|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7090 occurrences of 2819 keywords
|
|
|
Results
Found 22916 publication records. Showing 22913 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
24 | Katja De Vries |
Avatars Out of Control: Gazira Babeli, Pose Balls and "Rape" in Second Life. |
Computers, Privacy and Data Protection |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Wolter Pieters |
Security and Privacy in the Clouds: A Bird's Eye View. |
Computers, Privacy and Data Protection |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Fadhila Mazanderani, Ian Brown |
Privacy as a Practice: Exploring the Relational and Spatial Dynamics of HIV-Related Information Seeking. |
Computers, Privacy and Data Protection |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Gerrit Hornung, Ralf Bendrath, Andreas Pfitzmann |
Surveillance in Germany: Strategies and Counterstrategies. |
Data Protection in a Profiled World |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Seda F. Gürses, Bettina Berendt |
PETs in the Surveillance Society: A Critical Review of the Potentials and Limitations of the Privacy as Confidentiality Paradigm. |
Data Protection in a Profiled World |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Gloria González Fuster, Serge Gutwirth, Paul de Hert |
From Unsolicited Communications to Unsolicited Adjustments. |
Data Protection in a Profiled World |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Wolter Pieters |
Verifiability of Electronic Voting: Between Confidence and Trust. |
Data Protection in a Profiled World |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Tal Z. Zarsky |
Responding to the Inevitable Outcomes of Profiling: Recent Lessons from Consumer Financial Markets, and Beyond. |
Data Protection in a Profiled World |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Gordon Nardell |
Levelling up: Data Privacy and the European Court of Human Rights. |
Data Protection in a Profiled World |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Serge Gutwirth, Mireille Hildebrandt |
Some Caveats on Profiling. |
Data Protection in a Profiled World |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Bart Jacobs 0001 |
Architecture Is Politics: Security and Privacy Issues in Transport and Beyond. |
Data Protection in a Profiled World |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Walter Peissl |
Information Privacy in Europe from a TA Perspective. |
Data Protection in a Profiled World |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Franck Dumortier |
Facebook and Risks of "De-contextualization" of Information. |
Data Protection in a Profiled World |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Sylvia Mercado Kierkegaard |
DNA Data Exchange: Germany Flexed Its Muscle. |
Data Protection in a Profiled World |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Johann Cas |
Privacy and Security: A Brief Synopsis of the Results of the European TA-Project PRISE. |
Data Protection in a Profiled World |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Melanie Volkamer |
Electronic Voting in Germany. |
Data Protection in a Profiled World |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Daniel Le Métayer |
Privacy by Design: A Matter of Choice. |
Data Protection in a Profiled World |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Rosa Barcelo, Peter Traung |
The Emerging European Union Security Breach Legal Framework: The 2002/58 ePrivacy Directive and Beyond. |
Data Protection in a Profiled World |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Rocco Bellanova |
The Case of the 2008 German-US Agreement on Data Exchange: An Opportunity to Reshape Power Relations? |
Data Protection in a Profiled World |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Krzysztof Trojanowski, Slawomir T. Wierzchon |
On Some Properties of the B-Cell Algorithm in Non-Stationary Environments. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Khalid Saeed 0001, Marcin Adamski |
Signature Verification by View-Based Feature Extractor and DTW Classifier. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Krzysztof Chmiel |
On Intermediate Evaluation of Block Ciphers. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Krzysztof Bucholc, Ewa Idzikowska |
Multiple Error Detection in Substitution Blocks for Block Ciphers. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Ewa Adamus, Andrzej Piegat |
Predicting Incomplete Data on the Basis of Non Symmetric Similarity Relation. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Anna Borowska |
The Grouping of Valuations in Probabilistic Algorithms. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Karina Murawko-Wisniewska, Andrzej Piegat |
Singleton Representation of Fuzzy Set for Computing Fuzzy Model Response for Fuzzy Inputs. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Toru Yamaguchi, Eri Sato |
Humatronics and RT-Middleware. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Tindara Addabbo, Gisella Facchinetti, Giovanni Mastroleo, Giovanni Solinas |
A Fuzzy Way to Measure Quality of Work in a Multidimensional Perspective. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Matthieu Voiry, Véronique Amarger, Kurosh Madani, François Houbre |
Design and Prototyping of an Industrial Fault Clustering System Combining Image Processing and Artificial Neural Network Based Approaches. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Georgy Kukharev, Edward Pólrolniczak |
Increasing Performance of Fingerprint Recognition Systems Using Reconstruction of Ridge Lines Methods. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Yoshiharu Yoshida, Toru Yamaguchi, Eri Sato, Toshihiro Shibano |
Networked Robots Personal Tastes Acquisition and Sharing. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Wlodzimierz Bielecki, Maciej Poliwoda |
Hyperplane Method Implementation for Loops Parallelization in the .NET Environment. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Piotr Kotlarz, Zbigniew Kotulski |
Neural Network as a Programmable Block Cipher. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Khalid Saeed 0001, Marek Tabedzki |
New Experiments on Word Recognition Without Segmentation. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Dariusz Czerski, Krzysztof Ciesielski, Michal Draminski, Mieczyslaw A. Klopotek, Slawomir T. Wierzchon |
Inverted Lists Compression Using Contextual Information. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Adam Szustalewicz |
Minimal Coverage of Investigated Object when Seeking for its Fractal Dimension. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Ryszard S. Choras |
JPEG 2000 Image Coding Standard - A Review and Applications. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Marcin Plucinski, Marcin Korzen |
Application of the Peano Curve for the Robot Trajectory Generating. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Eugeniusz Zieniuk, Agnieszka Boltuc, Andrzej Kuzelewski |
Algorithms of Identification of Multi-connected BoundaryGeometry and Material Parameters in Problems Described by Navier-Lame Equation Using the PIES. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Amine Chohra, Nadia Kanaoui, Kurosh Madani |
Hybrid Intelligent Diagnosis Approaches: Analysis and Comparison under a Biomedicine Application. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Yuji Kinoshita, Koichi Kashiwagi, Yoshinobu Higami, Shin-ya Kobayashi |
Development of Concealing the Purpose of Processing for Programs in a Distributed Computing Environment. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Akira Imada |
When a Family of Iris Flower is Normal, Then are Others Abnormal? |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Jerzy Pejas, Michal Zawalich |
Visual Cryptography Methods as a Source of Trustworthiness for the Signature Creation and Verification Systems. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Orest Popov, Tatiana Tretyakova, Anna Barcz, Piotr Piela |
Methodology of Developing Computer-Based Training Systems for Operators of Dynamic Objects. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Walenty Oniszczuk |
Analysis of an Open Linked Series Three-station Network with Blocking. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Wlodzimierz Bielecki, Dariusz Burak |
Parallelization Method of Encryption Algorithms. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | A. Yu. Dorogov |
Methods of Designing and System Analysis of Fast Neural Networks and Linear Tunable Transformations. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Michihiko Kudo, Koichi Kashiwagi, Yoshinobu Higami, Shin-ya Kobayashi |
Reliability of Node Information on Autonomous Load Distribution Method. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Dariusz Frejlichowski, Alji Maow |
Application of Improved Projection Method to Binary Images. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Stanislaw Bylka, Ryszarda Rempala |
On a Nonlinear Production-Inventory Problem. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Anna Witkowska, Roman Smierzchalski |
Tuning of Parameters Backstepping Ship Course Controller by Genetic Algorithm. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Izabela Rejer |
Reduction of Rules of a Fuzzy Model with a Chain Model. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Koichi Kashiwagi, Yoshinobu Higami, Shin-ya Kobayashi |
A Consideration of Processor Utilization on Multi-Processor System. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Anna Grocholewska-Czurylo |
Strong Boolean Functions with Compact ANF Representation. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Wojciech Mazurczyk, Zbigniew Kotulski |
Covert Channel for Improving VoIP Security. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Larisa Dobryakova, Orest Popov |
Embedding of Stego-Messages in Monochrome Images on the Base of Rank Filtering. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Michal Choras |
Image Pre-classification for Biometrics Identification Systems. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Adrian Skrobek, Pawel Sukiennik |
Cryptanalysis of Chaotic Product Cipher. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Anna Bartkowiak, Niki Evelpidou, Andreas Vassilopoulos |
Visualization of Five Erosion Risk Classes using Kernel Discriminants. |
Advances in Information Processing and Protection |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati, Marco Viviani 0001 |
Measuring Inference Exposure in Outsourced Encrypted Databases. |
Quality of Protection |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Andy Ozment |
Software Security Growth Modeling: Examining Vulnerabilities with Reliability Growth Models. |
Quality of Protection |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Iliano Cervesato |
Towards a Notion of Quantitative Security Analysis. |
Quality of Protection |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Judith E. Y. Rossebeø, Mass Soldal Lund, Knut Eilif Husa, Atle Refsdal |
A Conceptual Model for Service Availability. |
Quality of Protection |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Eric Alata, Marc Dacier, Yves Deswarte, M. Kaaâniche, K. Kortchinsky, Vincent Nicomette, Van-Hau Pham, Fabien Pouget |
Collection and analysis of attack data based on honeypots deployed on the Internet. |
Quality of Protection |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Günter Karjoth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner |
Service-oriented Assurance - Comprehensive Security by Explicit Assurances. |
Quality of Protection |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Valentina Casola, Antonino Mazzeo, Nicola Mazzocca, Massimiliano Rak |
A SLA evaluation methodology in Service Oriented Architectures. |
Quality of Protection |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Davide Balzarotti, Mattia Monga, Sabrina Sicari |
Assessing the risk of using vulnerable components. |
Quality of Protection |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Reine Lundin, Stefan Lindskog, Anna Brunström, Simone Fischer-Hübner |
Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages. |
Quality of Protection |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Miles A. McQueen, Wayne F. Boyer, Mark A. Flynn, George A. Beitel |
Time-to-Compromise Model for Cyber Risk Reduction Estimation. |
Quality of Protection |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Andrea S. Atzeni, Antonio Lioy |
Why to adopt a security metric? A brief survey. |
Quality of Protection |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Dogan Kesdogan, Lexi Pimenidis |
The Lower Bound of Attacks on Anonymity Systems - A Unicity Distance Approach. |
Quality of Protection |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Dogan Kesdogan, Lexi Pimenidis, Tobias Kölsch |
Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis. |
Quality of Protection |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Rüdiger Heimgärtner |
Identification of the User by Analyzing Human Computer Interaction. |
HCI (3) |
2009 |
DBLP DOI BibTeX RDF |
HCI analysis, interaction indicator, theft protection, computer protection, user interface, personalization, user interface design, tool, culture, recognition, identification, interaction analysis, user identification |
23 | Anirban Majumdar 0001, Clark D. Thomborson |
Manufacturing opaque predicates in distributed systems for code obfuscation. |
ACSC |
2006 |
DBLP BibTeX RDF |
distributed predicate detection, mobile code protection, opaque predicates, software protection, distributed systems security, code obfuscation |
23 | Lu Shen, Xi Yang 0001, Byrav Ramamurthy |
Shared risk link group (SRLG)-diverse path provisioning under hybrid service level agreements in wavelength-routed optical mesh networks. |
IEEE/ACM Trans. Netw. |
2005 |
DBLP DOI BibTeX RDF |
capacity minimization problem, dedicated-path protection, revenue maximization problem, shared-path protection, wavelength-routed optical network, tabu search, shared risk link group (SRLG) |
23 | Patrick Cousot, Radhia Cousot |
An abstract interpretation-based framework for software watermarking. |
POPL |
2004 |
DBLP DOI BibTeX RDF |
software authorship, stegoanalyst, stegoattacks, stegokey, stegomark, stegosignature, validation watermarking, authentication, static analysis, abstract interpretation, steganography, fingerprinting, identification, copyrights protection, trustworthiness, obfuscation, intellectual property protection, software watermarking, tamper-proofing |
23 | Dimitrios Simitopoulos, Nikolaos Zissis, Panagiotis Georgiadis 0002, Vasileios Emmanouilidis, Michael G. Strintzis |
Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD. |
Multim. Syst. |
2003 |
DBLP DOI BibTeX RDF |
DVD copy protection, Watermarking, Encryption, Copyright protection |
23 | Sabu Emmanuel, Mohan S. Kankanhalli |
A digital rights management scheme for broadcast video. |
Multim. Syst. |
2003 |
DBLP DOI BibTeX RDF |
Subscriber's rights protection, Digital watermarks, Copyright protection, Digital rights management, Video watermarking, Pay TV, Digital video broadcasting |
23 | Jens Palsberg, S. Krishnaswamy, Minseok Kwon, Di Ma, Qiuyun Shao, Y. Zhang |
Experience with Software Watermarking. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
program-transformation attacks, heap-space usage, watermark retrieval time, protection technique, tamperproofing, Java, Java, data structures, security of data, execution times, obfuscation, dynamic data structures, code size, software watermarking, copy protection |
23 | Petra Wohlmacher, Peter Pharow |
Applications in Health Care using Public-Key Certificates and Attribute Certificates. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures |
23 | Casey O'Donnell |
Production Protection to Copy(right) Protection: From the 10NES to DVDs. |
IEEE Ann. Hist. Comput. |
2009 |
DBLP DOI BibTeX RDF |
Nintendo, DMCA, 10NES, production protection, videogame development, history of computing, Copyright, CSS, DVD |
22 | Tan Phan, Jun Han 0004, Garth Heward, Steven Versteeg |
Protecting data in multi-stakeholder web service system. |
WWW |
2010 |
DBLP DOI BibTeX RDF |
data security, propagation, protection mechanism |
22 | Marco Scaioni, Mario Alba, Renato Rota, Simona Caragliano |
A GIS-Based SW Prototype for Emergency Preparedness Management Applied to a Real Case Study. |
ICCSA (1) |
2009 |
DBLP DOI BibTeX RDF |
Hazard Management, Civil Protection, GIS, Emergency Management |
22 | Srinivasan Ramasubramanian, Amit Chandak |
Dual-link failure resiliency through backup link mutual exclusion. |
IEEE/ACM Trans. Netw. |
2008 |
DBLP DOI BibTeX RDF |
backup link mutual exclusion, dual-link failures, optical networks, link protection |
22 | Jens Grossklags, Nicolas Christin, John Chuang |
Secure or insure?: a game-theoretic analysis of information security games. |
WWW |
2008 |
DBLP DOI BibTeX RDF |
economics of the internet, incentive-centered design and engineering, self-insurance, security, game theory, protection, public goods |
22 | Shujuan Wang, Qingtang Liu |
ERDRM: A Digital Rights Management System Model for Educational Resources. |
ICWL |
2008 |
DBLP DOI BibTeX RDF |
distance education, DRM, intellectual property protection, educational resources |
22 | Alexander Roßnagel |
Personalisierung in der E-Welt Aus dem Blickwinkel der informationellen Selbstbestimmung gesehen. |
Wirtschaftsinf. |
2007 |
DBLP DOI BibTeX RDF |
Restricted Data Processing, informational Separation of Powers, Identity Infrastructure, Control, Data Protection, Personal Data, Technology Design, Personality Profile |
22 | Maher Ali |
Generalized sharing in survivable optical networks. |
IEEE/ACM Trans. Netw. |
2006 |
DBLP DOI BibTeX RDF |
shared protection, optical networks |
22 | Mark Aiken, Manuel Fähndrich, Chris Hawblitzel, Galen C. Hunt, James R. Larus |
Deconstructing process isolation. |
Memory System Performance and Correctness |
2006 |
DBLP DOI BibTeX RDF |
hardware isolated process (HIP), hardware protection domain, software isolated process (SIP), singularity |
22 | Wenyin Zhang |
Content-Based Information Security Technique for Chinese Text. |
FSKD |
2006 |
DBLP DOI BibTeX RDF |
Chinese Text Watermarking, Information security, Copyright Protection |
22 | Paul Massell, Laura Zayatz, Jeremy Funk |
Protecting the Confidentiality of Survey Tabular Data by Adding Noise to the Underlying Microdata: Application to the Commodity Flow Survey. |
Privacy in Statistical Databases |
2006 |
DBLP DOI BibTeX RDF |
Disclosure Avoidance, Noise Protection, Microdata, Tabular Data |
22 | Changjie Wang, Ho-fung Leung |
A secure voter-resolved approval voting protocol over internet. |
ICEC |
2005 |
DBLP DOI BibTeX RDF |
approval voting, universal verification, voter-resolved, security, privacy protection, electronic voting, ElGamal encryption |
22 | Jordi Cucurull-Juan, Joan Ametller, Jose A. Ortega-Ruiz, Sergi Robles, Joan Borrell |
Protecting Mobile Agent Loops. |
MATA |
2005 |
DBLP DOI BibTeX RDF |
Itinerary Protection, Security, Mobile Agents, Loops |
22 | Antonio Mana, Javier López 0001, Juan J. Ortega, Ernesto Pimentel 0001, José M. Troya |
A framework for secure execution of software. |
Int. J. Inf. Sec. |
2004 |
DBLP DOI BibTeX RDF |
Smart cards, Information security, Software protection |
22 | Changjie Wang, Ho-fung Leung |
A Secure and Fully Private Borda Voting Protocol with Universal Verifiability. |
COMPSAC |
2004 |
DBLP DOI BibTeX RDF |
Borda voting protocol, universal verification, Security, Privacy protection, Electronic voting, ElGamal encryption |
22 | Changjie Wang, Ho-fung Leung |
A secure and private clarke tax voting protocol without trusted authorities. |
ICEC |
2004 |
DBLP DOI BibTeX RDF |
Clarke tax voting protocol, universal verification, security, privacy protection, electronic voting, mix network, ElGamal encryption |
22 | Hoon-Jae Lee 0001, ManKi Ahn, Seongan Lim, Sang-Jae Moon |
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
Protection Profiles, Vulnerability Assessment Activities, SPA/DPA, Smart Card, Side Channel Attacks, Common Criteria |
22 | Josep Domingo-Ferrer |
Advances in Inference Control in Statistical Databases: An Overview. |
Inference Control in Statistical Databases |
2002 |
DBLP DOI BibTeX RDF |
Inference control in statistical database, Statistical disclosure limitation, Respondents' privacy, Official statistics, Data security, Statistical disclosure control, Statistical database protection |
22 | Torsten Grzebiela |
Insurability of Electronic Commerce Risks. |
HICSS |
2002 |
DBLP DOI BibTeX RDF |
Internet risks, multilateral security, protection goals, risk management |
22 | Jan Magott, Pawel Skrobanek |
A Method of Analysis of Fault Trees with Time Dependencies. |
SAFECOMP |
2000 |
DBLP DOI BibTeX RDF |
Safety-Critical System, Protection, Time Petri Net, Fault Tree, Time Dependency |
|
|