The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for tampering with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1999 (18) 2000-2001 (17) 2002-2003 (32) 2004 (20) 2005 (33) 2006 (44) 2007 (56) 2008 (55) 2009 (29) 2010 (18) 2011 (23) 2012 (16) 2013 (22) 2014 (29) 2015 (23) 2016 (31) 2017 (35) 2018 (43) 2019 (53) 2020 (47) 2021 (50) 2022 (47) 2023 (50) 2024 (15)
Publication types (Num. hits)
article(319) incollection(2) inproceedings(481) phdthesis(4)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 323 occurrences of 220 keywords

Results
Found 806 publication records. Showing 806 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
11Rafael Accorsi On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Weidong Shi, Hsien-Hsin S. Lee Authentication Control Point and Its Implications For Secure Processor Design. Search on Bibsonomy MICRO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Velik Bellemin, Tadashi Araragi CryptoComputing Approach to Protecting Interaction Protocols of Mobile Agents from Malicious Host Attack. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Alexander Zangerl Tamper-resistant Replicated Peer-to-Peer Storage using Hierarchical Signatures. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Jing Zhang, Anthony T. S. Ho Efficient Video Authentication for H.264/AVC. Search on Bibsonomy ICICIC (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Xunzhan Zhu, Anthony T. S. Ho, Pina Marziliano Image Authentication and Restoration Using Irregular Sampling for Traffic Enforcement Applications. Search on Bibsonomy ICICIC (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Dongdong Fu, Yun Q. Shi 0001, Wei Su 0001 Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition. Search on Bibsonomy IWDW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF image splicing, Hilbert-Huang transform (HHT), support vector machine (SVM), characteristic functions
11Hua Yuan, Xiao-Ping (Steven) Zhang A Secret Key Based Multiscale Fragile Watermark in the Wavelet Domain. Search on Bibsonomy ICME The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Yu-Feng Hsu, Shih-Fu Chang Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency. Search on Bibsonomy ICME The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Nandakishore Ramaswamy, K. R. Rao 0001 Video authentication for H.264/AVC using digital signature standard and secure hash algorithm. Search on Bibsonomy NOSSDAV The full citation details ... 2006 DBLP  DOI  BibTeX  RDF digital signature standard, secure hash, video authentication, H.264/AVC, multimedia security
11Shay Gueron, Jean-Pierre Seifert Is It Wise to Publish Your Public RSA Keys? Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Authenticated computing, Hardware attacks, Secure/Trusted boot, RSA, Fault attacks
11Saraju P. Mohanty, Parthasarathy Guturu, Elias Kougianos, Nishikanta Pati A Novel Invisible Color Image Watermarking Scheme Using Image Adaptive Watermark Creation and Robust Insertion-Extraction. Search on Bibsonomy ISM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Khaled E. A. Negm Design, Implementation and Testing of Mobile Agent Protection Mechanism for Manets. Search on Bibsonomy WEBIST (Selected Papers) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Secure Mobile Transactions, Mobile Agent Protection, Business to Business Secure Transaction
11Jianping Shi, Zhengjun Zhai Curvelet Transform for Image Authentication. Search on Bibsonomy RSKT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Authentication, curvelet transform, ridgelet transform
11Xianhai Zhang, Yongtian Yang, Yan Zhu 0010 A Secure Hierarchical Fragile Watermarking Method with Tamper Localization. Search on Bibsonomy IMSCCS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Dhruv Mahajan 0001, Ravi Ramamoorthi, Brian Curless A Theory of Spherical Harmonic Identities for BRDF/Lighting Transfer and Image Consistency. Search on Bibsonomy ECCV (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Zhifang Wang, Bian Yang, Xiamu Niu, Yijia Zhang A Practical Multipurpose Watermarking Scheme for Visual Content Copyright Protection and Authentication. Search on Bibsonomy IIH-MSP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Misung Cho, Seokryul Kim, Maenghee Sung, Giwon On 3D Fingerprinting and Encryption Principle for Collaboration. Search on Bibsonomy AXMEDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Daihyun Lim, Jae W. Lee, Blaise Gassend, G. Edward Suh, Marten van Dijk, Srinivas Devadas Extracting secret keys from integrated circuits. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Emin Martinian, Gregory W. Wornell, Brian Chen 0002 Authentication with distortion criteria. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Hsueh-Yi Sean Lin, Hong-Yuan Mark Liao, Chun-Shien Lu, Ja-Chen Lin Fragile watermarking for authenticating 3-D polygonal meshes. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Yih-Chun Hu, Adrian Perrig, David B. Johnson 0001 Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Search on Bibsonomy Wirel. Networks The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ad hoc network routing, secure ad hoc network routing, Ariadne, mobile ad hoc network, secure routing
11Shuo Chen 0001, Jun Xu 0003, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer Defeating Memory Corruption Attacks via Pointer Taintedness Detection. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Marco Milazzo, Giuseppe Pappalardo, Emiliano Tramontana, Giuseppe Ursino Handling run-time updates in distributed applications. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF distributed systems, adaptation, evolution, software evolution, separation of concerns, computational reflection, runtime adaptation
11Min-Jen Tsai, Hsiao-Ying Hung Wavelet Transform Based Digital Watermarking for Image Authentication. Search on Bibsonomy ACIS-ICIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Tao Zhang 0037, Xiaotong Zhuang, Santosh Pande Building Intrusion-Tolerant Secure Software. Search on Bibsonomy CGO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Ismail Ahmad, Hong Tat Ewe A Model for Secure Knowledge Sharing. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Jianqing Ma, YiPing Zhong, Shiyong Zhang Frequency-hopping based Secure Schemes in Sensornets. Search on Bibsonomy CIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Bob Briscoe, Arnaud Jacquet, Carla Di Cairano-Gilfedder, Alessandro Salvatori, Andrea Soppera, Martin Koyabe Policing congestion response in an internetwork using re-feedback. Search on Bibsonomy SIGCOMM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF QoS, congestion, incentives, policing, characterisation
11Keiichi Endo, Minoru Kawahara, Yutaka Takahashi 0001 A Distributed Architecture for Massively Multiplayer Online Services with Peer-to-Peer Support. Search on Bibsonomy Net-Con The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cheat-proof, peer-to-peer, interactive, real-time applications
11Marco Aguzzi, Maria Grazia Albanesi, Marco Ferretti A Novel Watermarking Algorithm for Image Authentication: Robustness Against Common Attacks and JPEG2000 Compression. Search on Bibsonomy ICIAP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Hongxia Jin, Ginger Myles, Jeffery Lotspiech Towards Better Software Tamper Resistance. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Chaw-Seng Woo, Jiang Du 0002, Binh Pham 0001, Hamud Ali Abdulkadir System Architecture Analysis of a Hybrid Watermarking Method. Search on Bibsonomy KES (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Celia Li, Cungang Yang, Richard Cheung Key Management for Role Hierarchy in Distributed Systems. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Jing-Ming Guo Robust Watermarking with Kernels-Alternated Error Diffusion and Weighted Lookup Table in Halftone Images. Search on Bibsonomy ISM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S. Wong 0001, Joo-Han Song Experimental comparisons between SAODV and AODV routing protocols. Search on Bibsonomy WMuNeP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, routing, wireless ad hoc networks, testbed
11Shuiming Ye, Qibin Sun, Ee-Chien Chang Error resilient content-based image authentication over wireless channel. Search on Bibsonomy ISCAS (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Sheng Tang, Jin-Tao Li 0001, Yong-Dong Zhang 0001 Compact and Robust Image Hashing. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Xiangguo Li, Jianhua Yang, Zhaohui Wu 0001 An NFSv4-Based Security Scheme for NAS. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Ping Yi, Zhoulin Dai, YiPing Zhong, Shiyong Zhang Resisting Flooding Attacks in Ad Hoc Networks. Search on Bibsonomy ITCC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Songtao Xia, Ben Di Vito, César A. Muñoz Automated test generation for engineering applications. Search on Bibsonomy ASE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF model-checking, test case generation, predicate abstraction
11Kripashankar Mohan, Bhagirath Narahari, Rahul Simha, Paul Ott, Alok N. Choudhary, Joseph Zambreno Performance Study of a Compiler/Hardware Approach to Embedded Systems Security. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Ching-Te Wang, Tung-Shou Chen, Wen-Hung Chao A New Detection Method for Tampered Audio Signals Based on Discrete Cosine Transformation. Search on Bibsonomy WSTST The full citation details ... 2005 DBLP  DOI  BibTeX  RDF discrete cosine transformation, audio, frequency domain, MP3
11K. E. A. Negm Design, implementation and testing of mobile agent protection mechanism for MANETS. Search on Bibsonomy AICCSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Mahadevan Gomathisankaran, Akhilesh Tyagi Arc3D: A 3D Obfuscation Architecture. Search on Bibsonomy HiPEAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona A secure and flexible authentication system for digital images. Search on Bibsonomy Multim. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Compression tolerance, JPEG, Image authentication
11Kaushal Solanki, Noah Jacobsen, Upamanyu Madhow, B. S. Manjunath, Shivkumar Chandrasekaran Robust image-adaptive data hiding using erasure and error correction. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Zhen Yao, Nasir M. Rajpoot Radon/ridgelet signature for image authentication. Search on Bibsonomy ICIP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Shengsheng Yu, Yuping Hu, Jingli Zhou Content-based watermarking scheme for image authentication. Search on Bibsonomy ICARCV The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Anthony T. S. Ho, Xunzhan Zhu, Jun Shen Authentication of biomedical images based on zero location watermarking. Search on Bibsonomy ICARCV The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Joseph Zambreno Design and Evaluation of an FPGA Architecture for Software Protection. Search on Bibsonomy FPL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11John Page, Arkady B. Zaslavsky, Maria Indrawan Countering Agent Security Vulnerabilities using an Extended SENSE Schema. Search on Bibsonomy IAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Vasileios Pappas, Beichuan Zhang 0001, Andreas Terzis, Lixia Zhang 0001 Fault-Tolerant Data Delivery for Multicast Overlay Networks. Search on Bibsonomy ICDCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Byoung-Koo Kim, Ik-Kyun Kim, Ki-Young Kim, Jongsoo Jang Design and Implementation of High-Performance Intrusion Detection System. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Pradeep K. Atrey, Wei-Qi Yan 0001, Ee-Chien Chang, Mohan S. Kankanhalli A Hierarchical Signature Scheme for Robust Video Authentication using Secret Sharing. Search on Bibsonomy MMM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Narges Ahmidi, Reza Safabakhsh A Novel DCT-based Approach for Secure Color Image Watermarking. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Austin Gilbert, Ajith Abraham, Marcin Paprzycki A System for Ensuring Data Integrity in Grid Environments. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF distributed trust, data integrity, reputation system, Grid security
11Laurent Sourgen Testing a secure device: High coverage with very low observability. Search on Bibsonomy ITC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Sandra Ring, David Esler, Eric Cole Self-healing mechanisms for kernel system compromises. Search on Bibsonomy WOSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF fault tolerance, operating systems, kernel, self-healing systems
11Jaewon Lee, Heeyoul Kim, Hyunsoo Yoon Tamper Resistant Software by Integrity-Based Encryption. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Tamper Resistant Software, Security, Software Protection
11Michael A. Caloyannides Digital "Evidence" and Reasonable Doubt. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF analog data, privacy, digital forensics, digital evidence, data entry
11Christian S. Collberg, Ginger Myles, Andrew Huntwork Sandmark--A Tool for Software Protection Research. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Jing Deng 0002, Richard Han 0001, Shivakant Mishra A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. Search on Bibsonomy IPSN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Kohei Muratani, Kokichi Sugihara Watermarking 3D Polygonal Meshes Using the Singular Spectrum Analysis. Search on Bibsonomy IMA Conference on the Mathematics of Surfaces The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Hongxia Jin, Jeffery Lotspiech Forensic Analysis for Tamper Resistant Software. Search on Bibsonomy ISSRE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Bassem Abdel-Aziz, Jean-Yves Chouinard On Perceptual Quality of Watermarked Images - An Experimental Approach. Search on Bibsonomy IWDW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Hsueh-Yi Sean Lin, Hong-Yuan Mark Liao, Chun-Shien Lu, Ja-Chen Lin Authentication of 3-D Polygonal Meshes. Search on Bibsonomy IWDW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Henry D. Knowles, Dominique A. Winne, Cedric Nishan Canagarajah, David R. Bull Towards tamper detection and classification with robust watermarks. Search on Bibsonomy ISCAS (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Haiping Lu, Alex C. Kot, Jun Cheng 0003 Secure data hiding in binary document images for authentication. Search on Bibsonomy ISCAS (3) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11David Lie, John C. Mitchell, Chandramohan A. Thekkath, Mark Horowitz Specifying and Verifying Hardware for Tamper-Resistant Software. Search on Bibsonomy S&P The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Joan Mir, Joan Borrell Protecting Mobile Agent Itineraries. Search on Bibsonomy MATA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Yingwu Zhu, Yiming Hu SNARE: A Strong Security Scheme for Network-Attached Storage. Search on Bibsonomy SRDS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Nachiketh R. Potlapally Optical Fingerprinting to Protect Data: A Proposal. Search on Bibsonomy Computer The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Christian S. Collberg, Clark D. Thomborson Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF watermarking, Obfuscation, intellectual property protection, tamper-proofing
11Matthias Jacob, Dan Boneh, Edward W. Felten Attacking an Obfuscated Cipher by Injecting Faults. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Giampaolo Bella, Stefano Bistarelli Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Tieyan Li, Wai-Meng Chew, Kwok-Yan Lam Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture. Search on Bibsonomy IPDPS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF attack resistant, mobile agents, intrusion detection systems, DoS attacks
11Edoardo Charbon, Ilhami Torunoglu Watermarking Techniques for Electronic Circuit Design. Search on Bibsonomy IWDW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11David Mazières, Dennis E. Shasha Building secure file systems out of Byzantine storage. Search on Bibsonomy PODC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung Observability Analysis - Detecting When Improved Cryptosystems Fail. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF robustness, cryptanalysis, implementations, side-channel attacks, observability, Security analysis, fault analysis, cryptosystems
11Hua Wang 0002, Jinli Cao, Yahiko Kambayashi Building consumer self-anonymity scalable payment protocol for Internet purchase. Search on Bibsonomy RIDE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Ohad Rodeh, Kenneth P. Birman, Danny Dolev The architecture and performance of security protocols in the ensemble group communication system: Using diamonds to guard the castle. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF security, Group communication
11Andrew Z. Tirkel, Thomas E. Hall A Unique Watermark for Every Image. Search on Bibsonomy IEEE Multim. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11Andrew B. Kahng, John C. Lach, William H. Mangione-Smith, Stefanus Mantik, Igor L. Markov, Miodrag Potkonjak, Paul Tucker, Huijuan Wang, Gregory Wolfe Constraint-based watermarking techniques for design IP protection. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11Liehua Me, Gonzalo R. Arce A class of authentication digital watermarks for secure multimedia communication. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11April Kwong, Michael Gertz 0001 Authentic Publication of XML Document Data. Search on Bibsonomy WISE (1) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF authentic data publication, XML, data integrity
11Hyen-O Oh, Hyun Wook Kim, Jong Won Seok, Jin Woo Hong, Dae Hee Youn Transparent And Robust Audio Watermarking With A New Echo Embedding Technique. Search on Bibsonomy ICME The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11David Mazières, Dennis E. Shasha Don't Trust your File Server. Search on Bibsonomy HotOS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11Avishai Wool Key management for encrypted broadcast. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF pay-per-view, conditional access
11Levente Buttyán, Jean-Pierre Hubaux Enforcing service availability in mobile ad-hoc WANs. Search on Bibsonomy MobiHoc The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
11Hiroshi Yoshiura Authentication Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
11Bruce Christianson, Bruno Crispo, James A. Malcolm Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
11Andrew Z. Tirkel, Thomas E. Hall Watermarking at point of origin. Search on Bibsonomy ACM Multimedia Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF watermark, correlation, polynomial, array
11Alexandr Seleznyov, Seppo Puuronen HIDSUR: A Hybrid Intrusion Detection System Based on Real-Time User Recognition. Search on Bibsonomy DEXA Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF HIDSUR, hybrid intrusion detection system, real-time user recognition, computer system protection, anomaly detection, online learning, computer network management, unauthorized access
11Neeran M. Karnik, Anand R. Tripathi A Security Architecture for Mobile Agents in Ajanta. Search on Bibsonomy ICDCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
11Michel Abdalla, Yuval Shavitt, Avishai Wool Towards Making Broadcast Encryption Practical. Search on Bibsonomy Financial Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
11Nikos Nikolaidis 0001, Ioannis Pitas Digital Image Watermarking: An Overview. Search on Bibsonomy ICMCS, Vol. 1 The full citation details ... 1999 DBLP  DOI  BibTeX  RDF watermarking, copyright protection
11Xiao Feng Wang, Kwok-Yan Lam, Xun Yi, C. Q. Zhang, Eiji Okamoto Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce. Search on Bibsonomy CIA The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
11Arianna Arona, Danilo Bruschi, Emilia Rosti Adding Availability to Log Services of Untrusted Machines. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF security, fault-tolerance, availability, log files
11Tomas Sander, Christian F. Tschudin Protecting Mobile Agents Against Malicious Hosts. Search on Bibsonomy Mobile Agents and Security The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 806 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license