The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SEC"( http://dblp.L3S.de/Venues/SEC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/edge

Publication years (Num. hits)
1992 (38) 1993 (33) 1996 (49) 1997 (38) 1998-2000 (54) 2001 (33) 2002 (46) 2003 (52) 2004 (36) 2005 (41) 2006 (46) 2007 (47) 2008 (54) 2009 (39) 2010 (28) 2011 (27) 2012 (54) 2013 (32) 2014 (42) 2015 (43) 2016 (66) 2017 (75) 2018 (82) 2019 (92) 2020 (93) 2021 (81) 2022 (106) 2023 (79) 2024 (1)
Publication types (Num. hits)
inproceedings(1470) proceedings(37)
Venues (Conferences, Journals, ...)
SEC(1507)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 28 occurrences of 27 keywords

Results
Found 1507 publication records. Showing 1507 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Gurpreet Dhillon, Tiago Oliveira 0001, Santa R. Susarapu, Mário M. Caldeira When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ronald Dodge, Kathryn Coronges, Ericka Rovira Empirical Benefits of Training to Phishing Susceptibility. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alexios Mylonas, Vasilis Meletiadis, Bill Tsoumas, Lilian Mitrou, Dimitris Gritzalis Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shuzhe Yang, Gökhan Bal Balancing Security and Usability of Local Security Mechanisms for Mobile Devices. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shaoying Cai, Yingjiu Li, Yunlei Zhao Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nineta Polemi, Theodoros Ntouskas Open Issues and Proposals in the IT Security Management of Commercial Ports: The S-PORT National Case. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Christian Banse, Dominik Herrmann, Hannes Federrath Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical Feasibility. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alexandre B. Augusto, Manuel Eduardo Correia OFELIA - A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati Support for Write Privileges on Outsourced Data. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sofia-Anna Menesidou, Vasilios Katos Authenticated Key Exchange (AKE) in Delay Tolerant Networks. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke A Response Strategy Model for Intrusion Response Systems. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ella Kolkowska, Bart De Decker Analyzing Value Conflicts for a Work-Friendly ISS Policy Implementation. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Joan Boyar, René Peralta 0001 A Small Depth-16 Circuit for the AES S-Box. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Milica Milutinovic, Vincent Naessens, Bart De Decker Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth System. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Vrizlynn L. L. Thing, Hwei-Ming Ying Enhanced Dictionary Based Rainbow Table. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xin Kang 0001, Yongdong Wu Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management Approach. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Massimo Ficco, Massimiliano Rak Intrusion Tolerance of Stealth DoS Attacks to Web Services. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yolanta Beres, Jonathan Griffin Optimizing Network Patching Policy Decisions. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sarah Nait Bahloul, Emmanuel Coquery, Mohand-Said Hacid Authorization Policies for Materialized Views. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Baozeng Ding, Fufeng Yao, Yanjun Wu, Yeping He Improving Flask Implementation Using Hardware Assisted In-VM Isolation. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ruben Rios, Jose Antonio Onieva, Javier López 0001 HIDE_DHCP: Covert Communications through Network Configuration Messages. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yulong Zhang, Min Li, Kun Bai, Meng Yu 0001, Wanyu Zang Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Christos Grompanopoulos, Ioannis Mavridis Towards Use-Based Usage Control. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Giuseppe D'Acquisto, Marta Flamini, Maurizio Naldi A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Tarik Moataz, Xavier Rimasson Handling Stateful Firewall Anomalies. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis, Sotiris Ioannidis Towards a Universal Data Provenance Framework Using Dynamic Instrumentation. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Marianthi Theoharidou, Alexios Mylonas, Dimitris Gritzalis A Risk Assessment Method for Smartphones. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Weihan Li, Brajendra Panda, Qussai Yaseen Malicious Users' Transactions: Tackling Insider Threat. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Olga Gadyatskaya, Fabio Massacci, Anton Philippov Security-by-Contract for the OSGi Platform. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yannis Soupionis, Miltiadis Kandias Web Services Security Assessment: An Authentication-Focused Approach. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shuhao Li, Xiao-chun Yun, Zhiyu Hao, Yongzheng Zhang 0002, Xiang Cui, Yipeng Wang 0001 Modeling Social Engineering Botnet Dynamics across Multiple Social Networks. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Guillaume Barbu, Christophe Giraud 0001, Vincent Guerin Embedded Eavesdropping on Java Card. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Giampaolo Bella, Lizzie Coles-Kemp Layered Analysis of Security Ceremonies. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hyundo Park, Sung-Oh David Jung, Heejo Lee, Hoh Peter In Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ioannis Psaroudakis, Vasilios Katos, Pavlos S. Efraimidis A Framework for Anonymizing GSM Calls over a Smartphone VoIP Network. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Feifei Wang, Ping Chen 0003, Bing Mao, Li Xie 0001 RandHyp: Preventing Attacks via Xen Hypercall Interface. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou (eds.) Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Bernhard J. Berger, Karsten Sohr An Approach to Detecting Inter-Session Data Flow Induced by Object Pooling. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi, Luigi Logrippo A Framework for Threat Assessment in Access Control Systems. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yongge Wang Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1George Drosatos, Aimilia Tasidou, Pavlos S. Efraimidis Privacy-Preserving Television Audience Measurement Using Smart TVs. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michael Roland 0001, Josef Langer, Josef Scharinger Relay Attacks on Secure Element-Enabled Mobile Devices - Virtual Pickpocketing Revisited. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alessandro Armando, Alessio Merlo, Mauro Migliardi, Luca Verderame Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures). Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg, Wouter Joosen HyperForce: Hypervisor-enForced Execution of Security-Critical Code. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Andreas Leicher, Andreas U. Schmidt, Yogendra Shah Smart OpenID: A Smart Card Based OpenID Protocol. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Simone Fischer-Hübner, Yuko Murayama, Armand Portmann, Carlos Rieder (eds.) Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Daniel Le Métayer, Guillaume Piolle Delegation of Obligations and Responsibility. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ann Cavoukian Patience, Persistence, and Faith: Evolving the Gold Standard in Privacy and Data Protection. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ge Zhang 0001 Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sebastien Mondet, Ion Alberdi, Thomas Plagemann Generating Optimised and Formally Checked Packet Parsing Code. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alessandro Armando, Roberto Carbone, Luca Compagna, Jorge Cuéllar, Giancarlo Pellegrino, Alessandro Sorniotti From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure? Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jonathan-Christofer Demay, Frédéric Majorczyk, Eric Totel, Frédéric Tronel Detecting Illegal System Calls Using a Data-Oriented Detection Model. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mirko Montanari, Ellick Chan, Kevin Larson, Wucherl Yoo, Roy H. Campbell Distributed Security Policy Conformance. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hongxia Jin, Jeffrey B. Lotspiech Piracy Protection for Streaming Content in Home Networks. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Raz Abramov, Amir Herzberg TCP Ack Storm DoS Attacks. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Benjamin Kellermann Privacy-Enhanced Web-Based Event Scheduling with Majority Agreement. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sven Patzina, Lars Patzina, Andy Schürr Extending LSCs for Behavioral Signature Modeling. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ella Kolkowska, Gurpreet Dhillon Organizational Power and Information Security Rule Compliance. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Felix C. Freiling, Sebastian Schinzel Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Amir Alsbih, Felix C. Freiling, Christian Schindelhauer A Case Study in Practical Security of Cable Networks. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Pádraig O'Sullivan, Kapil Anand, Aparna Kotha, Matthew Smithson, Rajeev Barua, Angelos D. Keromytis Retrofitting Security in COTS Software with Binary Rewriting. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Margot Brereton Ceremony Analysis: Strengths and Weaknesses. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Stefan Taubenberger, Jan Jürjens, Yijun Yu, Bashar Nuseibeh Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sandeep N. Bhatt, William G. Horne, Prasad Rao On Computing Enterprise IT Risk Metrics. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hiroaki Kikuchi, Daisuke Kagawa, Anirban Basu, Kazuhiko Ishii, Masayuki Terada, Sadayuki Hongo Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Paul Baecher, Niklas Büscher, Marc Fischlin, Benjamin Milde Breaking reCAPTCHA: A Holistic Approach via Shape Recognition. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kai Rannenberg, S. H. (Basie) von Solms, Leon Strous IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nwokedi C. Idika, Bharat K. Bhargava A Kolmogorov Complexity Approach for Measuring Attack Path Complexity. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mohd Zalisham Jali, Steven Furnell, Paul Dowland 0001 Quantifying the Effect of Graphical Password Guidelines for Better Security. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dimitrios Damopoulos, Georgios Kambourakis, Stefanos Gritzalis iSAM: An iPhone Stealth Airborne Malware. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ping Chen 0003, Yi Fang, Bing Mao, Li Xie 0001 JITDefender: A Defense against JIT Spraying Attacks. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Reto E. Koenig, Rolf Haenni, Stephan Fischli Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes. Search on Bibsonomy SEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Johan Van Niekerk, Rossouw von Solms Research Methodologies in Information Security Research: The Road Ahead. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Martin Mink, Rainer Greifeneder Evaluation of the Offensive Approach in Information Security Education. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Karin Hedström, Gurpreet Dhillon, Fredrik Karlsson 0001 Using Actor Network Theory to Understand Information Security Management. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Omar Hasan, Lionel Brunie, Elisa Bertino k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jonas Magazinius, Alejandro Russo, Andrei Sabelfeld On-the-fly Inlining of Dynamic Security Monitors. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1William J. Caelli, Lam-for Kwok, Dennis Longley A Business Continuity Management Simulator. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ejaz Ahmed, George M. Mohay, Alan Tickle, Sajal Bhatia Use of IP Addresses for High Rate Flooding Attack Detection. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Scott E. Coull, Andrew M. White 0002, Ting-Fang Yen, Fabian Monrose, Michael K. Reiter Understanding Domain Registration Abuses. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sascha Hauke, Martin Pyka, Markus Borschbach, Dominik Heider Augmenting Reputation-Based Trust Metrics with Rumor-Like Dissemination of Reputation Information. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Christian Kahl, Katja Böttcher, Markus Tschersich, Stephan Heim, Kai Rannenberg How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde Mining Business-Relevant RBAC States through Decomposition. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Asadul K. Islam, Malcolm Corney, George M. Mohay, Andrew J. Clark, Shane Bracher, Tobias Raub, Ulrich Flegel Fraud Detection in ERP Systems Using Scenario Matching. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Gideon Myles, Hongxia Jin A Metric-Based Scheme for Evaluating Tamper Resistant Software Systems. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hua Wang 0002, Lili Sun, Vijay Varadharajan Purpose-Based Access Control Policies and Conflicting Analysis. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1C. C. Terence Tan, Anthonie B. Ruighaver, Atif Ahmad Information Security Governance: When Compliance Becomes More Important than Security. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Rostyslav Barabanov, Stewart Kowalski Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dongdong Sun, Colin Boyd, Juan Manuel González Nieto Delegation in Predicate Encryption Supporting Disjunctive Queries. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mark Stegelmann Towards Fair Indictment for Data Collection with Self-Enforcing Privacy. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jorn Lapon, Markulf Kohlweiss, Bart De Decker, Vincent Naessens Performance Analysis of Accumulator-Based Revocation Mechanisms. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kai Rannenberg, S. H. (Basie) von Solms, Leon Strous IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Clemens Orthacker, Martin Centner, Christian Kittl Qualified Mobile Server Signature. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1S. H. (Basie) von Solms The 5 Waves of Information Security - From Kristian Beckman to the Present. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Markus Huber 0001, Martin Mulazzani, Edgar R. Weippl Who on Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Julian Schütte, Nicolai Kuntze, Andreas Fuchs 0002, Atta Badii Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems. Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 1507 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license