Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
9 | R. Aparna, B. B. Amberker |
Authenticated Secure Group Communication using Broadcast Encryption Key Computation. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Threshold, Broadcast encryption, Secure Group Communication, Secret key |
9 | Amitanand S. Aiyer, Lorenzo Alvisi, Rida A. Bazzi, Allen Clement |
Matrix Signatures: From MACs to Digital Signatures in Distributed Systems. |
DISC |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Chen Li, Ye Zhang, Lijuan Duan |
Establishing a Trusted Architecture on Pervasive Terminals for Securing Context Processing. |
PerCom |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Seppo Heikkinen |
Security and Accounting Enhancements for Roaming in IMS. |
WWIC |
2008 |
DBLP DOI BibTeX RDF |
cryptographic identity, security, IMS, roaming, HIP |
9 | Wei Wang 0015, Dongming Peng, Honggang Wang 0001, Hamid Sharif, Hsiao-Hwa Chen |
Energy-Distortion-Authentication Optimized Resource Allocation for Secure Wireless Image Streaming. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Ronald Marx, Tobias Wahl, Kpatcha M. Bayarou |
Security Concept for Distributed Service Execution Environments. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Tom Moher, Brian Uphoff, Darshan Bhatt, Brenda López Silva, Peter Malcolm |
WallCology: designing interaction affordances for learner engagement in authentic science inquiry. |
CHI |
2008 |
DBLP DOI BibTeX RDF |
embedded phenomena, science inquiry learning, ubiquitous computing |
9 | Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs |
Secrets and lies in computer-mediated interaction: theory, methods and design. |
CHI Extended Abstracts |
2008 |
DBLP DOI BibTeX RDF |
security, privacy, design, deception, secrecy |
9 | Tobias Heer, Stefan Götz 0001, Oscar García Morchon, Klaus Wehrle |
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication. |
CoNEXT |
2008 |
DBLP DOI BibTeX RDF |
integrity protection, authentication, hash chains |
9 | Mafruz Zaman Ashrafi, See-Kiong Ng |
Enabling Privacy-Preserving e-Payment Processing. |
DASFAA |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Arvind Seshadri, Mark Luk, Adrian Perrig |
SAKE: Software Attestation for Key Establishment in Sensor Networks. |
DCOSS |
2008 |
DBLP DOI BibTeX RDF |
software attestation, sensor networks, Key establishment |
9 | Sven Laur, Sylvain Pasini |
SAS-Based Group Authentication and Key Agreement Protocols. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
Groups, key agreement, message authentication, multi-party |
9 | Nitin Khanna, Aravind K. Mikkilineni, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp |
Survey of Scanner and Printer Forensics at Purdue University. |
IWCF |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Christian Schulze 0001, Marco Schreyer, Armin Stahl, Thomas M. Breuel |
Evaluation of Graylevel-Features for Printing Technique Classification in High-Throughput Document Management Systems. |
IWCF |
2008 |
DBLP DOI BibTeX RDF |
feature evaluation, printing technique classification, counterfight detection, questioned document, document forensic, document management |
9 | Vincent Lenders, Emmanouil Koukoumidis, Pei Zhang 0001, Margaret Martonosi |
Location-based trust for mobile user-generated content: applications, challenges and implementations. |
HotMobile |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Wensheng Zhang 0001, Nalin Subramanian, Guiling Wang 0001 |
Lightweight and Compromise-Resilient Message Authentication in Sensor Networks. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Lifeng Sang, Anish Arora |
Spatial Signatures for Lightweight Security in Wireless Sensor Networks. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Yousra Alkabani, Farinaz Koushanfar |
Active control and digital rights management of integrated circuit IP cores. |
CASES |
2008 |
DBLP DOI BibTeX RDF |
active IP control, security, IP protection |
9 | Md. Shariful Islam, Md. Abdul Hamid, Byung Goo Choi, Choong Seon Hong |
Securing Layer-2 Path Selection in Wireless Mesh Networks. |
WISA |
2008 |
DBLP DOI BibTeX RDF |
Merkle Tree-based Authentication, Layer-2 Routing, Security, Wireless Mesh Networks |
9 | Dries Schellekens, Pim Tuyls, Bart Preneel |
Embedded Trusted Computing with Authenticated Non-volatile Memory. |
TRUST |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Varad Kirtane, C. Pandu Rangan |
RSA-TBOS signcryption with proxy re-encryption. |
Digital Rights Management Workshop |
2008 |
DBLP DOI BibTeX RDF |
signcryption, proxy re-encryption |
9 | Min-Jen Tsai, Chen-Sheng Wang |
Adaptive feature selection for digital camera source identification. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Xiaofeng Wang, Liang Cao, Shangping Wang, Yaling Zhang |
ID-Based Convertible Limited (Multi-)Verifier Signature Scheme. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
9 | XiaoBing Kang, ShengMin Wei |
Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Ping Li 0019, Wanlei Zhou 0001, Ke Li |
An Operational Approach to Validate the Path of BGP. |
ICA3PP |
2008 |
DBLP DOI BibTeX RDF |
security, Internet, BGP, AS |
9 | Lu Xiao 0002, John M. Carroll 0001, Pat Clemson, Mary Beth Rosson |
Support of Case-Based Authentic Learning Activities: A Collaborative Case Commenting Tool and a Collaborative Case Builder. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Salvatore Parise, Patricia J. Guinan |
Marketing Using Web 2.0. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Md. Shariful Islam, Young Yig Yoon, Md. Abdul Hamid, Choong Seon Hong |
A Secure Hybrid Wireless Mesh Protocol for 802.11s Mesh Network. |
ICCSA (1) |
2008 |
DBLP DOI BibTeX RDF |
Secure Hybrid Wireless Mesh Protocol (SHWMP), Authentication, Wireless Mesh Network, Merkle Tree |
9 | Nicolai Kuntze, Julian Schütte |
Securing Decentralized Workflows in Ambient Environments. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Authenticated Directed Diffusion. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks, Authentication, Directed Diffusion |
9 | Tetsu Iwata |
Authenticated Encryption Mode for Beyond the Birthday Bound Security. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
birthday bound, modes of operation, authenticated encryption, security proofs, Blockcipher |
9 | Mohammad Ashiqur Rahaman, Yves Roudier, Andreas Schaad |
Distributed Access Control For XML Document Centric Collaborations. |
EDOC |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Volker Roth 0002, Wolfgang Polak, Eleanor Gilbert Rieffel, Thea Turner |
Simple and effective defense against evil twin access points. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
evil twin, usable security, wireless security, device pairing |
9 | Dennis K. Nilsson, Tanya G. Roosta, Ulf Lindqvist, Alfonso Valdes |
Key management and secure software updates in wireless process control environments. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
key management, wireless sensor nodes, process control systems, software updates, rekeying |
9 | Elisa Bertino, Elena Ferrari, Federica Paci, Loredana Parasiliti Provenza |
A system for securing push-based distribution of XML documents. |
Int. J. Inf. Sec. |
2007 |
DBLP DOI BibTeX RDF |
Push-based data dissemination, XML, Authentication, Security policies |
9 | Lin-Yi Wu, Yi-Bing Lin |
Authentication Vector Management for UMTS. |
IEEE Trans. Wirel. Commun. |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Marcos Faúndez-Zanuy, David A. Elizondo, Miguel Angel Ferrer-Ballester, Carlos Manuel Travieso-González |
Authentication of Individuals using Hand Geometry Biometrics: A Neural Network Approach. |
Neural Process. Lett. |
2007 |
DBLP DOI BibTeX RDF |
Biometrical features, Authentication of individual, Neural network, Feature extraction, Biometrics, Feature identification, Hand geometry |
9 | Lucas Ballard, Daniel P. Lopresti, Fabian Monrose |
Forgery Quality and Its Implications for Behavioral Biometric Security. |
IEEE Trans. Syst. Man Cybern. Part B |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Shuiming Ye, Qibin Sun, Ee-Chien Chang |
Statistics- and Spatiality-Based Feature Distance Measure for Error Resilient Image Authentication. |
Trans. Data Hiding Multim. Secur. |
2007 |
DBLP DOI BibTeX RDF |
Feature Distance Measure, Digital Signature, Digital Watermarking, Error Concealment, Image Authentication, Image Transmission |
9 | Huijuan Yang, Alex ChiChung Kot |
Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving. |
IEEE Trans. Multim. |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Radha Poovendran, Loukas Lazos |
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. |
Wirel. Networks |
2007 |
DBLP DOI BibTeX RDF |
Security, Wireless ad hoc networks, Wormhole attack, Geometric random graphs |
9 | Weihong Wang, Hany Farid |
Exposing Digital Forgeries in Interlaced and Deinterlaced Video. |
IEEE Trans. Inf. Forensics Secur. |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Dimitris Geneiatakis, Costas Lambrinoudakis |
A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment. |
Telecommun. Syst. |
2007 |
DBLP DOI BibTeX RDF |
Signaling attacks, Security, Session Initiation Protocol (SIP), Voice over IP (VoIP) |
9 | Naveen Agarwal, Scott G. Renfro, Arturo Bejar |
Phishing Forbidden. |
ACM Queue |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Yagiz Sutcu, Baris Coskun, Husrev T. Sencar, Nasir D. Memon |
Tamper Detection Based on Regularity of Wavelet Transform Coefficients. |
ICIP (1) |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Hongmei Liu 0001, Wei Rui, Jiwu Huang |
Binary Image Authentication using Zernike Moments. |
ICIP (1) |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Hongmei Gou, Ashwin Swaminathan, Min Wu 0001 |
Noise Features for Image Tampering Detection and Steganalysis. |
ICIP (6) |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Sujoy Roy, Qibin Sun |
Robust Hash for Detecting and Localizing Image Tampering. |
ICIP (6) |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Rene Mayrhofer, Hans Gellersen, Mike Hazas |
Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction. |
UbiComp |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Nikolaos Chatzis |
Motivation for Behaviour-Based DNS Security: A Taxonomy of DNS-Related Internet Threats. |
SECURWARE |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Reihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt |
Unconditionally secure ring authentication. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
ring signature, unconditional security, authentication codes |
9 | Dimitrios Lekkas, Dimitris Gritzalis |
E-Passports as a Means Towards the First World-Wide Public Key Infrastructure. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
Machine Readable Travel Documents, Security, Trust, RFID, Digital Signatures, Smart card, PKI, Passport |
9 | Son Thanh Nguyen, Chunming Rong |
Electronic Payment Scheme Using Identity-Based Cryptography. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
electronic wallet, Identity-based cryptography |
9 | Nicolai Kuntze, Andreas U. Schmidt, Christian Hett |
Non-Repudiation in Internet Telephony. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Ignasi Iriondo Sanz, Santiago Planet, Francesc Alías, Joan Claudi Socoró, Elisa Martínez Marroquín |
Validation of an Expressive Speech Corpus by Mapping Automatic Classification to Subjective Evaluation. |
IWANN |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Dino Schweitzer, Leemon C. Baird III, William L. Bahn |
Visually Understanding Jam Resistant Communication. |
VizSEC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Michael Backes 0001, Agostino Cortesi, Matteo Maffei |
Causality-based Abstraction of Multiplicity in Security Protocols. |
CSF |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Sajid Hussain, Firdous Kausar, Ashraf Masood |
An efficient key distribution scheme for heterogeneous sensor networks. |
IWCMC |
2007 |
DBLP DOI BibTeX RDF |
security, key distribution, heterogeneous sensor networks, random key pre-distribution |
9 | Franz Kollmann |
Realizing fine-granular Read andWrite Rights on Tree Structured Documents. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Daisuke Kikuchi, Naoki Kobayashi 0001 |
Type-Based Verification of Correspondence Assertions for Communication Protocols. |
APLAS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Erman Ayday, Farshid Delgosha, Faramarz Fekri |
Efficient Broadcast Authentication for Wireless Sensor Networks. |
SECON |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Kenneth Revett |
A Bioinformatics Based Approach to Behavioural Biometrics. |
FBIT |
2007 |
DBLP DOI BibTeX RDF |
position specific scoring matrix, Biometrics, keystroke dynamics |
9 | Ahmed Réda Kaced, Jean-Claude Moissinac |
Secure Intermediary Caching in Mobile Wireless Networks Using Asymmetric Cipher Sequences Based Encryption. |
MSN |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Thomas Gloe, Matthias Kirchner, Antje Winkler, Rainer Böhme |
Can we trust digital image forensics? |
ACM Multimedia |
2007 |
DBLP DOI BibTeX RDF |
image source identification, tamper hiding, tamper detection, digital image forensics |
9 | Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
An Improved Signcryption Scheme and Its Variation. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Stefano Chessa, Gaetano Giunta, Gabriele Oligeri |
Embedding Source Signature in Multicast Wireless Video Streams. |
WOWMOM |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Saar Drimer |
Authentication of FPGA Bitstreams: Why and How. |
ARC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Kriangsiri Malasri, Lan Wang |
Addressing security in medical sensor networks. |
HealthNet |
2007 |
DBLP DOI BibTeX RDF |
Tmote sky, elliptic curve cryptography, medical sensor networks |
9 | Weiwei Cheng, Kian-Lee Tan |
Authenticating kNN Query Results in Data Publishing. |
Secure Data Management |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Georgios Amanatidis, Alexandra Boldyreva, Adam O'Neill |
Provably-Secure Schemes for Basic Query Support in Outsourced Databases. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Yanfang Du, Jing Zhang 0038, Yuting Su 0001 |
Watermarking for Authentication of LZ-77 Compressed Documents. |
IWDW |
2007 |
DBLP DOI BibTeX RDF |
LZ77 algorithm, document authentication, fragile watermark |
9 | Hong Liu 0008, Ye Lu, Qi Wu, Hongbin Zha |
Automatic seal image retrieval method by using shape features of Chinese characters. |
SMC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Jianming Fu, Binglan Chen, Huanguo Zhang |
A Worm Containment Model Based on Neighbor-Alarm. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Yong Yu 0002, Bo Yang 0003, Xinyi Huang 0001, Mingwu Zhang |
Efficient Identity-Based Signcryption Scheme for Multiple Receivers. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan |
Castor: Secure Code Updates Using Symmetric Cryptosystems. |
RTSS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Martijn Oostdijk, Vlad Rusu, Jan Tretmans, René G. de Vries, Tim A. C. Willemse |
Integrating Verification, Testing, and Learning for Cryptographic Protocols. |
IFM |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Nitin Khanna, Aravind K. Mikkilineni, Pei-Ju Chiang, Maria V. Ortiz, Sungjoo Suh, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp |
Sensor Forensics: Printers, Cameras and Scanners, They Never Lie. |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Wei Li |
Research on the Knowledge-based Decision Support System for the Safety of Rockets. |
SNPD (2) |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Kwangkyu Park, JongHyup Lee, Taekyoung Kwon 0002, JooSeok Song |
Secure Dynamic Network Reprogramming Using Supplementary Hash in Wireless Sensor Networks. |
UIC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Zhengjian Zhu, Qingping Tan, Peidong Zhu |
An Effective Secure Routing for False Data Injection Attack in Wireless Sensor Network. |
APNOMS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Qibin Sun, Zhi Li 0001, Yong Lian 0001, Chang Wen Chen |
Joint Source-Channel-Authentication Resource Allocation for Multimedia overWireless Networks. |
ISCAS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Reto Kohlas, Jacek Jonczy, Rolf Haenni |
A New Model for Public-Key Authentication. |
KiVS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Lars Völker, Marcus Schöller |
Secure TLS: Preventing DoS Attacks with Lower Layer Authentication. |
KiVS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Jung-Hyun Oh, Hyun Seok Kim, Jin-Young Choi |
A Light-weight Security Protocol for RFID System. (PDF / PS) |
PWC |
2007 |
DBLP DOI BibTeX RDF |
GNY logic, RFID, Security protocol, One-time pad |
9 | Chris J. Mitchell |
Cryptanalysis of the EPBC Authenticated Encryption Mode. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Lei Zhang 0009, Futai Zhang, Fangguo Zhang |
New Efficient Certificateless Signature Scheme. |
EUC Workshops |
2007 |
DBLP DOI BibTeX RDF |
certificateless signature scheme, cryptography, bilinear map, random oracle model |
9 | YingZhi Zeng, Baokang Zhao, Jinshu Su, Xia Yan, Zili Shao |
A Loop-Based Key Management Scheme for Wireless Sensor Networks. |
EUC Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Josef Scharinger |
A Systems Theoretic Approach to the Design of Scalable Cryptographic Hash Functions. |
EUROCAST |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Shrijit S. Joshi, Vir V. Phoha |
Competition between SOM Clusters to Model User Authentication System in Computer Networks. |
COMSWARE |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Dong Wei 0015, Shoubao Yang, Xiaoqian Liu |
Artificial Immunology Based Anti-Pollution P2P File Sharing System. |
GCC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Lei Zhang 0009, Futai Zhang, Wei Wu 0001 |
A Provably Secure Ring Signature Scheme in Certificateless Cryptography. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
Provable Security, Random Oracle model, Ring Signature, Certificateless Cryptography |
9 | Christophe Tartary, Huaxiong Wang, Josef Pieprzyk |
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
Unsecured Channel, Erasure Code, Stream Authentication, Merkle Hash Tree, Polynomial Reconstruction |
9 | Al-Sakib Khan Pathan, Choong Seon Hong |
A Secure Energy-Efficient Routing Protocol for WSN. |
ISPA |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan |
Exploring Symmetric Cryptography for Secure Network Reprogramming. |
ICDCS Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Brent Lagesse, Mohan Kumar |
UBCA: Utility-Based Clustering Architecture for Peer-to-Peer Systems. |
ICDCS Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Vidya Bharrgavi Balasubramanyn, Geethapriya Thamilarasu, Ramalingam Sridhar |
Security Solution For Data Integrity InWireless BioSensor Networks. |
ICDCS Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Véronique Cortier, Bogdan Warinschi, Eugen Zalinescu |
Synthesizing Secure Protocols. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Alexandra Boldyreva, Virendra Kumar |
Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Jan Jürjens |
Developing Secure Embedded Systems: Pitfalls and How to Avoid Them. |
ICSE Companion |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Yungchang Ku, Yuchi Chen, Chaochang Chiu |
A Proposed Data Mining Approach for Internet Auction Fraud Detection. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
Internet auction fraud, fraud detection |