The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Malicious with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1990 (17) 1991-1994 (15) 1995-1996 (19) 1997 (16) 1998 (34) 1999 (27) 2000 (47) 2001 (76) 2002 (100) 2003 (164) 2004 (264) 2005 (382) 2006 (463) 2007 (508) 2008 (584) 2009 (410) 2010 (169) 2011 (158) 2012 (173) 2013 (182) 2014 (208) 2015 (229) 2016 (261) 2017 (276) 2018 (369) 2019 (348) 2020 (394) 2021 (441) 2022 (395) 2023 (443) 2024 (125)
Publication types (Num. hits)
article(2248) book(8) data(5) incollection(29) inproceedings(4933) phdthesis(62) proceedings(12)
Venues (Conferences, Journals, ...)
CoRR(363) MALWARE(192) IACR Cryptol. ePrint Arch.(98) IEEE Access(90) ACSAC(85) CCS(70) Comput. Secur.(61) ICC(58) ARES(55) SAC(50) RAID(43) DSN(39) GLOBECOM(37) Sensors(37) ICDCS(35) Wirel. Pers. Commun.(35) More (+10 of total 1903)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3452 occurrences of 1510 keywords

Results
Found 7297 publication records. Showing 7297 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
11Kyeongmo Park The Role of Secret Sharing in the Distributed MARE Protocols. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Gunhee Lee, Wonil Kim, Dong-Kyoo Kim An Effective Method for Location Privacy in Ubiquitous Computing. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Mi-Ae Kim, Kil-Sang Yoo, Won-Hyung Lee Fragile Watermarking Scheme for Accepting Image Compression. Search on Bibsonomy EUC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Min Zuo, Kai Wang, Jianhua Li 0001 The Application of Collaborative Filtering for Trust Management in P2P Communities. Search on Bibsonomy ISPA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Collaborative filtering, P2P, Trust management, Reputation system
11Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant Semantics-Aware Malware Detection. Search on Bibsonomy S&P The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11So Young Lee, O-Hoon Kwon, Jong Kim 0001, Sung Je Hong A Trust Management Scheme in Structured P2P Systems. Search on Bibsonomy AP2PC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Loubna Mekouar, Youssef Iraqi, Raouf Boutaba Handling Free Riders in Peer-to-Peer Systems. Search on Bibsonomy AP2PC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Luis von Ahn, Nicholas J. Hopper, John Langford 0001 Covert two-party computation. Search on Bibsonomy STOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF covert computation, fair two-party computation, two-party computation, steganography
11So Young Lee, O-Hoon Kwon, Jong Kim 0001, Sung Je Hong A Reputation Management System in Structured Peer-to-Peer Networks. Search on Bibsonomy WETICE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Roberto Aringhieri Assessing Efficiency of Trust Management in Peer-to-Peer Systems. Search on Bibsonomy WETICE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Ruo Ando, Yoshiyasu Takefuji Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF self-debugging mode, real-time nullification, debug register, improved debug exception handler, branchIP recorder
11Shanyu Zhao, Virginia Mary Lo, Chris GauthierDickey Result Verification and Trust-Based Scheduling in Peer-to-Peer Grids. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Peer-to-Peer, Grid Computing, Trust, Reputation System, Result Verification
11Yinghong Fan, Hossam S. Hassanein, Patrick Martin 0001 Proactive control of distributed denial of service attacks with source router preferential dropping. Search on Bibsonomy AICCSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Keisuke Ishibashi, Tsuyoshi Toyono, Katsuyasu Toyama, Masahiro Ishino, Haruhiko Ohshima, Ichiro Mizukoshi Detecting mass-mailing worm infected hosts by mining DNS traffic data. Search on Bibsonomy MineNet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF mass-mailing worm, data mining, domain name system
11Lotfi Benachenhou, Samuel Pierre A New Protocol for Protecting a Mobile Agent Using a Reference Clone. Search on Bibsonomy MATA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Hyun-Mi Kim, Ik-Hwan Cho, A-Young Cho, Dong-Seok Jeong Semi-fragile Watermarking Algorithm for Detection and Localization of Temper Using Hybrid Watermarking Method in MPEG-2 Video. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Jiazhu Dai, Huaikou Miao D_DIPS: An Intrusion Prevention System for Database Security. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Jonathon T. Giffin, Mihai Christodorescu, Louis Kruger Strengthening Software Self-Checksumming via Self-Modifying Code. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Meng Yu 0001, Wanyu Zang, Peng Liu 0005 Defensive Execution of Transactional Processes against Attacks. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11David A. Wheeler Countering Trusting Trust through Diverse Double-Compiling. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Douglas H. Summerville, Victor A. Skormin, Alexander Volynkin, James Moronski Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Ching Lin, Vijay Varadharajan, Yan Wang 0002 Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security. Search on Bibsonomy TrustBus The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Yanxiang He, Wei Chen 0006, Min Yang 0001, Wenling Peng Ontology Based Cooperative Intrusion Detection System. Search on Bibsonomy NPC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Alexey Smirnov 0001, Tzi-cker Chiueh A Portable Implementation Framework for Intrusion-Resilient Database Management Systems. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Mujtaba Khambatti, Partha Dasgupta, Kyung Dong Ryu A Role-Based Trust Model for Peer-to-Peer Communities and Dynamic Coalitions. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Dynamic Coalitions, Communities, Peer-to-Peer, Trust
11Adam L. Young, Moti Yung A Subliminal Channel in Secret Block Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11V. Anil Kumar, Dorgham Sisalem TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection. Search on Bibsonomy CIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Neil Vachharajani, Matthew J. Bridges, Jonathan Chang, Ram Rangan, Guilherme Ottoni, Jason A. Blome, George A. Reis, Manish Vachharajani, David I. August RIFLE: An Architectural Framework for User-Centric Information-Flow Security. Search on Bibsonomy MICRO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Ning Jiang, Kien A. Hua, Mounir A. Tantaoui Collaboration Enforcement and Adaptive Data Redirection in Mobile Ad Hoc Networks Using Only First-Hand Experience. Search on Bibsonomy MWCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Collaboration enforcement, First-hand experience, Mobile Ad Hoc Network, Reputation
11Antonio Nicolosi, David Mazières Secure Acknowledgment of Multicast Messages in Open Peer-to-Peer Networks. Search on Bibsonomy IPTPS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Long Qin, Si Duanfeng, Han Xinhui, Zou Wei A Hybrid Security Framework of Mobile Code. Search on Bibsonomy COMPSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Abhilash Gummadi, Jong P. Yoon Modeling Group Trust For Peer-to-Peer Access Control. Search on Bibsonomy DEXA Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Peer-to-peer security, Secure Groups, Role based access control
11Zheng Liu, Xue Li 0001, Zhaoyang Dong Multimedia authentication with sensor-based watermarking. Search on Bibsonomy MM&Sec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF fuzzy identification system, authentication, fragile watermarking
11Qinglin Jiang, Douglas S. Reeves, Peng Ning Certificate Recommendations to Improve the Robustness of Web of Trust. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF PGP keyrings, Authentication, certificates, graph connectivity
11Loubna Mekouar, Youssef Iraqi, Raouf Boutaba A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems. Search on Bibsonomy DSOM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Indrakshi Ray, Ross M. McConnell, Monte Lunacek, Vijay Kumar 0002 Reducing Damage Assessment Latency in Survivable Databases. Search on Bibsonomy BNCOD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Yan-Cheng Chang Single Database Private Information Retrieval with Logarithmic Communication. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Michael J. Freedman, Kobbi Nissim, Benny Pinkas Efficient Private Matching and Set Intersection. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Gagan Aggarwal, Nina Mishra, Benny Pinkas Secure Computation of the k th-Ranked Element. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11John Page, Arkady B. Zaslavsky, Maria Indrawan Countering Agent Security Vulnerabilities using an Extended SENSE Schema. Search on Bibsonomy IAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Meng Yu 0001, Peng Liu 0005, Wanyu Zang Self-Healing Workflow Systems under Attacks. Search on Bibsonomy ICDCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Manuel Costa, Miguel Castro 0001, Antony I. T. Rowstron, Peter B. Key PIC: Practical Internet Coordinates for Distance Estimation. Search on Bibsonomy ICDCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Mark G. Pleszkoch, Richard C. Linger Improving Network System Security with Function Extraction Technology for Automated Calculation of Program Behavior. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Hyungjick Lee, Jim Alves-Foss, Scott Harrison The Use of Encrypted Functions for Mobile Agent Security. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Mi-Ae Kim, Geun-Sil Song, Won-Hyung Lee A Robust Image Authentication Method Surviving Acceptable Modifications. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Francesco Palmieri 0002 A Scalable PKI for Secure Routing in the Internet. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Todd S. Sproull, John W. Lockwood Distributed Instrusion Prevention in Active and Extensible Networks. Search on Bibsonomy IWAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Lingyu Wang 0001, Sushil Jajodia, Duminda Wijesekera Securing OLAP Data Cubes Against Privacy Breaches. Search on Bibsonomy S&P The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Shou-Chuan Lai, Wen-Chu Kuo, Mu-Cheng Hsie Defending against Internet Worm-like Infestations. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Jonathan Katz, Rafail Ostrovsky Round-Optimal Secure Two-Party Computation. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné Detecting and Proving Manipulation Attacks in Mobile Agent Systems. Search on Bibsonomy MATA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Arun Lakhotia, Eric Uday Kumar Abstracting Stack to Detect Obfuscated Calls in Binaries. Search on Bibsonomy SCAM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Hisashi Kojima, Ikuya Morikawa, Yuko Nakayama, Yuji Yamaoka Cozilet: Transparent Encapsulation to Prevent Abuse of Trusted Applets. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Yehuda Lindell Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. Search on Bibsonomy J. Cryptol. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Constant-round protocols, Coin-tossing, Secure computation
11Sapon Tanachaiwiwat, Pinalkumar Dave, Rohan Bhindwale, Ahmed Helmy Secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks. Search on Bibsonomy SenSys The full citation details ... 2003 DBLP  DOI  BibTeX  RDF secure location, trust routing, sensor networks, location awareness
11Sepandar D. Kamvar, Mario T. Schlosser, Hector Garcia-Molina The Eigentrust algorithm for reputation management in P2P networks. Search on Bibsonomy WWW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF distributed eigenvector computation, peer-to-peer, reputation
11Luncheng Lin, Bashar Nuseibeh, Darrel C. Ince, Michael Jackson 0001, Jonathan D. Moffett Introducing Abuse Frames for Analysing Security Requirements. Search on Bibsonomy RE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Bernd Lamparter, Dirk Westhoff A Low-Cost Packet Originator Verification for Metering at Access-Routers. Search on Bibsonomy Networked Group Communication The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Packet originator verification, wireless last hop, charging support, unpredictable bits
11Tieyan Li, Yongdong Wu Trust on Web Browser: Attack vs. Defense. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Akira Kawaguchi, Stewart Russell, Guoliang Qian Security Issues in the Development of a Wireless Blood-Glucose Monitoring System. Search on Bibsonomy CBMS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Sung Kim, Farokh B. Bastani, I-Ling Yen, Ing-Ray Chen High-Assurance Synthesis of Security Services from Basic Microservices. Search on Bibsonomy ISSRE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Microservices, Software architecture, Software composition, Security service
11Takuo Watanabe, Kiyoshi Yamada, Naoyuki Nagatou Towards a Specification Scheme for Context-Aware Security Policies for Networked Appliances. Search on Bibsonomy WSTFES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Seung-Hyun Seo, Sang-Ho Lee A Secure Mobile Agent System Using Multi-signature Scheme in Electronic Commerce. Search on Bibsonomy Human.Society@Internet 2003 The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Multi-signature scheme, Mobile agent system
11Gaeil Ahn, Kiyoung Kim, Jongsoo Jang MF (Minority First) Scheme for defeating Distributed Denial of Service Attacks. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Yichen Xie 0001, Andy Chou, Dawson R. Engler ARCHER: using symbolic, path-sensitive analysis to detect memory access errors. Search on Bibsonomy ESEC / SIGSOFT FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF memory access errors, security, static analysis, error detection, buffer overflow, buffer overrun
11Hsueh-Yi Sean Lin, Hong-Yuan Mark Liao, Chun-Shien Lu, Ja-Chen Lin Authentication of 3-D Polygonal Meshes. Search on Bibsonomy IWDW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Serge Vaudenay The Security of DSA and ECDSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur Topology-Based Detection of Anomalous BGP Messages. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Christopher Krügel, Thomas Toth Using Decision Trees to Improve Signature-Based Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Masayuki Abe, Hideki Imai Flaws in Some Robust Optimistic Mix-Nets. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Marco Conti, Enrico Gregori, Gaia Maselli Towards Reliable Forwarding for Ad Hoc Networks. Search on Bibsonomy PWC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11J. Krishna Murthy 0002 A Functional Decomposition of Virus and Worm Programs. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Giovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer A Stateful Intrusion Detection System for World-Wide Web Servers. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Security, World-Wide Web, Intrusion Detection
11Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang 0009, Olivier Nimeskern, Chia-Wei Hu A Behavior-Based Approach to Securing Email Systems. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Paolo Maggi, Riccardo Sisto A configurable mobile agent data protection protocol. Search on Bibsonomy AAMAS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF mobile agents, data integrity, cryptographic protocols, data authenticity
11Vishal Mittal, Giovanni Vigna Sensor-based intrusion detection for intra-domain distance-vector routing. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF intrusion detection, network topology, routing security
11Robert H. Deng, Jianying Zhou 0001, Feng Bao 0001 Defending against redirect attacks in mobile IP. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF mobile IP security, redirect attack, secure binding update, mobile IP, authenticated key-exchange
11Ronald A. Skoog, Nicholas Jasinski, Mark A. Shayman, Rana Ghahremanpour, Mehdi Kalantari Network management and control mechanisms to prevent maliciously induced network instability. Search on Bibsonomy NOMS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Jaeyeon Jung, Balachander Krishnamurthy, Michael Rabinovich Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites. Search on Bibsonomy WWW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF content distribution network performance, web workload characterization, World Wide Web (WWW), flash crowd, denial of service attack
11Adrian Spalka, Hanno Langweg Notes on Application-Orientated Access Control. Search on Bibsonomy DEXA Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Junquan Hu, Jiwu Huang, Daren Huang, Yun Q. Shi 0001 A DWT-Based Fragile Watermarking Tolerant of JPEG Compression. Search on Bibsonomy IWDW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Serge Lefranc, David Naccache Cut-&-Paste Attacks with JAVA. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11William S. Harrison, Axel W. Krings, Nadine Hanebutte, Miles McQueen On the Performance of a Survivability Architecture for Networked Computing Systems. Search on Bibsonomy HICSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF performance, survivability, agent systems
11Nader H. Bshouty, Lynn Burroughs Bounds for the Minimum Disagreement Problem with Applications to Learning Theory. Search on Bibsonomy COLT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Klaus Kursawe Optimistic Byzantine Agreement. Search on Bibsonomy SRDS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Kim Potter Kihlstrom, Louise E. Moser, P. M. Melliar-Smith The SecureRing group communication system. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF group communication, survivability, intrusion, Byzantine faults, partial synchrony, state machine replication
11Ching-Yung Lin, Shih-Fu Chang SARI: self-authentication-and-recovery image watermarking system. Search on Bibsonomy ACM Multimedia The full citation details ... 2001 DBLP  DOI  BibTeX  RDF authentication, watermarking, recovery, information hiding, multimedia security
11Jung-Min Kang, Wook Shin, C.-G. Park, Dong-Ik Lee Extended BLP Security Model Based on Process Reliability for Secure Linux Kernel. Search on Bibsonomy PRDC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11Yehuda Lindell Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11Peng Liu 0005 DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Database Security, Intrusion Tolerance, Isolation
11Uwe G. Wilhelm, Sebastian Staamann, Levente Buttyán A Pessimistic Approach to Trust in Mobile Agent Platforms. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
11Donald E. Brown, Louise F. Gunderson, Marc H. Evans Interactive Analysis of Computer Crimes. Search on Bibsonomy Computer The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
11Jay J. Wylie, Michael W. Bigrigg, John D. Strunk, Gregory R. Ganger, Han Kiliççöte, Pradeep K. Khosla Survivable Information Storage Systems. Search on Bibsonomy Computer The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
11Thomas Hardjono RP-Based Multicast Receiver Access Control in PIM-SM. Search on Bibsonomy NETWORKING The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
11Yosi Mass, Onn Shehory Distributed Trust in Open Multi-agent Systems. Search on Bibsonomy Trust in Cyber-societies The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
11Chun-Shien Lu, Hong-Yuan Mark Liao Structural digital signature for image authentication: an incidental distortion resistant scheme. Search on Bibsonomy ACM Multimedia Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF fragility, authentication, robustness, wavelet transform, digital signature
11Tzi-cker Chiueh, Harish Sankaran, Anindya Neogi Spout: A Transparent Distributed Execution Engine for Java Applets. Search on Bibsonomy ICDCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
11Neeran M. Karnik, Anand R. Tripathi A Security Architecture for Mobile Agents in Ajanta. Search on Bibsonomy ICDCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
11Marc Dacier, O. Sami Saydjari Special Seminar: Intrusion Detection. Search on Bibsonomy FTCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 7297 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license