The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for authenticity with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1977-1996 (16) 1997-1998 (18) 1999-2000 (27) 2001 (22) 2002 (32) 2003 (38) 2004 (46) 2005 (67) 2006 (92) 2007 (99) 2008 (97) 2009 (70) 2010 (23) 2011 (17) 2012 (19) 2013 (20) 2014 (16) 2015 (16) 2016 (26) 2017 (35) 2018 (32) 2019 (40) 2020 (24) 2021 (46) 2022 (51) 2023 (52) 2024 (18)
Publication types (Num. hits)
article(300) incollection(4) inproceedings(745) phdthesis(10)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 798 occurrences of 452 keywords

Results
Found 1059 publication records. Showing 1059 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
9R. Aparna, B. B. Amberker Authenticated Secure Group Communication using Broadcast Encryption Key Computation. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Threshold, Broadcast encryption, Secure Group Communication, Secret key
9Amitanand S. Aiyer, Lorenzo Alvisi, Rida A. Bazzi, Allen Clement Matrix Signatures: From MACs to Digital Signatures in Distributed Systems. Search on Bibsonomy DISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Chen Li, Ye Zhang, Lijuan Duan Establishing a Trusted Architecture on Pervasive Terminals for Securing Context Processing. Search on Bibsonomy PerCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Seppo Heikkinen Security and Accounting Enhancements for Roaming in IMS. Search on Bibsonomy WWIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptographic identity, security, IMS, roaming, HIP
9Wei Wang 0015, Dongming Peng, Honggang Wang 0001, Hamid Sharif, Hsiao-Hwa Chen Energy-Distortion-Authentication Optimized Resource Allocation for Secure Wireless Image Streaming. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Ronald Marx, Tobias Wahl, Kpatcha M. Bayarou Security Concept for Distributed Service Execution Environments. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Tom Moher, Brian Uphoff, Darshan Bhatt, Brenda López Silva, Peter Malcolm WallCology: designing interaction affordances for learner engagement in authentic science inquiry. Search on Bibsonomy CHI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF embedded phenomena, science inquiry learning, ubiquitous computing
9Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs Secrets and lies in computer-mediated interaction: theory, methods and design. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, privacy, design, deception, secrecy
9Tobias Heer, Stefan Götz 0001, Oscar García Morchon, Klaus Wehrle ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication. Search on Bibsonomy CoNEXT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF integrity protection, authentication, hash chains
9Mafruz Zaman Ashrafi, See-Kiong Ng Enabling Privacy-Preserving e-Payment Processing. Search on Bibsonomy DASFAA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Arvind Seshadri, Mark Luk, Adrian Perrig SAKE: Software Attestation for Key Establishment in Sensor Networks. Search on Bibsonomy DCOSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF software attestation, sensor networks, Key establishment
9Sven Laur, Sylvain Pasini SAS-Based Group Authentication and Key Agreement Protocols. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Groups, key agreement, message authentication, multi-party
9Nitin Khanna, Aravind K. Mikkilineni, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp Survey of Scanner and Printer Forensics at Purdue University. Search on Bibsonomy IWCF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Christian Schulze 0001, Marco Schreyer, Armin Stahl, Thomas M. Breuel Evaluation of Graylevel-Features for Printing Technique Classification in High-Throughput Document Management Systems. Search on Bibsonomy IWCF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF feature evaluation, printing technique classification, counterfight detection, questioned document, document forensic, document management
9Vincent Lenders, Emmanouil Koukoumidis, Pei Zhang 0001, Margaret Martonosi Location-based trust for mobile user-generated content: applications, challenges and implementations. Search on Bibsonomy HotMobile The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Wensheng Zhang 0001, Nalin Subramanian, Guiling Wang 0001 Lightweight and Compromise-Resilient Message Authentication in Sensor Networks. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Lifeng Sang, Anish Arora Spatial Signatures for Lightweight Security in Wireless Sensor Networks. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Yousra Alkabani, Farinaz Koushanfar Active control and digital rights management of integrated circuit IP cores. Search on Bibsonomy CASES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF active IP control, security, IP protection
9Md. Shariful Islam, Md. Abdul Hamid, Byung Goo Choi, Choong Seon Hong Securing Layer-2 Path Selection in Wireless Mesh Networks. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Merkle Tree-based Authentication, Layer-2 Routing, Security, Wireless Mesh Networks
9Dries Schellekens, Pim Tuyls, Bart Preneel Embedded Trusted Computing with Authenticated Non-volatile Memory. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Varad Kirtane, C. Pandu Rangan RSA-TBOS signcryption with proxy re-encryption. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2008 DBLP  DOI  BibTeX  RDF signcryption, proxy re-encryption
9Min-Jen Tsai, Chen-Sheng Wang Adaptive feature selection for digital camera source identification. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Xiaofeng Wang, Liang Cao, Shangping Wang, Yaling Zhang ID-Based Convertible Limited (Multi-)Verifier Signature Scheme. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9XiaoBing Kang, ShengMin Wei Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Ping Li 0019, Wanlei Zhou 0001, Ke Li An Operational Approach to Validate the Path of BGP. Search on Bibsonomy ICA3PP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, Internet, BGP, AS
9Lu Xiao 0002, John M. Carroll 0001, Pat Clemson, Mary Beth Rosson Support of Case-Based Authentic Learning Activities: A Collaborative Case Commenting Tool and a Collaborative Case Builder. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Salvatore Parise, Patricia J. Guinan Marketing Using Web 2.0. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Md. Shariful Islam, Young Yig Yoon, Md. Abdul Hamid, Choong Seon Hong A Secure Hybrid Wireless Mesh Protocol for 802.11s Mesh Network. Search on Bibsonomy ICCSA (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure Hybrid Wireless Mesh Protocol (SHWMP), Authentication, Wireless Mesh Network, Merkle Tree
9Nicolai Kuntze, Julian Schütte Securing Decentralized Workflows in Ambient Environments. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu Authenticated Directed Diffusion. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, Authentication, Directed Diffusion
9Tetsu Iwata Authenticated Encryption Mode for Beyond the Birthday Bound Security. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF birthday bound, modes of operation, authenticated encryption, security proofs, Blockcipher
9Mohammad Ashiqur Rahaman, Yves Roudier, Andreas Schaad Distributed Access Control For XML Document Centric Collaborations. Search on Bibsonomy EDOC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Volker Roth 0002, Wolfgang Polak, Eleanor Gilbert Rieffel, Thea Turner Simple and effective defense against evil twin access points. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF evil twin, usable security, wireless security, device pairing
9Dennis K. Nilsson, Tanya G. Roosta, Ulf Lindqvist, Alfonso Valdes Key management and secure software updates in wireless process control environments. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF key management, wireless sensor nodes, process control systems, software updates, rekeying
9Elisa Bertino, Elena Ferrari, Federica Paci, Loredana Parasiliti Provenza A system for securing push-based distribution of XML documents. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Push-based data dissemination, XML, Authentication, Security policies
9Lin-Yi Wu, Yi-Bing Lin Authentication Vector Management for UMTS. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Marcos Faúndez-Zanuy, David A. Elizondo, Miguel Angel Ferrer-Ballester, Carlos Manuel Travieso-González Authentication of Individuals using Hand Geometry Biometrics: A Neural Network Approach. Search on Bibsonomy Neural Process. Lett. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Biometrical features, Authentication of individual, Neural network, Feature extraction, Biometrics, Feature identification, Hand geometry
9Lucas Ballard, Daniel P. Lopresti, Fabian Monrose Forgery Quality and Its Implications for Behavioral Biometric Security. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part B The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Shuiming Ye, Qibin Sun, Ee-Chien Chang Statistics- and Spatiality-Based Feature Distance Measure for Error Resilient Image Authentication. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Feature Distance Measure, Digital Signature, Digital Watermarking, Error Concealment, Image Authentication, Image Transmission
9Huijuan Yang, Alex ChiChung Kot Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Radha Poovendran, Loukas Lazos A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Search on Bibsonomy Wirel. Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Wireless ad hoc networks, Wormhole attack, Geometric random graphs
9Weihong Wang, Hany Farid Exposing Digital Forgeries in Interlaced and Deinterlaced Video. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Dimitris Geneiatakis, Costas Lambrinoudakis A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Signaling attacks, Security, Session Initiation Protocol (SIP), Voice over IP (VoIP)
9Naveen Agarwal, Scott G. Renfro, Arturo Bejar Phishing Forbidden. Search on Bibsonomy ACM Queue The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Yagiz Sutcu, Baris Coskun, Husrev T. Sencar, Nasir D. Memon Tamper Detection Based on Regularity of Wavelet Transform Coefficients. Search on Bibsonomy ICIP (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Hongmei Liu 0001, Wei Rui, Jiwu Huang Binary Image Authentication using Zernike Moments. Search on Bibsonomy ICIP (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Hongmei Gou, Ashwin Swaminathan, Min Wu 0001 Noise Features for Image Tampering Detection and Steganalysis. Search on Bibsonomy ICIP (6) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Sujoy Roy, Qibin Sun Robust Hash for Detecting and Localizing Image Tampering. Search on Bibsonomy ICIP (6) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Rene Mayrhofer, Hans Gellersen, Mike Hazas Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction. Search on Bibsonomy UbiComp The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Nikolaos Chatzis Motivation for Behaviour-Based DNS Security: A Taxonomy of DNS-Related Internet Threats. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Reihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt Unconditionally secure ring authentication. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ring signature, unconditional security, authentication codes
9Dimitrios Lekkas, Dimitris Gritzalis E-Passports as a Means Towards the First World-Wide Public Key Infrastructure. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Machine Readable Travel Documents, Security, Trust, RFID, Digital Signatures, Smart card, PKI, Passport
9Son Thanh Nguyen, Chunming Rong Electronic Payment Scheme Using Identity-Based Cryptography. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF electronic wallet, Identity-based cryptography
9Nicolai Kuntze, Andreas U. Schmidt, Christian Hett Non-Repudiation in Internet Telephony. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Ignasi Iriondo Sanz, Santiago Planet, Francesc Alías, Joan Claudi Socoró, Elisa Martínez Marroquín Validation of an Expressive Speech Corpus by Mapping Automatic Classification to Subjective Evaluation. Search on Bibsonomy IWANN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Dino Schweitzer, Leemon C. Baird III, William L. Bahn Visually Understanding Jam Resistant Communication. Search on Bibsonomy VizSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Michael Backes 0001, Agostino Cortesi, Matteo Maffei Causality-based Abstraction of Multiplicity in Security Protocols. Search on Bibsonomy CSF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Sajid Hussain, Firdous Kausar, Ashraf Masood An efficient key distribution scheme for heterogeneous sensor networks. Search on Bibsonomy IWCMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, key distribution, heterogeneous sensor networks, random key pre-distribution
9Franz Kollmann Realizing fine-granular Read andWrite Rights on Tree Structured Documents. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Daisuke Kikuchi, Naoki Kobayashi 0001 Type-Based Verification of Correspondence Assertions for Communication Protocols. Search on Bibsonomy APLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Erman Ayday, Farshid Delgosha, Faramarz Fekri Efficient Broadcast Authentication for Wireless Sensor Networks. Search on Bibsonomy SECON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Kenneth Revett A Bioinformatics Based Approach to Behavioural Biometrics. Search on Bibsonomy FBIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF position specific scoring matrix, Biometrics, keystroke dynamics
9Ahmed Réda Kaced, Jean-Claude Moissinac Secure Intermediary Caching in Mobile Wireless Networks Using Asymmetric Cipher Sequences Based Encryption. Search on Bibsonomy MSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Thomas Gloe, Matthias Kirchner, Antje Winkler, Rainer Böhme Can we trust digital image forensics? Search on Bibsonomy ACM Multimedia The full citation details ... 2007 DBLP  DOI  BibTeX  RDF image source identification, tamper hiding, tamper detection, digital image forensics
9Raylin Tso, Takeshi Okamoto, Eiji Okamoto An Improved Signcryption Scheme and Its Variation. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Stefano Chessa, Gaetano Giunta, Gabriele Oligeri Embedding Source Signature in Multicast Wireless Video Streams. Search on Bibsonomy WOWMOM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Saar Drimer Authentication of FPGA Bitstreams: Why and How. Search on Bibsonomy ARC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Kriangsiri Malasri, Lan Wang Addressing security in medical sensor networks. Search on Bibsonomy HealthNet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Tmote sky, elliptic curve cryptography, medical sensor networks
9Weiwei Cheng, Kian-Lee Tan Authenticating kNN Query Results in Data Publishing. Search on Bibsonomy Secure Data Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Georgios Amanatidis, Alexandra Boldyreva, Adam O'Neill Provably-Secure Schemes for Basic Query Support in Outsourced Databases. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Yanfang Du, Jing Zhang 0038, Yuting Su 0001 Watermarking for Authentication of LZ-77 Compressed Documents. Search on Bibsonomy IWDW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF LZ77 algorithm, document authentication, fragile watermark
9Hong Liu 0008, Ye Lu, Qi Wu, Hongbin Zha Automatic seal image retrieval method by using shape features of Chinese characters. Search on Bibsonomy SMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Jianming Fu, Binglan Chen, Huanguo Zhang A Worm Containment Model Based on Neighbor-Alarm. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Yong Yu 0002, Bo Yang 0003, Xinyi Huang 0001, Mingwu Zhang Efficient Identity-Based Signcryption Scheme for Multiple Receivers. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan Castor: Secure Code Updates Using Symmetric Cryptosystems. Search on Bibsonomy RTSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Martijn Oostdijk, Vlad Rusu, Jan Tretmans, René G. de Vries, Tim A. C. Willemse Integrating Verification, Testing, and Learning for Cryptographic Protocols. Search on Bibsonomy IFM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Nitin Khanna, Aravind K. Mikkilineni, Pei-Ju Chiang, Maria V. Ortiz, Sungjoo Suh, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp Sensor Forensics: Printers, Cameras and Scanners, They Never Lie. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Wei Li Research on the Knowledge-based Decision Support System for the Safety of Rockets. Search on Bibsonomy SNPD (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Kwangkyu Park, JongHyup Lee, Taekyoung Kwon 0002, JooSeok Song Secure Dynamic Network Reprogramming Using Supplementary Hash in Wireless Sensor Networks. Search on Bibsonomy UIC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Zhengjian Zhu, Qingping Tan, Peidong Zhu An Effective Secure Routing for False Data Injection Attack in Wireless Sensor Network. Search on Bibsonomy APNOMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Qibin Sun, Zhi Li 0001, Yong Lian 0001, Chang Wen Chen Joint Source-Channel-Authentication Resource Allocation for Multimedia overWireless Networks. Search on Bibsonomy ISCAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Reto Kohlas, Jacek Jonczy, Rolf Haenni A New Model for Public-Key Authentication. Search on Bibsonomy KiVS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Lars Völker, Marcus Schöller Secure TLS: Preventing DoS Attacks with Lower Layer Authentication. Search on Bibsonomy KiVS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Jung-Hyun Oh, Hyun Seok Kim, Jin-Young Choi A Light-weight Security Protocol for RFID System. (PDF / PS) Search on Bibsonomy PWC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF GNY logic, RFID, Security protocol, One-time pad
9Chris J. Mitchell Cryptanalysis of the EPBC Authenticated Encryption Mode. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Lei Zhang 0009, Futai Zhang, Fangguo Zhang New Efficient Certificateless Signature Scheme. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF certificateless signature scheme, cryptography, bilinear map, random oracle model
9YingZhi Zeng, Baokang Zhao, Jinshu Su, Xia Yan, Zili Shao A Loop-Based Key Management Scheme for Wireless Sensor Networks. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Josef Scharinger A Systems Theoretic Approach to the Design of Scalable Cryptographic Hash Functions. Search on Bibsonomy EUROCAST The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Shrijit S. Joshi, Vir V. Phoha Competition between SOM Clusters to Model User Authentication System in Computer Networks. Search on Bibsonomy COMSWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Dong Wei 0015, Shoubao Yang, Xiaoqian Liu Artificial Immunology Based Anti-Pollution P2P File Sharing System. Search on Bibsonomy GCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Lei Zhang 0009, Futai Zhang, Wei Wu 0001 A Provably Secure Ring Signature Scheme in Certificateless Cryptography. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Provable Security, Random Oracle model, Ring Signature, Certificateless Cryptography
9Christophe Tartary, Huaxiong Wang, Josef Pieprzyk An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Unsecured Channel, Erasure Code, Stream Authentication, Merkle Hash Tree, Polynomial Reconstruction
9Al-Sakib Khan Pathan, Choong Seon Hong A Secure Energy-Efficient Routing Protocol for WSN. Search on Bibsonomy ISPA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan Exploring Symmetric Cryptography for Secure Network Reprogramming. Search on Bibsonomy ICDCS Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Brent Lagesse, Mohan Kumar UBCA: Utility-Based Clustering Architecture for Peer-to-Peer Systems. Search on Bibsonomy ICDCS Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Vidya Bharrgavi Balasubramanyn, Geethapriya Thamilarasu, Ramalingam Sridhar Security Solution For Data Integrity InWireless BioSensor Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Véronique Cortier, Bogdan Warinschi, Eugen Zalinescu Synthesizing Secure Protocols. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Alexandra Boldyreva, Virendra Kumar Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Jan Jürjens Developing Secure Embedded Systems: Pitfalls and How to Avoid Them. Search on Bibsonomy ICSE Companion The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Yungchang Ku, Yuchi Chen, Chaochang Chiu A Proposed Data Mining Approach for Internet Auction Fraud Detection. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Internet auction fraud, fraud detection
Displaying result #701 - #800 of 1059 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license