The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for protocols with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1970-1975 (15) 1976-1977 (21) 1978-1979 (32) 1980 (28) 1981 (41) 1982 (55) 1983 (113) 1984 (78) 1985 (77) 1986 (142) 1987 (119) 1988 (159) 1989 (229) 1990 (240) 1991 (253) 1992 (299) 1993 (290) 1994 (339) 1995 (391) 1996 (424) 1997 (481) 1998 (573) 1999 (681) 2000 (894) 2001 (993) 2002 (1237) 2003 (1480) 2004 (1961) 2005 (2445) 2006 (2467) 2007 (2537) 2008 (2634) 2009 (1789) 2010 (993) 2011 (944) 2012 (818) 2013 (829) 2014 (790) 2015 (772) 2016 (838) 2017 (794) 2018 (815) 2019 (815) 2020 (825) 2021 (718) 2022 (715) 2023 (674) 2024 (122)
Publication types (Num. hits)
article(9381) book(76) incollection(291) inproceedings(24380) phdthesis(728) proceedings(123)
Venues (Conferences, Journals, ...)
ICNP(1563) CoRR(1027) SIGCOMM(980) Security Protocols Workshop(811) NETWORKING(572) IACR Cryptol. ePrint Arch.(500) FORTE(341) LCN(283) ICC(249) CRYPTO(202) IEEE Trans. Parallel Distribut...(198) ISCC(193) INFOCOM(189) IEEE/ACM Trans. Netw.(184) ICDCS(182) IPDPS(177) More (+10 of total 3896)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 25318 occurrences of 6008 keywords

Results
Found 34979 publication records. Showing 34979 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
21Tudor Dumitras Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Jeff Yan How Does Match-Fixing Inform Computer Game Security? (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Jean Everson Martina Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Ross Anderson 0001 Making Bitcoin Legal (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Virgil D. Gligor Requirements for Root of Trust Establishment (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Frank Stajano, T. Mark A. Lomas User Authentication for the Internet of Things. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Peter Y. A. Ryan HoneyPAKEs (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Daniel J. Weitzner On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21José Becerra, Peter B. Rønne, Peter Y. A. Ryan, Petra Sala HoneyPAKEs. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Graham Rymer Raven Authentication Service Attacks and Countermeasures (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Wanpeng Li, Chris J. Mitchell, Thomas M. Chen Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Tudor Dumitras, Yigitcan Kaya, Radu Marginean, Octavian Suciu Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Wanpeng Li Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Martin Kleppmann From Secure Messaging to Secure Collaboration (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Martin Kleppmann, Stephan A. Kollmann, Diana A. Vasile, Alastair R. Beresford From Secure Messaging to Secure Collaboration. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Jeff Yan How Does Match-Fixing Inform Computer Game Security? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Frank Stajano, Jonathan Anderson, Bruce Christianson, Vashek Matyás (eds.) Security Protocols XXV - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Jonathan Anderson, Vashek Matyás, Bruce Christianson, Frank Stajano (eds.) Security Protocols XXIV - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Marcus Völp, Francisco Rocha, Jeremie Decouchant, Jiangshan Yu, Paulo Jorge Esteves Veríssimo Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Thanh Bui, Tuomas Aura Key Exchange with the Help of a Public Ledger. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Mark Dermot Ryan Making Decryption Accountable. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Peter Y. A. Ryan Auditable PAKEs: Approaching Fair Exchange Without a TTP (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Paul Wernick, Bruce Christianson, Joseph Spring Simulating Perceptions of Security. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Hugo Jonker A Security Perspective on Publication Metrics (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Fabio Massacci, Chan Nam Ngo, Jing Nie, Daniele Venturi 0001, Julian Williams The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21A. W. Roscoe 0001, Peter Y. A. Ryan Auditable PAKEs: Approaching Fair Exchange Without a TTP. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Hugo Jonker, Sjouke Mauw A Security Perspective on Publication Metrics. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Marios O. Choudary Security from Disjoint Paths: Is It Possible? (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Chan Nam Ngo The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Thanh Bui Key Exchange with the Help of a Public Ledger (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Paul Wernick Simulating Perceptions of Security (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Partha Das Chowdhury Self Attestation of Things (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Jonathan Weekes Controlling Your Neighbour's Bandwidth for Fun and for Profit (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Simon N. Foley Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Mark Dermot Ryan Making Decryption Accountable (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Ross Anderson 0001 Reconciling Multiple Objectives - Politics or Markets? (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Simon N. Foley Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Dylan Clarke, Syed Taha Ali End to End Security is Not Enough. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Milan Broz Extending Full Disk Encryption for the Future. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Ross J. Anderson, Khaled Baqer Reconciling Multiple Objectives - Politics or Markets? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Milan Broz Extending Full Disk Encryption for the Future (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Partha Das Chowdhury, Bruce Christianson Self Attestation of Things. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Marcus Völp Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Sergiu Costea, Marios O. Choudary, Costin Raiciu Security from Disjoint Paths: Is It Possible? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Jonathan Weekes, Shishir Nagaraja Controlling Your Neighbour's Bandwidth for Fun and for Profit. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Dylan Clarke End to End Security is Not Enough (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Radim Ostádal, Petr Svenda, Vashek Matyás Reconsidering Attacker Models in Ad-Hoc Networks. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Jeff Yan Novel Security and Privacy Perspectives of Camera Fingerprints (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Brian J. Kidney Exploiting Autocorrect to Attack Privacy (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Andreas Happe Malicious Clients in Distributed Secret Sharing Based Storage Networks (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Petr Svenda Reconsidering Attacker Models in Ad-Hoc Networks (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Olgierd Pieczul, Simon N. Foley The Evolution of a Security Control. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Hugo Jonker Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Andreas Happe, Stephan Krenn, Thomas Lorünser Malicious Clients in Distributed Secret Sharing Based Storage Networks. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Bruce Christianson The Price of Belief: Insuring Credible Trust? (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Frank Stajano Red Button and Yellow Button: Usable Security for Lost Security Tokens (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Giampaolo Bella, Bruce Christianson, Luca Viganò 0001 Invisible Security. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Jeff Yan Novel Security and Privacy Perspectives of Camera Fingerprints. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21David Llewellyn-Jones Explicit Delegation Using Configurable Cookies (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21David Llewellyn-Jones, Graeme Jenkinson, Frank Stajano Explicit Delegation Using Configurable Cookies. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Brian J. Kidney, Jonathan Anderson Exploiting Autocorrect to Attack Privacy. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Paul Wernick, Bruce Christianson The Price of Belief: Insuring Credible Trust? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Virgil D. Gligor Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Giampaolo Bella Invisible Security (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Ian Goldberg, Graeme Jenkinson, David Llewellyn-Jones, Frank Stajano Red Button and Yellow Button: Usable Security for Lost Security Tokens. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Olgierd Pieczul, Simon N. Foley The Evolution of a Security Control or Why Do We Need More Qualitative Research of Software Vulnerabilties? (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Hugo L. Jonker, Sjouke Mauw, Rolando Trujillo-Rasua Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Min Suk Kang, Virgil D. Gligor, Vyas Sekar Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Bruce Christianson, Petr Svenda, Vashek Matyás, James A. Malcolm, Frank Stajano, Jonathan Anderson (eds.) Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Yanlin Li, Yueqiang Cheng, Virgil D. Gligor, Adrian Perrig Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Radim Ostádal Challenges of Fiction in Network Security - Perspective of Virtualised Environments (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Syed Taha Ali Bitcoin: Perils of an Unregulated Global P2P Currency (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Giampaolo Bella, Luca Viganò 0001 Security is Beautiful. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Daniel R. Thomas, Alastair R. Beresford, Thomas Coudray, Tom Sutcliffe, Adrian Taylor The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Paul Wernick, Bruce Christianson Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? - Thoughts Occasioned by Brunner's "The Productions of Time" and Asimov's "The Dead Past". Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Changyu Dong Efficient Data Intensive Secure Computations: Fictional or Real? (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Mohammad Torabi Dashti Derailing Attacks (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Vit Bukac, Radim Ostádal, Petr Svenda, Tatevik Baghdasaryan, Vashek Matyas Challenges of Fiction in Network Security - Perspective of Virtualized Environments. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Arash Atashpendar, A. W. Roscoe 0001, Peter Y. A. Ryan Information Leakage Due to Revealing Randomly Selected Bits. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Sasa Radomirovic, Mohammad Torabi Dashti Derailing Attacks. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Syed Taha Ali, Dylan Clarke, Patrick McCorry Bitcoin: Perils of an Unregulated Global P2P Currency. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Luca Viganò 0001 Security is Beautiful (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Joan Feigenbaum, Brad Rosen On the Use of Security and Privacy Technology as a Plot Device. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Tavish Vaidya, Micah Sherr Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Changyu Dong Efficient Data Intensive Secure Computation: Fictional or Real? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Khaled Baqer, Ross J. Anderson Do You Believe in Tinker Bell? The Social Externalities of Trust (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Khaled Baqer, Ross J. Anderson Do You Believe in Tinker Bell? The Social Externalities of Trust. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Sandy Clark, Matt Blaze, Jonathan M. Smith Smearing Fingerprints: Changing the Game of Web Tracking with Composite Privacy. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Hugo Jonker, Sjouke Mauw, Sasa Radomirovic Location-Private Interstellar Communication. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Simon N. Foley, Olgierd Pieczul The Dark Side of the Code (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Paul Wernick Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Frank Stajano, Bruce Christianson, T. Mark A. Lomas, Graeme Jenkinson, Jeunese A. Payne, Max Spencer, Quentin Stafford-Fraser Pico Without Public Keys. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Tavish Vaidya, Micah Sherr Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Joan Feigenbaum On the Use of Security and Privacy Technology as a Plot Device (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Virgil D. Gligor Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Olgierd Pieczul, Simon N. Foley The Dark Side of the Code. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Frank Stajano Pico Without Public Keys (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Sjouke Mauw Location-Private Interstellar Communication (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Jiangshan Yu, Mark Dermot Ryan Device Attacker Models: Fact and Fiction. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Mark Ryan 0001 Device Attacker Models: Fact and Fiction (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 34979 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license