The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ISPEC"( http://dblp.L3S.de/Venues/ISPEC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ispec

Publication years (Num. hits)
2005 (36) 2006 (36) 2007 (27) 2008 (30) 2009 (35) 2010 (29) 2011 (33) 2012 (28) 2013 (28) 2014 (42) 2015 (39) 2016 (26) 2017 (58) 2018 (40) 2019 (29) 2021 (25) 2022 (36) 2023 (324)
Publication types (Num. hits)
inproceedings(882) proceedings(19)
Venues (Conferences, Journals, ...)
iSPEC(901)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 123 occurrences of 109 keywords

Results
Found 901 publication records. Showing 901 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Andrew Brown 0005, Mark Ryan 0001 Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jihwan Lim, Heekuck Oh, Sangjin Kim A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, RFID, User Privacy
1William J. Caelli Application Security - Myth Or Reality? Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF OSI security, access control, web services security, mandatory access control, security education, application security, operating system security
1Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen Certificate Based (Linkable) Ring Signature. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Certificate Based, Ring Signature, Linkability
1Di Ma Secure Feedback Service in Wireless Sensor Networks. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Feedback Service, ACK aggregation, ACK implosion, Sensor network, Authentication, MAC, Bloom Filter
1Ed Dawson, Duncan S. Wong (eds.) Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Lucas Chi Kwong Hui, Kam-Pui Chow, Siu-Ming Yiu Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper). Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF digital crimes, forensics technology, Computer forensics
1Zhen Cao, Zhi Guan, Zhong Chen 0001, Jian-bin Hu, Liyong Tang An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Robert H. Deng, Yanjiang Yang Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Gaoli Wang Related-Key Rectangle Attack on 43-Round SHACAL-2. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SHACAL-2, Differential characteristic, Block cipher, Related-Key Rectangle attack
1Miyuki Uno, Mikio Kano Visual Cryptography Schemes with Dihedral Group Access Structure for Many Images. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF diheadral group, many secret images, visual cryptography, visual secret sharing, VSS, VCS
1Zhenglin Liu, Xu Guo, Yi-Cheng Chen, Yu Han, Xuecheng Zou On the Ability of AES S-Boxes to Secure Against Correlation Power Analysis. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF correlation power analysis (CPA), Advanced Encryption Standard (AES), hamming distance, correlation coefficient
1Jianhong Zhang, Jian Mao A Novel Verifiably Encrypted Signature Scheme Without Random Oracle. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jorge Nakahara Jr. A Linear Analysis of Blowfish and Khufu. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Blowfish, Khufu, key-dependent S- boxes, linear cryptanalysis
1Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Masahiko Takenaka, Takashi Yoshioka A Sanitizable Signature Scheme with Aggregation. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Kun Peng, Ed Dawson Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Minghui Zheng, Guohua Cui, Muxiang Yang, Jun Li Scalable Group Key Management Protocol Based on Key Material Transmitting Tree. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF key material, security, scalability, group communication, group key management
1Yanjiang Yang, Robert H. Deng, Feng Bao 0001 Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Yoo-Jin Baek, Ihor Vasyltsov How to Prevent DPA and Fault Attack in a Unified Way for ECC Scalar Multiplication - Ring Extension Method. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Shengli Liu 0001, Kefei Chen, Weidong Qiu Identity-Based Threshold Decryption Revisited. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Peter C. S. Kwan, Glenn Durfee Practical Uses of Virtual Machines for Protection of Sensitive User Data. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Pradeep Kumar Mishra, Pinakpani Pal, Palash Sarkar 0001 Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Cryptosystems. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Elliptic and hyperelliptic curve cryptosystems, divisor addition, divisor doubling, memory, scalar multiplication, explicit formula
1Dong-Guk Han, Sung-Kyoung Kim, Howon Kim 0001, Kyoil Chung, Jongin Lim 0001 Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF left-to-right, right-to-left, Side channel attacks, elliptic curve cryptosystems, pairing-based cryptosystems
1Saeran Kwon, Sang-Ho Lee An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess's Scheme. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jung-Hwa Chae, Nematollaah Shiri Formalization of RBAC Policy with Object Class Hierarchy. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto Some Efficient Algorithms for the Final Exponentiation of eta T Pairing. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ?T pairing, final exponentiation, torus, Tate pairing
1Zuhua Shao On the Sequentiality of Three Optimal Structured Multisignature Schemes. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF structured multisignature, order forge attack, Cryptanalysis, sequentiality
1Jiyong Jang, Taekyoung Kwon 0002, JooSeok Song A Time-Based Key Management Protocol for Wireless Sensor Networks. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Wireless Sensor Network, Security Protocol
1Chunhua Su, Jianying Zhou 0001, Feng Bao 0001, Tsuyoshi Takagi, Kouichi Sakurai Two-Party Privacy-Preserving Agglomerative Document Clustering. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptographic protocol, documents clustering, privacy-preserving
1Xiao Li, Mingxing He A Protocol of Member-Join in a Secret Sharing Scheme. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Xiehua Li, ShuTang Yang, Jian-Hua Li, HongWen Zhu Security Protocol Analysis with Improved Authentication Tests. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Authentication tests, Message type, Neuman-Stubblebine protocol, Improved authentication tests
1Ji Wu 0006, Chaoqun Ye, Shiyao Jin Adversarial Organization Modeling for Network Attack/Defense. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Fenlin Liu, Bin Lu 0003, Xiangyang Luo A Chaos-Based Robust Software Watermarking. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Muhammad Khurram Khan, Jiashu Zhang An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Yoo-Jin Baek, Mi-Jung Noh DPA-Resistant Finite Field Multipliers and Secure AES Design. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Haibin Shen, Jimin Wang, Lingdi Ping, Kang Sun Securing C Programs by Dynamic Type Checking. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hongxia Jin, Jeffery Lotspiech Practical Forensic Analysis in Advanced Access Content System. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Yuan Zhou, Zhenfu Cao, Zhenchuan Chai Identity Based Key Insulated Signature. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Gu Su Kim, Young Ik Eom Domain-Based Mobile Agent Fault-Tolerance Scheme for Home Network Environments. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hao Luo, Binxing Fang, Xiao-chun Yun A Counting-Based Method for Massive Spam Mail Classification. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Yahui Lu, Li Zhang 0065, Yinbo Liu, Jiaguang Sun 0001 Using pi-Calculus to Formalize Domain Administration of RBAC. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Fangyong Hou, Hongjun He, Zhiying Wang 0003, Kui Dai An Efficient Way to Build Secure Disk. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Huafei Zhu, Feng Bao 0001, Tieyan Li, Ying Qiu More on Shared-Scalar-Product Protocols. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Malicious model, shared-scalar-product protocol, provably secure
1Qianhong Wu, Yi Mu 0001, Willy Susilo, Fangguo Zhang Privately Retrieve Data from Large Databases. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi Tackling Worm Detection Speed and False Alarm in Virus Throttling. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Min Feng 0002, Bin B. Zhu, Cunlai Zhao, Shipeng Li 0001 Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Fang Qi, Feng Bao 0001, Tieyan Li, Weijia Jia 0001, Yongdong Wu Preventing Web-Spoofing with Automatic Detecting Security Indicator. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Automatic Detecting Security Indicator, SSL, Web Spoofing
1Seok Lee, Tai-Myung Chung, Myeonggil Choi An Empirical Study of Quality and Cost Based Security Engineering. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Youngtae Yun, Sangseo Park, Yosik Kim, Jaecheol Ryou 0001 A Design and Implementation of Profile Based Web Application Securing Proxy. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Web application, Anomaly detection, Proxy, Hacking
1Zhifei Tao, Hai Jin 0001, Zongfen Han, En Cheng A Novel Dynamic Immunization Strategy for Computer Network Epidemics. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Zhonghua Jiang 0001, Dongdai Lin, Lin Xu, Lei Lin Integrating Grid with Cryptographic Computing. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Zhaohui Cheng, Liqun Chen 0002, Richard Comley, Qiang Tang 0001 Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hyung Chan Kim, Wook Shin, Rudrapatna S. Ramakrishna, Kouichi Sakurai Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang Short (Identity-Based) Strong Designated Verifier Signature Schemes. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF strong designated verifier signature scheme, random oracle model, short signature, identity based, designated verifier signature
1Tianjie Cao, Xianping Mao, Dongdai Lin Security Analysis of a Server-Aided RSA Key Generation Protocol. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Server-aided RSA key generation, Handheld device, Collusion attack
1Jinye Peng, GuangQiang He, Jin Xiong, Guihua Zeng Trojan Horse Attack Strategy on Quantum Private Communication. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ping Wang, Binxing Fang, Xiao-chun Yun Model and Estimation of Worm Propagation Under Network Partition. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ling Dong, Kefei Chen A Practical Clumped-Tree Multicast Encryption Scheme. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Kefei Chen, Robert H. Deng, Xuejia Lai, Jianying Zhou 0001 (eds.) Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Feng Xie, Shuo Bai Using Data Field to Analyze Network Intrusions. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk Linkable Democratic Group Signatures. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Lan Zhou, Willy Susilo, Yi Mu 0001 Three-Round Secret Handshakes Based on ElGamal and DSA. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Oblivious Signature Based Envelope, Hidden Credential, Privacy, Key Exchange, DSA, ElGamal, Secret Handshake
1Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim 0001 Further Security Analysis of XTR. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF XTR public key system, XTR-ISE, differential power analysis
1Jung Wook Lee, Yong Ho Hwang, Pil Joong Lee Efficient Public Key Broadcast Encryption Using Identifier of Receivers. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Baocang Wang, Yupu Hu Diophantine Approximation Attack on a Fast Public Key Cryptosystem. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Simultaneous Diophantine approximation problem, Cryptanalysis, Public-key cryptosystem, Lattice basis reduction, Diophantine approximation
1Xu Liao, Li Zhang 0065, Stephen Chi-fai Chan A Task-Oriented Access Control Model for WfMS. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ahmad-Reza Sadeghi, Christian Stüble Towards Multilateral-Secure DRM Platforms. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mikael Linden, Inka Vilpola An Empirical Study on the Usability of Logout in a Single Sign-on System. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Rasool Jalili, Fatemeh Imani-Mehr, Morteza Amini, Hamid Reza Shahriari Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Robert H. Deng, Feng Bao 0001, HweeHwa Pang, Jianying Zhou 0001 (eds.) Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Xiaoqin Huang, Lin Chen 0020, Linpeng Huang, Minglu Li 0001 An Identity-Based Grid Security Infrastructure Model. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Identity Cryptography, Public Key Infrastructure, Security Group Communication
1Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau A New Class of Codes for Fingerprinting Schemes. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann Risk Assessment of Production Networks Using Honeynets - Some Practical Experience. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau Countermeasures for Preventing Comb Method Against SCA Attacks. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF comb method, pre-computed table, memory space, side channel attacks, Elliptic curve, scalar multiplication
1Frode Hansen, Vladimir A. Oleshchuk Conformance Checking of RBAC Policy and its Implementation. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Zhuowei Li 0001, Amitabha Das, Sabu Emmanuel Model Redundancy vs. Intrusion Detection. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Joseph K. Liu, Duncan S. Wong A Restricted Multi-show Credential System and Its Application on E-Voting. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo Token-Controlled Public Key Encryption. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo An Email Worm Vaccine Architecture. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Zhongchao Yu, Chuk-Yang Seng, Tao Jiang 0004, Xue Wu, William A. Arbaugh Robust Routing in Malicious Environment for Ad Hoc Networks. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Bin Liang, Heng Liu, Wenchang Shi, Yanjun Wu Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Patrick P. Tsang, Victor K. Wei Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yanmei Fang, Limin Gu, Jiwu Huang Performance Analysis of CDMA-Based Watermarking with Quantization Scheme. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Tao Zhang, Mingzeng Hu, Xiao-chun Yun, Yongzheng Zhang 0002 Computer Vulnerability Evaluation Using Fault Tree Analysis. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Philip Robinson, Christian Schaefer, Thomas Walter 0001 POSSET - Policy-Driven Secure Session Transfer. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Zonghua Zhang, Hong Shen 0001 A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Kung Chen, Chih-Mao Huang A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Heejin Park, Sang-Kil Park, Ki-Ryong Kwon, Dong Kyue Kim Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yanjun Wu, Wenchang Shi, Hongliang Liang, Qinghua Shang, Chunyang Yuan, Bin Liang Security On-demand Architecture with Multiple Modules Support. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Wenbao Jiang, Chen Li 0005, Shuang Hao, Yiqi Dai Using Trust for Restricted Delegation in Grid Environments. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1André Adelsbach, Ulrich Huber 0001, Ahmad-Reza Sadeghi Secure Software Delivery and Installation in Embedded Systems. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Zuowen Tan, Zhuojun Liu, Mingsheng Wang On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Kerstin Lemke, Ahmad-Reza Sadeghi, Christian Stüble An Open Approach for Designing Secure Electronic Immobilizers. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Chin-Chen Chang 0001, Chun-Sen Tseng, Chia-Chen Lin 0001 Hiding Data in Binary Images. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen 0001, Yumin Wang t-Out-of-n String/Bit Oblivious Transfers Revisited. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Hany A. Samuel, Yasser H. Dakroury, Hussein I. Shahein Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Security, Peer-to-Peer Networks, Trust Management, Reputation Systems
1Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau Tracing Traitors by Guessing Secrets. The q-Ary Case. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Hågen Hasle, Yngve Kristiansen, Ketil Kintel, Einar Snekkenes Measuring Resistance to Social Engineering. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Information security, Security metrics, Security testing, Vulnerability analysis, Social engineering
1Fangyong Hou, Zhiying Wang 0003, Kui Dai, Yun Liu Protecting Mass Data Basing on Small Trusted Agent. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 901 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license