego-Nicasio, Antonio Muñoz 0001, Antonio Maña, Daniel Serrano Security Patterns, Towards a Further Level. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Mirad Zadic, Andrea Nowak Visual Programming Language for Security Requirements in Business Processes as Model-driven Software Development. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
1Julien Bourgeois, Syed Raheel Hassan Managing Security of Grid Architecture with a Grid Security Operation Center. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
Displaying result #701 - #800 of 1079 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license