The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase B-rep (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1974-1991 (17) 1992-1996 (46) 1997 (39) 1998 (55) 1999 (37) 2000 (34) 2001 (45) 2002 (29) 2003 (44) 2004 (37) 2005 (43) 2006 (44) 2007 (49) 2008 (49) 2009 (42) 2010 (35) 2011 (37) 2012 (21) 2013 (34) 2014 (20) 2015 (22) 2016 (23) 2017 (30) 2018 (31) 2019 (39) 2020-2021 (23) 2022 (20) 2023 (27) 2024 (5)
Publication types (Num. hits)
article(791) incollection(3) inproceedings(181) phdthesis(1) proceedings(1)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 166 occurrences of 132 keywords

Results
Found 979 publication records. Showing 977 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
16Peter Landrock, Torben P. Pedersen WYSIWYS? - What you see is what you sign? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Andreas Fuchsberger GSS-API. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Simon R. Wiseman Adding security labelling to Windows NT. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Constantinos Markantonakis Java card technology and security. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Eugene Sweeney Veincheck - A technical perspective. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Peter Brundrett Kerberos authentication in Windows NT 5.0 domains. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Michael C. Fairhurst New perspectives in automatic signature verification. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Jürgen Pampus, Frank Weber Facial recognition - An overview. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Chez Ciechanowicz Introduction. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Chez Ciechanowicz Introduction. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Charles Brookson Cryptography systems: Putting theory into practice. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16John Hayday Windows NT - Remote access. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Glenn Pittaway Distributed security services in Microsoft Windows 2000 (Windows NT 5.0: Protecting data in the enterprise. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Charles Pierson Network encryption. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Robin Barker, Gavin Kelly The Vulnerability Instantiation Methodology prototype. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Chez Ciechanowicz Introduction. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Bob Carter Implementation implications of biometrics. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Keith R. Dennis Public key network infrastructure: An evolutionary step in the ascent of WAN. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Stefek Zaba Tools and protocols for E-commerce. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Michael Ward Digital certificates and payment systems. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Alistair Kelman The regulation of virus research: Prosecution for 'unlawful research'? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Marcus J. Ranum Thinking about firewalls V2.0: Beyond perimeter security. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16John Sherwood Security issues in today's corporate network. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Nigel Hickson Security evaluation and certification: The future of a national scheme. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Chris Amery The European union data protection directive - Where are we? How did we get here? What next? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Christopher W. Klaus Network security: Anything but bulletproof. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Andreas Fuchsberger Microsoft CryptoAPI. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Gary Hardy Introduction. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16William List The common criteria - Good, bad or indifferent? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Chris J. Mitchell Authentication using cryptography. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Chris Sundt A commercial view of the OECD recommendations on cryptography policy. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Nick Mansfield Commercial use of cryptography in the shell companies. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Paul Halliden The management of symmetric keys. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Bill Hancock Stop that e-mail! you are probably breaking the law! Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Bart Preneel MACs and hash functions: State of the art. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16John Austen Can the laws really cut down hacking? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Roy McNamarra Unix network security. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Jim Blight Customer privacy versus customer service. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Gary Hardy The relevance of penetration testing to corporate network security. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Gary Hardy Introduction. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16John Woulds Information privacy and security - A regulator's priorities. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Ian White Windows NT security. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Donald W. Davies A brief history of cryptography. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16John Walker Should TTPs be licensed? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Christopher Millard Impact of the EU data protection directive on transborder data flows. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Don Coppersmith, Chris L. Holloway, Stephen M. Matyas, Nevenko Zunic The data encryption standard. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Sean Murphy The difficulty of attacking cryptosystems. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Robert P. Bigelow Encryption controls are US government priority. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Marcus J. Ranum Strategic security for IP networks. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Stefek Zaba Cryptographic security in the internet protocol suite: Practice and proposals. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Fred Piper Introduction to cryptology. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Gary Hardy Introduction. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Scott A. Vanstone Elliptic curve cryptosystem - The answer to strong, fast public-key cryptography for securing constrained environments. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Simon J. D. Phoenix, Paul D. Townsend Quantum cryptography: Protecting our future networks with quantum mechanics. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Joe Galsworthy Information protection and data back-up in a distributed environment. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Nigel Hickson DTI views on the provision of encryption services on public networks. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Tom Peltier The risk of allowing outside staff access to your information systems. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Chris J. Mitchell The royal holloway TTP-based key escrow scheme. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Gary Hardy Introduction. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Gary Hardy Introduction. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Nigel K. Iyer, Richard T. Kusnierz You can outsource many activities but not fraud! Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Jan Van Auseloos Responsibilities of TTPs in trusted networks. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Bill Pepper Information security standards for outsourcing. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Andrew Edwards Bolero - A TTP project for the shipping industry. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16David Herson Ethical trusted third party services - A new security approach. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Pieter van Dijken Business requirements for secure electronic communications. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Peter Landrock Practical experiences with TTP schemes. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Keith Girt Managing access rights in the distributed world. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Simon Oxley Securing a distributed environment - A practical case study. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16 Opening up business securely. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Richard Winsborrow EBridge - A TTP project for business registers. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Bill Pepper Obtaining assurance about your security. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Nanette Di Tosto Requirements for a trusted global public key initiative. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16John Greenland A vendor's view. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Sandra Honess Outsourcing - A legal perspective on contract critical success factors. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Gary Hardy Introduction. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Belinda Fairthorne Security in CORBA distributed object systems. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Gary Hardy The truth behind single sign-on. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16John A. Blackley, John Leach Security considerations in outsourcing IT services. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16John Leach TTP concepts. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Bill Pepper Security service level agreements for outsourced security functions. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Bill Pepper Trends in outsourcing. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Mike Horrell The security of distributed systems - An overview. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Patrick A. V. Hall Common Subexpression Identification in General Algebraic Systems. Search on Bibsonomy Technical Rep. UKSC 0060, IBM United Kingdom Scientific Centre The full citation details ... 1974   RDF
13Matthew Might, David Darais, Daniel Spiewak Parsing with derivatives: a functional pearl. Search on Bibsonomy ICFP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
13Philip W. L. Fong, Ida Sri Rejeki Siahaan Relationship-based access control policies and their policy languages. Search on Bibsonomy SACMAT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
13Junaid Ansari, Xi Zhang 0001, Andreas Achtzehn, Marina Petrova, Petri Mähönen A flexible MAC development framework for cognitive radio systems. Search on Bibsonomy WCNC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
13Jianying Hu, Yingdong Lu, Aleksandra Mojsilovic, Mayank Sharma, Mark S. Squillante Performance management of IT services delivery. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
13Anna Pesarin Analysis and classification of conversational interactions. Search on Bibsonomy ACM Multimedia The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
13Hannes Frey Best case energy analysis of localized euclidean minimum spanning tree based multicasting in ad hoc and sensor networks. Search on Bibsonomy MSWiM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
13Wei Li 0024, Sara McMains A GPU-based voxelization approach to 3D Minkowski sum computation. Search on Bibsonomy Symposium on Solid and Physical Modeling The full citation details ... 2010 DBLP  DOI  BibTeX  RDF GPU, path planning, voxelization, Minkowski sums, penetration depth
13Nathanael Thompson, Robin Kravets Poster abstract: understanding and controlling congestion in delay tolerant networks. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Neil A. M. Maiden Card Sorts to Acquire Requirements. Search on Bibsonomy IEEE Softw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Min Tang 0004, Minkyoung Lee, Young J. Kim Interactive Hausdorff distance computation for general polygonal models. Search on Bibsonomy ACM Trans. Graph. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hausdorff distance, dynamics simulation, shape similarity, penetration depth
13Xiaoyan Shi, Martin Styner, Jeffrey A. Lieberman, Joseph G. Ibrahim, Weili Lin, Hongtu Zhu Intrinsic Regression Models for Manifold-Valued Data. Search on Bibsonomy MICCAI (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Wojciech S. Mokrzycki, Andrzej Salamonczyk New Results in Generation of Accurate 3 D Multiview Representation of Monotonous Polyhedrons. Search on Bibsonomy Computer Recognition Systems 2 The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Wojciech S. Mokrzycki, Andrzej Salamonczyk Spiral Scanning of Faces to Obtain Complete 3 D View Representation of Monotonous Polyhedra. Search on Bibsonomy Computer Recognition Systems 2 The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Tieming Su, Xiaoliang Tai, Zhixiang Xu Application of Parallel Programming in Collaborative Design. Search on Bibsonomy CDVE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF parallel computing, Grid, Collaborative design, virtual assembly
13Flavien Picon, Mehdi Ammi, Patrick Bourdot Force model for CAD selection. Search on Bibsonomy VRST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CAD-VR integration, haptic attraction
13Kai Shi 0002, Yantai Shu, Xin Wang, Oliver W. W. Yang RCP throughput modeling and performance improvement. Search on Bibsonomy SpringSim The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RCP, delayed REQ, wireless LAN, Markov chain
Displaying result #801 - #900 of 977 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license