The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "TrustCom"( http://dblp.L3S.de/Venues/TrustCom )

URL (DBLP): http://dblp.uni-trier.de/db/conf/trustcom

Publication years (Num. hits)
2011 (259) 2012 (292) 2014 (131) 2020 (265) 2021 (213) 2022 (220)
Publication types (Num. hits)
inproceedings(1374) proceedings(6)
Venues (Conferences, Journals, ...)
TrustCom(1380)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 1380 publication records. Showing 1380 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Liang Chen, Kan Chen, Chengcheng Shao, Peidong Zhu SocAware: A Middleware for Social Applications in Online Social Networks. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Baden Delamore, Ryan K. L. Ko Escrow: A Large-Scale Web Vulnerability Assessment Tool. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yong Ho Hwang, Jae Woo Seo, Il Joo Kim Encrypted Keyword Search Mechanism Based on Bitmap Index for Personal Storage Services. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Guorui Li, Ying Liu, Ying Wang 0033 Analysis of the Count-Min Sketch Based Anomaly Detection Scheme in WSN. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wenjuan Li 0001, Weizhi Meng 0001, Zhiyuan Tan 0001, Yang Xiang 0001 Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Weixi Gu, Zheng Yang 0002, Longfei Shangguan, Xiaoyu Ji, Yiyang Zhao ToAuth: Towards Automatic Near Field Authentication for Smartphones. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bin Zhou, Hai Jin 0001, Ran Zheng A High Speed Lossless Compression Algorithm Based on CPU and GPU Hybrid Platform. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jianwei Ding, Yingbo Liu, Li Zhang 0065, Jianmin Wang 0001 MapReduce for Large-Scale Monitor Data Analyses. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Md. Sadek Ferdous, Ron Poet CAFS: A Framework for Context-Aware Federated Services. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zhenwei Zhao, Guoqiang Bai 0001 Ultra High-Speed SM2 ASIC Implementation. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tianyong Ao, Zhangqing He, Jinli Rao, Kui Dai, Xuecheng Zou A Compact Hardware Implementation of SM3 Hash Function. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Chun-Yu Wang, Tzu-Li Tai, Kuan-Chieh Huang, Tse-En Liu, Jyh-Biau Chang, Ce-Kuen Shieh FedLoop: Looping on Federated MapReduce. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ya Tan, Jizeng Wei, Wei Guo 0005 The Micro-architectural Support Countermeasures against the Branch Prediction Analysis Attack. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xuerui Pan, Yibing Zhongyang, Zhi Xin, Bing Mao, Hao Huang Defensor: Lightweight and Efficient Security-Enhanced Framework for Android. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yu Bai 0010, Gang Yin, Huaimin Wang Multi-dimensions of Developer Trustworthiness Assessment in OSS Community. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Frank Zhigang Wang, Theo Dimitrakos, Na Helian, Sining Wu, Yuhui Deng, Ling Li, Rodric Yates Data Interface All-iN-A-Place (DIANA) for Big Data. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michael Weiß, Steffen Wagner, Roland Hellman, Sascha Wessel Integrity Verification and Secure Loading of Remote Binaries for Microkernel-Based Runtime Environments. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fábio Borges, Leonardo A. Martucci, Filipe Beato, Max Mühlhäuser Secure and Privacy-Friendly Public Key Generation and Certification. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yuanlong Cao, Jianfeng Guan, Changqiao Xu, Wei Quan 0001, Hongke Zhang Cognitive Adaptive Access-Control System for a Secure Locator/Identifier Separation Context. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shenglong Ding, Yiming Zhao, Yuyang Liu Efficient Traceable Attribute-Based Signature. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shuai Zhao, Xiaohong Li 0001, Guangquan Xu, Lei Zhang, Zhiyong Feng 0002 Attack Tree Based Android Malware Detection with Hybrid Analysis. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zhangxuan Luo, Guoyan Xu Research of Provenance Storage in Cloud Computing Environment. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Byungho Min, Vijay Varadharajan Design and Analysis of a New Feature-Distributed Malware. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yingxu Wang 0001, Victor J. Wiebe Big Data Analyses for Collective Opinion Elicitation in Social Networks. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hongfeng Chai, Zhijun Lu, Qingyang Meng, Jun Wang, Xiubang Zhang, Zhijian Zhang TEEI - A Mobile Security Infrastructure for TEE Integration. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ahmad A. Kardan, Reza Salarmehr, Azade Farshad SigmoRep: A Robust Reputation Model for Open Collaborative Environments. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hui Xia 0001, Jia Yu 0005, Zhiyong Zhang, Xiangguo Cheng, Zhenkuan Pan 0001 Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ximing Fu, Zhiqing Xiao, Shenghao Yang 0001 Overhead-Free In-Place Recovery Scheme for XOR-Based Storage Codes. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mamoona Naveed Asghar, Mohammad Ghanbari 0001, Martin J. Reed Sufficient Encryption with Codewords and Bin-strings of H.264/SVC. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ismail San, Nuray At On Increasing the Computational Efficiency of Long Integer Multiplication on FPGA. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Graeme Horsman, Christopher Laing, Paul Vickers A Case Based Reasoning Framework for Improving the Trustworthiness of Digital Forensic Investigations. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xiaodong Li, Hong Zhang Research on Cooperative Learning of Digital English Writing in Network Environment. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1M. Ajmal Azad, Ricardo Morla Mitigating SPIT with Social Strength. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jiyoung Kang AR Teleport: Digital Reconstruction of Historical and Cultural-Heritage Sites Using Mobile Augmented Reality. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Muhammad Bilal 0012, M. O. Hussain, Pauline M. L. Chan A Reception Based Node Selection Protocol for Multi-hop Routing in Vehicular Ad-hoc Networks. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Subhash Sagar, Nadeem Javaid, Zahoor Ali Khan, J. Saqib, Ayesha Bibi, Safdar Hussain Bouk Analysis and Modeling Experiment Performance Parameters of Routing Protocols in MANETs and VANETs. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Naruemon Wattanapongsakorn, S. Srakaew, E. Wonghirunsombat, C. Sribavonmongkol, T. Junhom, P. Jongsubsook, Chalermpol Charnsripinyo A Practical Network-Based Intrusion Detection and Prevention System. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Uthman Baroudi, Anas Al-Roubaiey, Samir Mekid, Abdelhafid Bouhraoua The Impact of Sensor Node Distribution on Routing Protocols Performance: A Comparitive Study. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1David Herges, Naim Asaj, Bastian Könings, Florian Schaub, Michael Weber 0001 Ginger: An Access Control Framework for Telematics Applications. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jesse Leskinen Evaluation Criteria for Future Identity Management. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sanat Kumar Bista, Surya Nepal, Cécile Paris Engagement and Cooperation in Social Networks: Do Benefits and Rewards Help? Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jun Ishii, Hiroyuki Maeomichi, Ikuo Yoda Privacy-Preserving Statistical Analysis Method for Real-World Data. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mohd Anuar Mat Isa, Habibah Hashim, Jamalul-lail Ab Manan, Ramlan Mahmod, Hanunah Othman Integrity Verification Architecture (IVA) Based Security Framework for Windows Operating System. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1David Pergament, Armen Aghasaryan, Jean-Gabriel Ganascia Reputation Diffusion Simulation for Avoiding Privacy Violation. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hongjun Dai, Huabo Liu, Zhiping Jia, Tianzhou Chen A Multivariate Classification Algorithm for Malicious Node Detection in Large-Scale WSNs. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yu Shyang Tan, Ryan K. L. Ko, Peter Jagadpramana, Chun Hui Suen, Markus Kirchberg, Teck Hooi Lim, Bu-Sung Lee, Anurag Singla, Ken Mermoud, Doron Keller, Ha Duc Tracking of Data Leaving the Cloud. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ying Kong, Yuqing Zhang 0001, Zhejun Fang, Qixu Liu Static Detection of Logic Vulnerabilities in Java Web Applications. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Fahd Al-Haidari, Mohammed H. Sqalli, Khaled Salah 0001 Enhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP Addresses. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Thomas Stimpson, Lu Liu 0001, Yongzhao Zhan An Investigation into the Evolution of Security Usage in Home Wireless Networks. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yongji Yu, Zhiping Jia, Ruihua Zhang Prediction-Based Algorithm for Event Detection in Wireless Sensor Networks. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Arshad Jhumka, Matthew Bradbury, Matthew Leeke Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alexander V. Uskov Information Security of IPsec-based Mobile VPN: Authentication and Encryption Algorithms Performance. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Martin Peters, Christopher Brink, Sabine Sachweh Including Metadata into an Ontology Based Pervasive Computing Architecture. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith 0001 Confidentiality as a Service - Usable Security for the Cloud. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Guicheng Shen, Bingwu Liu Research on Embedding ECC into RFID Authentication Protocol. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yue Li, Dehua Chen, Thomas Newe Formal Verification of a Key Agreement Protocol for Wireless Sensor Networks. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sheu M. A. Mavee, Elizabeth Marie Ehlers A Multi-agent Immunologically-inspired Model for Critical Information Infrastructure Protection - An Immunologically-inspired Conceptual Model for Security on the Power Grid. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Guoyan Zhang, Lei Liu, Yang Liu An Attribute-Based Encryption Scheme Secure against Malicious KGC. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Stefan Hofbauer, Kristian Beckers, Gerald Quirchmayr, Christoph Sorge A Lightweight Privacy Preserving Approach for Analyzing Communication Records to Prevent VoIP Attacks Using Toll Fraud as an Example. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Haibin Zhang, Yan Wang 0002, Xiuzhen Zhang 0001 Efficient Contextual Transaction Trust Computation in E-commerce Environments. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yong Wang 0028, Ting-Ting Zhang, Hong-Zong Li, Long-Ping He, Jing Peng Efficient Privacy Preserving Matchmaking for Mobile Social Networking against Malicious Users. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Deepak Pai, Sasi Inguva, Phani Shekhar Mantripragada, Mudit Malpani, Nitin Aggarwal Padati: A Robust Pedestrian Dead Reckoning System on Smartphones. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Linlin Tian, Mingchu Li, Weifeng Sun, Xiaowei Zhao 0003, Baohui Wang, Jianhua Ma Evolution of Cooperation Based on Reputation on Dynamical Networks. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Cunqing Ma, Jingqiang Lin, Yuewu Wang, Ming Shang Offline RFID Grouping Proofs with Trusted Timestamps. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hao Yin, Heungsun Chang, Fangming Liu, Tongyu Zhan, Ying Zhang, Bo Li 0001 Discovering a Large Scale Internet Topology: Complementary and Contrast View. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jin Huang, Zhexin Xu, Weikai Xu, Lin Wang 0003 Error Performance Analysis of Opportunistic Relaying System Based on DCSK. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1S. Nayyef, Charalampos Tsimenidis, Arafat Al-Dweik, Bayan S. Sharif, Ali Hazmi Time- and Frequency-Domain Impulsive Noise Spreader for OFDM Systems. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Liqun Chen 0002 Ring Group Signatures. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Murat Sensoy, Jeff Z. Pan, Achille Fokoue, Mudhakar Srivatsa, Felipe Meneguzzi Using Subjective Logic to Handle Uncertainty and Conflicts. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Haichang Gao, Wei Wang, Ye Fan Divide and Conquer: An Efficient Attack on Yahoo! CAPTCHA. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Khodor Hamandi, Farah Saab, Ayman I. Kayssi Enhanced Multi-rate Multicast for Optimal User Satisfaction and Efficient Bandwidth Utilization. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Zhichun Wang, Rongfang Bie, Mingquan Zhou Hybrid Ontology Matching for Solving the Heterogeneous Problem of the IoT. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ismail Adel Al-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Kuo-Ping Wu, Ching-Hao Mao, Te-En Wei, Shyi-Ming Chen RedJsod: A Readable JavaScript Obfuscation Detector Using Semantic-based Analysis. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xuan Huang 0003, Geoffrey Lund, Andrew Sapeluk Development of a Typing Behaviour Recognition Mechanism on Android. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Natasa Zivic Security Aspects of Soft Verified Messages Protected by Message Authentication Codes. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hui Lin 0007, Jia Hu 0001, Atulya Nagar, Li Xu 0002 Role Based Privacy-Aware Secure Routing in WMNs. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Qijun Gu, Wanyu Zang, Meng Yu 0001, Peng Liu 0005 Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Rennie Archibald, Dipak Ghosal A Covert Timing Channel Based on Fountain Codes. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes A Privacy Preserving Application Acquisition Protocol. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Fan Xu, Shen Li, Zhiying Wang 0003 HVD-TLS: A Novel Framework of Thread Level Speculation. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mahmoud Hashem Eiza, Qiang Ni A Reliability-Based Routing Scheme for Vehicular Ad Hoc Networks (VANETs) on Highways. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xue Chen, Chao Wu A Text Representation Method Based on Harmonic Series. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Cunqing Ma, Jingqiang Lin, Yuewu Wang Efficient Missing Tag Detection in a Large RFID System. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lingchen Zhang, Luning Xia, Zongbin Liu, Jiwu Jing, Yuan Ma Evaluating the Optimized Implementations of SNOW3G and ZUC on FPGA. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Su Chen, Yi Chen 0018, Hai Jiang 0003, Laurence Tianruo Yang, Kuan-Ching Li A Secure Distributed File System Based on Revised Blakley's Secret Sharing Scheme. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Muhammad Bashir Abdullahi, Guojun Wang 0001 A Lightweight Anonymous On-demand Routing Scheme in Wireless Sensor Networks. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Quang-Anh Tran, Frank Jiang 0001, Jiankun Hu A Real-Time NetFlow-based Intrusion Detection System with Improved BBNN and High-Frequency Field Programmable Gate Arrays. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak 0001, Miroslaw Kutylowski Restricted Identification without Group Keys. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ismail Mansour, Gérard Chalhoub, Bassem Bakhache Evaluation of a Fast Symmetric Cryptographic Algorithm Based on the Chaos Theory for Wireless Sensor Networks. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Diogo Lima, Hugo Miranda Flow-Aware Broadcasting Algorithm. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Matthew Areno, Jim Plusquellic Securing Trusted Execution Environments with PUF Generated Secret Keys. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Menghui Yang, Yongzhong Zou, Li Fang Collision and Detection Performance with Three Overlap Signal Collisions in Space-Based AIS Reception. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1René Hummen, Jan Henrik Ziegeldorf, Tobias Heer, Hanno Wirtz, Klaus Wehrle SEAMS: A Signaling Layer for End-Host-Assisted Middlebox Services. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Vijay Varadharajan, Udaya Kiran Tupakula TREASURE: Trust Enhanced Security for Cloud Environments. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Minoru Nakayama, Masashi Fujimoto Chronological Accommodation of Oculo-motors in Response to Varying Sizes of Visual Stimuli. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jehad Al-Sadi The Load Balancing Problem in Extended OTIS-n-Cube Interconnection Networks. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yu Chen 0008, Zheng Yan 0002 Gemini: A Handbag for Pervasive Social Communications. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Fei Wang 0007, Xiaofeng Wang 0002, Jinshu Su, Bin Xiao 0001 VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tom Kirkham, Django Armstrong, Karim Djemame, Marcelo Corrales, Mariam Kiran, Iheanyi Nwankwo, Ming Jiang, Nikolaus Forgó Assuring Data Privacy in Cloud Transformations. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 1380 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license