|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1928 occurrences of 929 keywords
|
|
|
Results
Found 2507 publication records. Showing 2507 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
14 | Pengfei Yang 0001, Jiayang Huang, Xin Mi, Bo Wan |
A Memory Confidentiality Protection Scheme Based on Dynamic Keys and Compression Counter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Sci. Eng. ![In: J. Inf. Sci. Eng. 36(4), pp. 709-726, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
14 | Jian Chen, Tao Shu |
Statistical Modeling and Analysis on the Confidentiality of Indoor VLC Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 19(7), pp. 4744-4757, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Pamarthi NagaRaju, Nallamothu Nagamalleswara Rao |
OB-MECC: An Efficient Confidentiality and Security Enhancement for Cloud Storage System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cyber Secur. Mobil. ![In: J. Cyber Secur. Mobil. 9(4), pp. 577-600, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Maximilian Walter, Stephan Seifermann, Robert Heinrich |
A Taxonomy of Dynamic Changes Affecting Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softwaretechnik-Trends ![In: Softwaretechnik-Trends 40(2), pp. 35-36, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
14 | Sundararaman Rajagopalan, Siva Poori, Mukund Narasimhan, Sivaraman Rethinam 0001, Chandrasekar Vallipalayam Kuppusamy, Ramalingam Balasubramanian, Vijaya Moorthi Paramasivam Annamalai, Amirtharajan Rengarajan |
Chua's diode and strange attractor: a three-layer hardware-software co-design for medical image confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Image Process. ![In: IET Image Process. 14(7), pp. 1354-1365, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Khalid El Makkaoui, Abdellah Ezzati, Abderrahim Beni Hssane, Slimane Ouhmad |
Fast Cloud-Paillier homomorphic schemes for protecting confidentiality of sensitive data in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 11(6), pp. 2205-2214, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Yong Wang, June Li, Siyu Zhao, Fajiang Yu |
Hybridchain: A Novel Architecture for Confidentiality-Preserving and Performant Permissioned Blockchain Using Trusted Execution Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 190652-190662, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Yahya M. Al-Moliki, Mohammed T. Alresheedi, Yahya Al-Harthi |
Improving Availability and Confidentiality via Hyperchaotic Baseband Frequency Hopping Based on Optical OFDM in VLC Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 125013-125028, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Jung-Shian Li, I-Hsien Liu, Chin-Jui Tsai, Zhi-Yuan Su, Chu-Fen Li, Chuan-Gang Liu |
Secure Content-Based Image Retrieval in the Cloud With Key Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 114940-114952, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Loredana Caruccio, Domenico Desiato, Giuseppe Polese, Genoveffa Tortora |
GDPR Compliant Information Confidentiality Preservation in Big Data Processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 205034-205050, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Shiladitya Bhattacharjee, Lukman bin A. B. Rahim, Junzo Watada, Arunava Roy |
Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data Transmission. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 45477-45495, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | J. Raja, M. Ramakrishnan |
Confidentiality-preserving based on attribute encryption using auditable access during encrypted records in cloud location. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 76(8), pp. 6026-6039, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Yushu Zhang, Qi He, Guo Chen 0002, Xinpeng Zhang 0001, Yong Xiang 0001 |
A Low-Overhead, Confidentiality-Assured, and Authenticated Data Acquisition Framework for IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 16(12), pp. 7566-7578, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Majid Khan, Sajjad Shaukat Jamal, Umer Aziz Waqas |
A novel combination of information hiding and confidentiality scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 79(41-42), pp. 30983-31005, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering |
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 33(4), pp. 1871-1913, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Nikolay Sergeevich Egoshin, Anton Konev, Alexander Alexandrovich Shelupanov |
A Model of Threats to the Confidentiality of Information Processed in Cyberspace Based on the Information Flows Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 12(11), pp. 1840, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Wanyun Li |
Understanding the Whistle-blowing Intention to Report Breach of Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. Assoc. Inf. Syst. ![In: Commun. Assoc. Inf. Syst. 47, pp. 4, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Al-Batool Al-Ghamdi, Ameenah Al-Sulami, Asia Othman Aljahdali |
On the security and confidentiality of quantum key distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Priv. ![In: Secur. Priv. 3(5), 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Svetlana Boudko, Peder Aursand, Habtamu Abie |
Evolutionary Game for Confidentiality in IoT-Enabled Smart Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. ![In: Inf. 11(12), pp. 582, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Utz Nisslmueller, Klaus-Tycho Foerster, Stefan Schmid 0001, Christian Decker 0002 |
Toward Active and Passive Confidentiality Attacks On Cryptocurrency Off-Chain Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2003.00003, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
14 | Mahdi Shakiba-Herfeh, Arsenia Chorti, H. Vincent Poor |
Physical Layer Security: Authentication, Integrity and Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2001.07153, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
14 | Alireza Shojaifar, Samuel A. Fricker |
SMEs Confidentiality Concerns for Security Information Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2007.06308, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
14 | David Umsonst, Henrik Sandberg |
On the confidentiality of controller states under sensor attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2001.02714, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
14 | Alireza Shojaifar |
SMEs Confidentiality Issues and Adoption of Good Cybersecurity Practices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2007.08201, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
14 | Abhishek Gupta, Erick Galinkin |
Green Lighting ML: Confidentiality, Integrity, and Availability of Machine Learning Systems in Deployment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2007.04693, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
14 | Jan Stodt, Christoph Reich |
Data Confidentiality In P2P Communication And Smart Contracts Of Blockchain In Industry 4.0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2007.14195, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
14 | Fabian Bach |
Differential privacy and noisy confidentiality concepts for European population statistics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2012.09775, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
14 | Josep Domingo-Ferrer, Krishnamurty Muralidhar, Maria Bras-Amorós |
General Confidentiality and Utility Metrics for Privacy-Preserving Data Publishing Based on the Permutation Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2010.03502, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
14 | Savvas Savvides, Darshika Khandelwal, Patrick Eugster |
Efficient Confidentiality-Preserving Data Analytics over Symmetrically Encrypted Datasets. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. VLDB Endow. ![In: Proc. VLDB Endow. 13(8), pp. 1290-1303, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Fan Zhang 0022, Warren He, Raymond Cheng 0001, Jernej Kos, Nicholas Hynes 0001, Noah M. Johnson, Ari Juels, Andrew Miller 0001, Dawn Song |
The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 18(3), pp. 17-27, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Wei Li 0121, Pengqiu Meng, Yi Hong, Xiaohui Cui |
Using deep learning to preserve data confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Intell. ![In: Appl. Intell. 50(2), pp. 341-353, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Robin Mitra, Stéphanie Blanchard, Iain Dove, Caroline Tudor, Keith Spicer |
Confidentiality challenges in releasing longitudinally linked data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Data Priv. ![In: Trans. Data Priv. 13(2), pp. 151-170, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
14 | Khushbu Khalid Butt, Guohui Li, Fawad Masood, Sajid Khan 0002 |
A Digital Image Confidentiality Scheme Based on Pseudo-Quantum Chaos and Lucas Sequence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 22(11), pp. 1276, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Furkan Turan, Ingrid Verbauwhede |
Proxy Re-Encryption for Accelerator Confidentiality in FPGA-Accelerated Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 805, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
14 | Suyash Bagad, Saravanan Vijayakumaran |
On the Confidentiality of Amounts in Grin. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 723, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
14 | Christian Esposito 0001, Massimo Ficco, Aniello Castiglione, Francesco Palmieri 0002, Alfredo De Santis |
Distributed Group Key Management for Event Notification Confidentiality Among Sensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 17(3), pp. 566-580, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Sungjin Park 0001, Chung Hwan Kim, Junghwan Rhee, Jong-Jin Won, Taisook Han, Dongyan Xu |
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 17(4), pp. 883-897, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Wei Jiang 0016, Liang Wen, Jinyu Zhan, Ke Jiang |
Design optimization of confidentiality-critical cyber physical systems with fault detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Archit. ![In: J. Syst. Archit. 107, pp. 101739, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Alexander Schlögl, Rainer Böhme |
eNNclave: Offline Inference with Model Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec@CCS ![In: AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, Virtual Event, USA, 13 November 2020., pp. 93-104, 2020, ACM, 978-1-4503-8094-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Utz Nisslmueller, Klaus-Tycho Foerster, Stefan Schmid 0001, Christian Decker 0002 |
Toward Active and Passive Confidentiality Attacks on Cryptocurrency Off-chain Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, Valletta, Malta, February 25-27, 2020., pp. 7-14, 2020, SCITEPRESS, 978-989-758-399-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Giannis Savva, Konstantinos Manousakis, Georgios Ellinas |
Providing Confidentiality in Optical Networks: Metaheuristic Techniques for the Joint Network Coding-Routing and Spectrum Allocation Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTON ![In: 22nd International Conference on Transparent Optical Networks, ICTON 2020, Bari, Italy, July 19-23, 2020, pp. 1-4, 2020, IEEE, 978-1-7281-8423-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Mohammed T. Alresheedi |
Improving the Confidentiality of VLC Channels: Physical-Layer Security Approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTON ![In: 22nd International Conference on Transparent Optical Networks, ICTON 2020, Bari, Italy, July 19-23, 2020, pp. 1-5, 2020, IEEE, 978-1-7281-8423-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Alireza Shojaifar, Samuel A. Fricker |
SMEs' Confidentiality Concerns for Security Information Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HAISA ![In: Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8-10, 2020, Proceedings, pp. 289-299, 2020, Springer, 978-3-030-57403-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Suyash Bagad, Saravanan Vijayakumaran |
On the Confidentiality of Amounts in Grin. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVCBT ![In: Crypto Valley Conference on Blockchain Technology, CVCBT 2020, Rotkreuz, Switzerland, June 11-12, 2020, pp. 78-82, 2020, IEEE, 978-1-7281-9390-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Manoharan Ramachandran, Niaz Chowdhury, Allan Third, John Domingue, Kevin Quick, Michelle Bachler |
Towards Complete Decentralised Verification of Data with Confidentiality: Different ways to connect Solid Pods and Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW (Companion Volume) ![In: Companion of The 2020 Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, pp. 645-649, 2020, ACM / IW3C2, 978-1-4503-7024-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Jan Hajny, Petr Dzurenda, Raul Casanova Marques, Lukas Malina |
Cryptographic Protocols for Confidentiality, Authenticity and Privacy on Constrained Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUMT ![In: 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, ICUMT 2020, Brno, Czech Republic, October 5-7, 2020, pp. 87-92, 2020, IEEE, 978-1-7281-9281-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Tasneem Ali Ghunaim, Ibrahim Kamel, Zaher Al Aghbari |
Framework for Protecting the Confidentiality of Outsourced Data on Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIT ![In: 14th International Conference on Innovations in Information Technology, IIT 2020, Al Ain, United Arab Emirates, November 17-18, 2020, pp. 29-34, 2020, IEEE, 978-1-7281-8184-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Niklas Förster, Juan A. Cabrera 0002, Elke Franz 0001, Stefan Pfennig, Frank H. P. Fitzek |
Efficient Confidentiality for Network Coded Distributed Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: IEEE Global Communications Conference, GLOBECOM 2020, Virtual Event, Taiwan, December 7-11, 2020, pp. 1-6, 2020, IEEE, 978-1-7281-8298-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Manoharan Ramachandran, Niaz Chowdhury, Allan Third, Zeeshan Jan, Chris Valentine, John Domingue |
A Framework for Handling Internet of Things Data with Confidentiality and Blockchain Support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IOT4SAFE@ESWC ![In: Proceedings of the Workshop on IOT Infrastructures for Safety in Pervasive Environments (IOT4SAFE 2020) co-located with 17th Extended Semantic Web Conference (ESWC 2020), Herakleion, Greece, June 2, 2020., 2020, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
14 | Ying Yan 0002, Changzheng Wei, Xuepeng Guo, Xuming Lu, Xiaofu Zheng, Qi Liu, Chenhui Zhou, Xuyang Song, Boran Zhao, Hui Zhang 0002, Guofei Jiang |
Confidentiality Support over Financial Grade Consortium Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 2020 International Conference on Management of Data, SIGMOD Conference 2020, online conference [Portland, OR, USA], June 14-19, 2020., pp. 2227-2240, 2020, ACM, 978-1-4503-6735-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Jianguo Jiang, Yue Lu, Min Yu 0001, Gang Li 0009, Chao Liu 0020, Shaohua An, Weiqing Huang |
CES2Vec: A Confidentiality-Oriented Word Embedding for Confidential Information Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: IEEE Symposium on Computers and Communications, ISCC 2020, Rennes, France, July 7-10, 2020, pp. 1-7, 2020, IEEE, 978-1-7281-8086-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Werner Zellinger, Volkmar Wieser, Mohit Kumar 0001, David Brunner, Natalia Shepeleva, Rafa Gálvez, Josef Langer, Lukas Fischer 0001, Bernhard Moser 0001 |
Beyond federated learning: On confidentiality-critical machine learning applications in industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISM ![In: Proceedings of the 2nd International Conference on Industry 4.0 and Smart Manufacturing (ISM 2020), Virtual Event, Austria, 23-25 November 2020., pp. 734-743, 2020, Elsevier. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Angshuman Jana |
A Static Analysis Approach to Detect Confidentiality Leakage of Database Query Languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISDA ![In: Intelligent Systems Design and Applications - 20th International Conference on Intelligent Systems Design and Applications (ISDA 2020) held December 12-15, 2020, pp. 794-804, 2020, Springer, 978-3-030-71186-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Yu Zou, Yongzhi Wang, Xiaoyu Zhang |
Enforcing Control Flow Confidentiality with SGX. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM Workshops ![In: 39th IEEE Conference on Computer Communications, INFOCOM Workshops 2020, Toronto, ON, Canada, July 6-9, 2020, pp. 1352-1353, 2020, IEEE, 978-1-7281-8695-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Filip Fatz, Philip Hake, Peter Fettke |
Confidentiality-preserving Validation of Tax Documents on the Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirtschaftsinformatik (Zentrale Tracks) ![In: Entwicklungen, Chancen und Herausforderungen der Digitalisierung: Proceedings der 15. Internationalen Tagung Wirtschaftsinformatik, WI 2020, Potsdam, Germany, March 9-11, 2020. Zentrale Tracks, pp. 1262-1277, 2020, GITO Verlag, 9783955453350. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Rocco Salvia, Agostino Cortesi, Pietro Ferrara 0001, Fausto Spoto |
Intents Analysis of Android Apps for Confidentiality Leakage Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSS (1) ![In: Advanced Computing and Systems for Security - Volume Eleven, 7th International Doctoral Symposium on Applied Computation and Security Systems, ACSS 2020, Kolkata, India, February 28-29, 2020., pp. 43-65, 2020, Springer, 978-981-15-5746-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Christian J. Mahoney, Katie Jensen, Fusheng Wei, Haozhen Zhao, Han Qin, Shi Ye |
Application of Deep Learning in Recognizing Bates Numbers and Confidentiality Stamping from Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE BigData ![In: 2020 IEEE International Conference on Big Data (IEEE BigData 2020), Atlanta, GA, USA, December 10-13, 2020, pp. 2127-2130, 2020, IEEE, 978-1-7281-6251-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Nicolas Boltz, Maximilian Walter, Robert Heinrich |
Context-Based Confidentiality Analysis for Industrial IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEAA ![In: 46th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2020, Portoroz, Slovenia, August 26-28, 2020, pp. 589-596, 2020, IEEE, 978-1-7281-9532-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Radda A. Iureva, Sergey V. Taranov, Alexander V. Penskoi, Artem S. Kremlev |
Ensuring Confidentiality of Information When Processing Operational Production Plans in Cloud Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICINCO ![In: Proceedings of the 17th International Conference on Informatics in Control, Automation and Robotics, ICINCO 2020, Lieusaint, Paris, France, July 7-9, 2020., pp. 167-173, 2020, ScitePress, 978-989-758-442-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Krishnamurty Muralidhar, Josep Domingo-Ferrer, Sergio Martínez |
ε-Differential Privacy for Microdata Releases Does Not Guarantee Confidentiality (Let Alone Utility). ![Search on Bibsonomy](Pics/bibsonomy.png) |
PSD ![In: Privacy in Statistical Databases - UNESCO Chair in Data Privacy, International Conference, PSD 2020, Tarragona, Spain, September 23-25, 2020, Proceedings, pp. 21-31, 2020, Springer, 978-3-030-57520-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Yunlei Zhao |
Identity-Based Authenticated Encryption with Identity Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (2) ![In: Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II, pp. 633-653, 2020, Springer, 978-3-030-59012-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Jingwei Li 0001, Zuoru Yang, Yanjing Ren, Patrick P. C. Lee, Xiaosong Zhang 0001 |
Balancing storage efficiency and data confidentiality with tunable encrypted deduplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: EuroSys '20: Fifteenth EuroSys Conference 2020, Heraklion, Greece, April 27-30, 2020, pp. 22:1-22:15, 2020, ACM, 978-1-4503-6882-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | João Luiz Monteiro Joaquim, Ronaldo dos Santos Mello |
An Analysis of Confidentiality Issues in Data Lakes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS '20: The 22nd International Conference on Information Integration and Web-based Applications & Services, Virtual Event / Chiang Mai, Thailand, November 30 - December 2, 2020, pp. 168-177, 2020, ACM, 978-1-4503-8922-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Sisi Duan, Chao Liu 0039, Xin Wang, Yusen Wu, Shuai Xu, Yelena Yesha, Haibin Zhang |
Intrusion-Tolerant and Confidentiality-Preserving Publish/Subscribe Messaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: International Symposium on Reliable Distributed Systems, SRDS 2020, Shanghai, China, September 21-24, 2020, pp. 319-328, 2020, IEEE, 978-1-7281-7626-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Till Zimmermann, Jan Bauer, Nils Aschenbruck |
CryptoCAN - Ensuring Confidentiality in Controller Area Networks for Agriculture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sicherheit ![In: Sicherheit 2020, Sicherheit, Schutz und Zuverlässigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 17.-20. März 2020, Göttingen., pp. 79-90, 2020, Gesellschaft für Informatik e.V., 978-3-88579-695-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Martin Zuber |
Contributions to data confidentiality in machine learning by means of homomorphic encryption. (Confidentialité des données de l'apprentissage machine par chiffrement homomorphe). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
RDF |
|
14 | Gamze Tillem |
Preserving Confidentiality in Data Analytics-as-a-Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
RDF |
|
14 | Robert Sison |
Proving Confidentiality and Its Preservation Under Compilation for Mixed-Sensitivity Concurrent Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
RDF |
|
14 | Cristina M. Beltran-Aroca, Fernando Labella, Pilar Font-Ugalde, Eloy Girela-Lopez |
Assessment of Doctors' Knowledge and Attitudes Towards Confidentiality in Hospital Care. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. Eng. Ethics ![In: Sci. Eng. Ethics 25(5), pp. 1531-1548, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Tomás Grivna, Jakub Drápal |
Attacks on the confidentiality, integrity and availability of data and computer systems in the criminal case law of the Czech Republic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Investig. ![In: Digit. Investig. 28(Supplement), pp. 1-13, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Zengli Wang, Lin Liu 0005, Hanlin Zhou, Minxuan Lan |
How Is the Confidentiality of Crime Locations Affected by Parameters in Kernel Density Estimation? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPRS Int. J. Geo Inf. ![In: ISPRS Int. J. Geo Inf. 8(12), pp. 544, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Stijn Storms, Peggy Valcke, Els Kindt |
Rage against the machine: does machine-to-machine communication fall within the scope of the confidentiality principle? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Law Inf. Technol. ![In: Int. J. Law Inf. Technol. 27(4), pp. 372-408, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Ghassan Sabeeh Mahmood, Dong Jun Huang, Baidaa Abdulrahman Jaleel |
Achieving an Effective, Confidentiality and Integrity of Data in Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 21(2), pp. 326-332, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
14 | Chenglian Liu, Chieh-Wen Hsu |
Comment on "Improved Secure RSA Cryptosystem (ISRSAC) for Data Confidentiality in Cloud". ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 21(4), pp. 709-712, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
14 | Yang Su, Junwei Shen, Min-Qing Zhang |
A high security and efficiency protection of confidentiality and integrity for off-chip memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 10(7), pp. 2633-2643, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Khalid El Makkaoui, Abderrahim Beni Hssane, Abdellah Ezzati |
Speedy Cloud-RSA homomorphic scheme for preserving data confidentiality in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 10(12), pp. 4629-4640, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Jiaojiao Wu, Yanping Li 0001, Tian-Yin Wang, Yong Ding 0005 |
CPDA: A Confidentiality-Preserving Deduplication Cloud Storage With Public Cloud Auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 160482-160497, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Abdullah M. Iliyasu |
Cellular-Automated Protocol to Safeguard Confidentiality of QR Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 144451-144471, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Kai He, Yijun Mao, Jianting Ning, Kaitai Liang, Xinyi Huang 0001, Emmanouil Panaousis, George Loukas |
A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 50658-50668, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Sadegh Yazdanshenas, Vaughn Betz |
The Costs of Confidentiality in Virtualized FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 27(10), pp. 2272-2283, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Nasir N. Hurrah, Shabir A. Parah, Javaid A. Sheikh, Fadi Al-Turjman 0001, Khan Muhammad 0001 |
Secure data transmission framework for confidentiality in IoTs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ad Hoc Networks ![In: Ad Hoc Networks 95, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Arun Kumar Sangaiah, Darshan Vishwasrao Medhane, Tao Han 0004, M. Shamim Hossain, Ghulam Muhammad |
Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 15(7), pp. 4189-4196, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Patrick Eugster, Seema Kumar, Savvas Savvides, Julian James Stephen |
Ensuring Confidentiality in the Cloud of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pervasive Comput. ![In: IEEE Pervasive Comput. 18(1), pp. 10-18, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Jehad M. Hamamreh, Haji M. Furqan, Hüseyin Arslan |
Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Surv. Tutorials ![In: IEEE Commun. Surv. Tutorials 21(2), pp. 1773-1828, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Hyeong-Jin Kim, Jae-Woo Chang |
A new Top-k query processing algorithm to guarantee confidentiality of data and user queries on outsourced databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Syst. Assur. Eng. Manag. ![In: Int. J. Syst. Assur. Eng. Manag. 10(5), pp. 898-904, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Khalid El Makkaoui, Abderrahim Beni Hssane, Abdellah Ezzati |
Cloud-ElGamal and Fast Cloud-RSA Homomorphic Schemes for Protecting Data Confidentiality in Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Digit. Crime Forensics ![In: Int. J. Digit. Crime Forensics 11(3), pp. 90-102, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Kubilay Ahmet Küçük, David Grawrock, Andrew Martin 0002 |
Managing confidentiality leaks through private algorithms on Software Guard eXtensions (SGX) enclaves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EURASIP J. Inf. Secur. ![In: EURASIP J. Inf. Secur. 2019, pp. 14, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Laurent Gomez, Marcus Wilhelm, José Márquez, Patrick Duverger |
Security for Distributed Deep Neural Networks Towards Data Confidentiality & Intellectual Property Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1907.04246, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
14 | Felix Ritchie, Jim Smith |
Confidentiality and linked data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1907.06465, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
14 | Farzin Salek, Min-Hsiu Hsieh, Javier R. Fonollosa |
Publicness, Privacy and Confidentiality in the Single-Serving Quantum Broadcast Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1903.04463, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
14 | Allison Irvin, Isabell Kiral |
Designing for Privacy and Confidentiality on Distributed Ledgers for Enterprise (Industry Track). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1912.02924, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
14 | Sayed Ashraf Mamun |
Sensor Networks in Healthcare: Ensuring Confidentiality and User Anonymity in WBAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1910.00991, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
14 | Yaqian Liang, Fazhi He, Haoran Li 0008 |
An asymmetric and optimized encryption method to protect the confidentiality of 3D mesh model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adv. Eng. Informatics ![In: Adv. Eng. Informatics 42, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Lavanya Dhamodhar Loganathan, Ramaprabha Rengaraj, Gunaseelan Konganathan, Vaishnavi Varatharajan |
Physical layer security using an adaptive modulation scheme for improved confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Commun. ![In: IET Commun. 13(20), pp. 3383-3390, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Andrei Tchernykh, Uwe Schwiegelshohn, El-Ghazali Talbi, Mikhail G. Babenko |
Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. ![In: J. Comput. Sci. 36, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Alexandra Olteanu, Jean Garcia-Gathright, Maarten de Rijke, Michael D. Ekstrand, Adam Roegiest, Aldo Lipani, Alex Beutel, Ana Lucic, Ana-Andreea Stoica, Anubrata Das 0001, Asia Biega, Bart Voorn, Claudia Hauff, Damiano Spina, David D. Lewis, Douglas W. Oard, Emine Yilmaz, Faegheh Hasibi, Gabriella Kazai, Graham McDonald, Hinda Haned, Iadh Ounis, Ilse van der Linden, Joris Baan, Kamuela N. Lau, Krisztian Balog, Mahmoud F. Sayed, Maria Panteli, Mark Sanderson, Matthew Lease, Preethi Lahoti, Toshihiro Kamishima |
FACTS-IR: fairness, accountability, confidentiality, transparency, and safety in information retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR Forum ![In: SIGIR Forum 53(2), pp. 20-43, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Marcos A. Guerine, Murilo B. Stockinger, Isabel Rosseti, Luidi Gelabert Simonetti, Kary A. C. S. Ocaña, Alexandre Plastino 0001, Daniel de Oliveira 0001 |
A provenance-based heuristic for preserving results confidentiality in cloud-based scientific workflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 97, pp. 697-713, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Aysha Shabbir, Maryam Shabbir, Muhammad Rizwan 0005, Fahad Ahmad |
Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2019, pp. 2509898:1-2509898:16, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Natalie Shlomo, Thomas Krenzke, Jianzhu Li |
Comparison of Three Post-tabular Confidentiality Approaches for Survey Weighted Frequency Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Data Priv. ![In: Trans. Data Priv. 12(3), pp. 145-168, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
14 | Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson |
libInterMAC: Beyond Confidentiality and Integrity in Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 165, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
|
|