The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ISC"( http://dblp.L3S.de/Venues/ISC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/isw

Publication years (Num. hits)
2001 (38) 2002 (39) 2003 (34) 2004 (37) 2005 (39) 2006 (46) 2007 (30) 2008 (34) 2009 (39) 2010 (36) 2011 (27) 2012 (25) 2013 (65) 2014 (73) 2015 (70) 2016 (53) 2017 (49) 2018 (49) 2019 (42) 2020 (52) 2021 (47) 2022 (49) 2023 (52)
Publication types (Num. hits)
inproceedings(990) proceedings(35)
Venues (Conferences, Journals, ...)
ISC(1025)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 348 occurrences of 264 keywords

Results
Found 1025 publication records. Showing 1025 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen Rights Protection for Data Cubes. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Yuh-Hua Hu, Chun-yen Chou, Lih-Chung Wang, Feipei Lai Cryptanalysis of Variants of UOV. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multivariate quadratic, UOV, XL, digital signature
1Mila Katzarova, Andrew Simpson Delegation in a Distributed Healthcare Context: A Survey of Current Approaches. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Yaniv Shaked, Avishai Wool Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptanalysis, Stream cipher, Bluetooth, BDD
1Zhiqiang Lin, Nai Xia, Guole Li, Bing Mao, Li Xie 0001 Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Igor V. Kotenko, Alexander Ulanov Simulation of Internet DDoS Attacks and Defense. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security modeling and architecture, Security models for ambient intelligence environments, Security simulation, DDoS, Infrastructure security
1Walid Bagga, Refik Molva Collusion-Free Policy-Based Encryption. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Policy, Credentials, Pairing-Based Cryptography
1Sang Hyun Oh, Jin-Suk Kang, Yung-Cheol Byun, Taikyeong T. Jeong, Won Suk Lee Anomaly Intrusion Detection Based on Clustering a Data Stream. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Data mining, Clustering, Intrusion detection, Data stream, Anomaly detection
1Greg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Mohammed Assora, Ayoub Shirvani Enhancing the Security and Efficiency of 3-D Secure. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 3-D Secure, password based authentication and key exchange, online transaction security, SSL/TLS
1Javier Herranz, Fabien Laguillaumie Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF blind ring signatures, e-cash systems, provable security
1Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen On the Collision Resistance of RIPEMD-160. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RIPEMD-160, low-weight codewords, cryptanalysis, hash function, collision attack, differential attack
1Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1José Manuel Torres 0001, Jose M. Sarriegi, Javier Santos 0001, Nicolás Serrano Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF critical success factors and indicators, Information systems, security management
1Luciano Bononi, Carlo Tacconi A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Secure Clustering and Routing, Statistically Unique and Cryptographically Verifiable Identifiers, Mobile Ad Hoc Networks, Intrusion Detection System
1Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang Resistance Analysis to Intruders' Evasion of Detecting Intrusion. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF time perturbation, chaff, intrusion detection, Network security, stepping-stone, evasion
1Dongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini Multi-party Concurrent Signatures. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bilinear pairings, ring signature, concurrent signature
1George Danezis Breaking Four Mix-Related Schemes Based on Universal Re-encryption. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Universal re-encryption, re-encryption mix networks, traffic analysis, anonymous communications
1Huifang Yin, Jun Li An Efficient Probabilistic Packet Marking Scheme (NOD-PPM). Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura Formal Security Model of Multisignatures. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multisignature scheme, claw-free permutation, random oracle model, formal security model
1Fernando Esponda, Elena S. Ackley, Paul Helman, Haixia Jia, Stephanie Forrest Protecting Data Privacy Through Hard-to-Reverse Negative Databases. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Kostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman Related-Key Rectangle Attack on 42-Round SHACAL-2. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SHACAL-2, Block cipher, Differential cryptanalysis, Related-key rectangle attack
1Christophe De Cannière Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Matthew Burnside, Angelos D. Keromytis Low Latency Anonymity with Mix Rings. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1André Zúquete, Hugo Marques A Security Architecture for Protecting LAN Interactions. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hugo L. Jonker, Erik P. de Vink Formalising Receipt-Freeness. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF online voting schemes, formal methods, eGovernment, receipt-freeness
1Ellen Jochemsz, Benne de Weger A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF partial key exposure, inhomogeneous diophantine approximation, cryptanalysis, RSA, lattice basis reduction
1Michal Ren, Tanmoy Kanti Das, Jianying Zhou 0001 Diverging Keys in Wireless Sensor Networks. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Node Compromise Attack, Diverging Keys, Sensor Network Security
1Vassilis Prevelakis, Sotiris Ioannidis Preserving TCP Connections Across Host Address Changes. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Patrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna Extending .NET Security to Unmanaged Code. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1István Zsolt Berta Using Multiple Smart Cards for Signing Messages at Malicious Terminals. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1SeongHan Shin, Kazukuni Kobara, Hideki Imai An Authentication and Key Exchange Protocol for Secure Credential Services. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1David von Oheimb, Jorge Cuéllar Designing and Verifying Core Protocols for Location Privacy. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Geopriv, privacy, model checking, exploration, location information
1Sokratis K. Katsikas, Javier López 0001, Michael Backes 0001, Stefanos Gritzalis, Bart Preneel (eds.) Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Thomas Stütz, Andreas Uhl Transparent Image Encryption Using Progressive JPEG. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ulrich Huber 0001, Ahmad-Reza Sadeghi A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Adam L. Young Building a Cryptovirus Using Microsoft's Cryptographic API. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yong Ho Hwang, Dae Hyun Yum, Pil Joong Lee Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Victor K. Wei Tracing-by-Linking Group Signatures. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yanjiang Yang, Beng Chin Ooi A Privacy Preserving Rental System. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jianying Zhou 0001, Javier López 0001, Robert H. Deng, Feng Bao 0001 (eds.) Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Changshe Ma, Kefei Chen, Dong Zheng 0001, Shengli Liu 0001 Efficient and Proactive Threshold Signcryption. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF threshold signcryption, threshold approach, Network security, provable security, asynchronous network
1Nam Su Chang, Chang Han Kim, Young-Ho Park 0001, Jongin Lim 0001 A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Karatsuba-Ofman Algorithm, Non-Redundant Karatsuba-Ofman Algorithm, Hardware Architecture, Polynomial Multiplication
1Stelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis A Dynamic Mechanism for Recovering from Buffer Overflow Attacks. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Guomin Yang, Duncan S. Wong, Xiaotie Deng Analysis and Improvement of a Signcryption Scheme with Key Privacy. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Gary S.-W. Yeo, Raphael Chung-Wei Phan On the Security of the WinRAR Encryption Method. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Hyung-Mok Lee, Kyung Ju Ha, Kyo-Min Ku ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF tripartite, multilinear forms, authentication, key agreement protocol, ID-based
1Chi-Ming Hu, Wen-Guey Tzeng Compatible Ideal Contrast Visual Cryptography Schemes with Reversing. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Peng Wang 0009, Dengguo Feng, Wenling Wu On the Security of Tweakable Modes of Operation: TBC and TAE. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF modes of operation, authenticated encryption, symmetric encryption, Blockcipher, tweakable blockcipher
1Ratna Dutta, Rana Barua Constant Round Dynamic Group Key Agreement. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF DDH problem, provable security, group key agreement
1Stephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis gore: Routing-Assisted Defense Against DDoS Attacks. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Nan Zhang 0003, Mark Ryan 0001, Dimitar P. Guelev Evaluating Access Control Policies Through Model Checking. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF access control policy language, model checking, verification, access control, access control model, access control policy
1Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski A Practical Voting Scheme with Receipts. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo Certificateless Public Key Encryption Without Pairing. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Daoxi Xiu, Zhaoyu Liu A Formal Definition for Trust in Distributed Systems. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Souhwan Jung, Jaeduck Choi, Younghan Kim 0002, Sungi Kim IPSec Support in NAT-PT Scenario for IPv6 Transition. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF NAT-PT, IPSec, IKE, IPv6 transition
1Chris J. Mitchell Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yibing Kong, Jennifer Seberry, Janusz R. Getta, Ping Yu 0004 A Cryptographic Solution for General Access Control. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Hongxia Jin, Ginger Myles, Jeffery Lotspiech Towards Better Software Tamper Resistance. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jean Monnerat, Serge Vaudenay Chaum's Designated Confirmer Signature Revisited. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson Universally Composable Time-Stamping Schemes with Audit. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Helger Lipmaa An Oblivious Transfer Protocol with Log-Squared Communication. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Computationally-private information retrieval, length-flexible additively homomorphic public-key cryptosystem, oblivious transfer
1Akashi Satoh Hardware Architecture and Cost Estimates for Breaking SHA-1. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt, Kaoru Kurosawa Electronic Voting: Starting Over? Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Elisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou, Moti Yung "Trust Engineering: " From Requirements to System Design and Maintenance - A Working National Lottery System Experience. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Lujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, Peter Rutenbar Device-Enabled Authorization in the Grey-System. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Alexander W. Dent Hybrid Signcryption Schemes with Outsider Security. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Dennis Hofheinz, Dominique Unruh On the Notion of Statistical Security in Simulatability Definitions. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Zhenghong Wang, Ruby B. Lee New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Xiaolan Joy Zhang, Brian King Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Kun Peng, Colin Boyd, Ed Dawson A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1German Florez-Larrahondo, Susan M. Bridges, Rayford B. Vaughn Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Deholo Nali, Carlisle M. Adams, Ali Miri Time-Based Release of Confidential Information in Hierarchical Settings. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani 0001 SVision: A Network Host-Centered Anomaly Visualization Technique. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Birgit Pfitzmann, Michael Waidner Low-Level Ideal Signatures and General Integrity Idealization. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Kan Zhang, Yuliang Zheng 0001 (eds.) Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Zhengyi Le, Yi Ouyang 0001, James Ford, Fillia Makedon A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Verifiably Committed Signatures, Optimistic Fair Exchange, GPS Signature, Cryptanalysis
1Deholo Nali, Carlisle M. Adams, Ali Miri Using Mediated Identity-Based Cryptography to Support Role-Based Access Control. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Taekyoung Kwon 0002 Practical Authenticated Key Agreement Using Passwords. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Heejae Park, Jong Kim 0001 Modifiable Digital Content Protection in P2P. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1William Ku, Chi-Hung Chi Survey on the Technological Aspects of Digital Rights Management. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Craig Gentry, Zulfikar Ramzan RSA Accumulator Based Broadcast Encryption. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Toru Nakanishi 0001, Mitsuaki Shiota, Yuji Sugiyama An Efficient Online Electronic Cash with Unlinkable Exact Payments. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Qianhong Wu, Xiaofeng Chen 0001, Changjie Wang, Yumin Wang Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Qinglin Jiang, Douglas S. Reeves, Peng Ning Certificate Recommendations to Improve the Robustness of Web of Trust. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF PGP keyrings, Authentication, certificates, graph connectivity
1Carlisle M. Adams, Guenther Kramer, Serge Mister, Robert J. Zuccherato On The Security of Key Derivation Functions. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ajay Chander, Drew Dean, John C. Mitchell A Distributed High Assurance Reference Monitor. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Alex Hai Wang, Peng Liu 0005, Lunquan Li Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Zouheir Trabelsi, Hamza Rahmani Detection of Sniffers in an Ethernet Network. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1HongQian Karen Lu, Asad M. Ali Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Michael Meier 0001 A Model for the Semantics of Attack Signatures in Misuse Detection Systems. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Thitima Srivatanakul, John A. Clark, Fiona Polack Effective Security Requirements Analysis: HAZOP and Use Cases. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF HAZOP, use case, requirement analysis, security analysis
1Pan Wang, Peng Ning, Douglas S. Reeves Storage-Efficient Stateless Group Key Revocation. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Richard Bergmair, Stefan Katzenbeisser 0001 Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security). Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF lexical, word-sense ambiguity, learning, natural language, text, linguistic, CAPTCHA, HIP
1Muxiang Zhang Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jukka Ylitalo, Jan Melén, Pekka Nikander, Vesa Torvinen Re-thinking Security in IP Based Micro-Mobility. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 1025 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license