|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 123 occurrences of 109 keywords
|
|
|
Results
Found 901 publication records. Showing 901 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Andrew Brown 0005, Mark Ryan 0001 |
Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jihwan Lim, Heekuck Oh, Sangjin Kim |
A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
Authentication, RFID, User Privacy |
1 | William J. Caelli |
Application Security - Myth Or Reality? |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
OSI security, access control, web services security, mandatory access control, security education, application security, operating system security |
1 | Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen |
Certificate Based (Linkable) Ring Signature. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
Certificate Based, Ring Signature, Linkability |
1 | Di Ma |
Secure Feedback Service in Wireless Sensor Networks. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
Feedback Service, ACK aggregation, ACK implosion, Sensor network, Authentication, MAC, Bloom Filter |
1 | Ed Dawson, Duncan S. Wong (eds.) |
Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Lucas Chi Kwong Hui, Kam-Pui Chow, Siu-Ming Yiu |
Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper). |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
digital crimes, forensics technology, Computer forensics |
1 | Zhen Cao, Zhi Guan, Zhong Chen 0001, Jian-bin Hu, Liyong Tang |
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Robert H. Deng, Yanjiang Yang |
Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Gaoli Wang |
Related-Key Rectangle Attack on 43-Round SHACAL-2. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
SHACAL-2, Differential characteristic, Block cipher, Related-Key Rectangle attack |
1 | Miyuki Uno, Mikio Kano |
Visual Cryptography Schemes with Dihedral Group Access Structure for Many Images. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
diheadral group, many secret images, visual cryptography, visual secret sharing, VSS, VCS |
1 | Zhenglin Liu, Xu Guo, Yi-Cheng Chen, Yu Han, Xuecheng Zou |
On the Ability of AES S-Boxes to Secure Against Correlation Power Analysis. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
correlation power analysis (CPA), Advanced Encryption Standard (AES), hamming distance, correlation coefficient |
1 | Jianhong Zhang, Jian Mao |
A Novel Verifiably Encrypted Signature Scheme Without Random Oracle. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jorge Nakahara Jr. |
A Linear Analysis of Blowfish and Khufu. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
Blowfish, Khufu, key-dependent S- boxes, linear cryptanalysis |
1 | Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Masahiko Takenaka, Takashi Yoshioka |
A Sanitizable Signature Scheme with Aggregation. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Kun Peng, Ed Dawson |
Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Minghui Zheng, Guohua Cui, Muxiang Yang, Jun Li |
Scalable Group Key Management Protocol Based on Key Material Transmitting Tree. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
key material, security, scalability, group communication, group key management |
1 | Yanjiang Yang, Robert H. Deng, Feng Bao 0001 |
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Yoo-Jin Baek, Ihor Vasyltsov |
How to Prevent DPA and Fault Attack in a Unified Way for ECC Scalar Multiplication - Ring Extension Method. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Shengli Liu 0001, Kefei Chen, Weidong Qiu |
Identity-Based Threshold Decryption Revisited. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Peter C. S. Kwan, Glenn Durfee |
Practical Uses of Virtual Machines for Protection of Sensitive User Data. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Pradeep Kumar Mishra, Pinakpani Pal, Palash Sarkar 0001 |
Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Cryptosystems. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
Elliptic and hyperelliptic curve cryptosystems, divisor addition, divisor doubling, memory, scalar multiplication, explicit formula |
1 | Dong-Guk Han, Sung-Kyoung Kim, Howon Kim 0001, Kyoil Chung, Jongin Lim 0001 |
Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
left-to-right, right-to-left, Side channel attacks, elliptic curve cryptosystems, pairing-based cryptosystems |
1 | Saeran Kwon, Sang-Ho Lee |
An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess's Scheme. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jung-Hwa Chae, Nematollaah Shiri |
Formalization of RBAC Policy with Object Class Hierarchy. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto |
Some Efficient Algorithms for the Final Exponentiation of eta T Pairing. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
?T pairing, final exponentiation, torus, Tate pairing |
1 | Zuhua Shao |
On the Sequentiality of Three Optimal Structured Multisignature Schemes. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
structured multisignature, order forge attack, Cryptanalysis, sequentiality |
1 | Jiyong Jang, Taekyoung Kwon 0002, JooSeok Song |
A Time-Based Key Management Protocol for Wireless Sensor Networks. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
Wireless Sensor Network, Security Protocol |
1 | Chunhua Su, Jianying Zhou 0001, Feng Bao 0001, Tsuyoshi Takagi, Kouichi Sakurai |
Two-Party Privacy-Preserving Agglomerative Document Clustering. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
cryptographic protocol, documents clustering, privacy-preserving |
1 | Xiao Li, Mingxing He |
A Protocol of Member-Join in a Secret Sharing Scheme. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Xiehua Li, ShuTang Yang, Jian-Hua Li, HongWen Zhu |
Security Protocol Analysis with Improved Authentication Tests. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
Authentication tests, Message type, Neuman-Stubblebine protocol, Improved authentication tests |
1 | Ji Wu 0006, Chaoqun Ye, Shiyao Jin |
Adversarial Organization Modeling for Network Attack/Defense. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Fenlin Liu, Bin Lu 0003, Xiangyang Luo |
A Chaos-Based Robust Software Watermarking. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Khurram Khan, Jiashu Zhang |
An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Yoo-Jin Baek, Mi-Jung Noh |
DPA-Resistant Finite Field Multipliers and Secure AES Design. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Haibin Shen, Jimin Wang, Lingdi Ping, Kang Sun |
Securing C Programs by Dynamic Type Checking. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Hongxia Jin, Jeffery Lotspiech |
Practical Forensic Analysis in Advanced Access Content System. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Yuan Zhou, Zhenfu Cao, Zhenchuan Chai |
Identity Based Key Insulated Signature. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Gu Su Kim, Young Ik Eom |
Domain-Based Mobile Agent Fault-Tolerance Scheme for Home Network Environments. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Hao Luo, Binxing Fang, Xiao-chun Yun |
A Counting-Based Method for Massive Spam Mail Classification. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Yahui Lu, Li Zhang 0065, Yinbo Liu, Jiaguang Sun 0001 |
Using pi-Calculus to Formalize Domain Administration of RBAC. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Fangyong Hou, Hongjun He, Zhiying Wang 0003, Kui Dai |
An Efficient Way to Build Secure Disk. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Huafei Zhu, Feng Bao 0001, Tieyan Li, Ying Qiu |
More on Shared-Scalar-Product Protocols. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
Malicious model, shared-scalar-product protocol, provably secure |
1 | Qianhong Wu, Yi Mu 0001, Willy Susilo, Fangguo Zhang |
Privately Retrieve Data from Large Databases. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi |
Tackling Worm Detection Speed and False Alarm in Virus Throttling. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Min Feng 0002, Bin B. Zhu, Cunlai Zhao, Shipeng Li 0001 |
Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Fang Qi, Feng Bao 0001, Tieyan Li, Weijia Jia 0001, Yongdong Wu |
Preventing Web-Spoofing with Automatic Detecting Security Indicator. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
Automatic Detecting Security Indicator, SSL, Web Spoofing |
1 | Seok Lee, Tai-Myung Chung, Myeonggil Choi |
An Empirical Study of Quality and Cost Based Security Engineering. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Youngtae Yun, Sangseo Park, Yosik Kim, Jaecheol Ryou 0001 |
A Design and Implementation of Profile Based Web Application Securing Proxy. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
Web application, Anomaly detection, Proxy, Hacking |
1 | Zhifei Tao, Hai Jin 0001, Zongfen Han, En Cheng |
A Novel Dynamic Immunization Strategy for Computer Network Epidemics. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Zhonghua Jiang 0001, Dongdai Lin, Lin Xu, Lei Lin |
Integrating Grid with Cryptographic Computing. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Zhaohui Cheng, Liqun Chen 0002, Richard Comley, Qiang Tang 0001 |
Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Hyung Chan Kim, Wook Shin, Rudrapatna S. Ramakrishna, Kouichi Sakurai |
Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang |
Short (Identity-Based) Strong Designated Verifier Signature Schemes. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
strong designated verifier signature scheme, random oracle model, short signature, identity based, designated verifier signature |
1 | Tianjie Cao, Xianping Mao, Dongdai Lin |
Security Analysis of a Server-Aided RSA Key Generation Protocol. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
Server-aided RSA key generation, Handheld device, Collusion attack |
1 | Jinye Peng, GuangQiang He, Jin Xiong, Guihua Zeng |
Trojan Horse Attack Strategy on Quantum Private Communication. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ping Wang, Binxing Fang, Xiao-chun Yun |
Model and Estimation of Worm Propagation Under Network Partition. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ling Dong, Kefei Chen |
A Practical Clumped-Tree Multicast Encryption Scheme. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Kefei Chen, Robert H. Deng, Xuejia Lai, Jianying Zhou 0001 (eds.) |
Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Feng Xie, Shuo Bai |
Using Data Field to Analyze Network Intrusions. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk |
Linkable Democratic Group Signatures. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Lan Zhou, Willy Susilo, Yi Mu 0001 |
Three-Round Secret Handshakes Based on ElGamal and DSA. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
Oblivious Signature Based Envelope, Hidden Credential, Privacy, Key Exchange, DSA, ElGamal, Secret Handshake |
1 | Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim 0001 |
Further Security Analysis of XTR. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
XTR public key system, XTR-ISE, differential power analysis |
1 | Jung Wook Lee, Yong Ho Hwang, Pil Joong Lee |
Efficient Public Key Broadcast Encryption Using Identifier of Receivers. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Baocang Wang, Yupu Hu |
Diophantine Approximation Attack on a Fast Public Key Cryptosystem. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
Simultaneous Diophantine approximation problem, Cryptanalysis, Public-key cryptosystem, Lattice basis reduction, Diophantine approximation |
1 | Xu Liao, Li Zhang 0065, Stephen Chi-fai Chan |
A Task-Oriented Access Control Model for WfMS. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad-Reza Sadeghi, Christian Stüble |
Towards Multilateral-Secure DRM Platforms. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Mikael Linden, Inka Vilpola |
An Empirical Study on the Usability of Logout in a Single Sign-on System. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Rasool Jalili, Fatemeh Imani-Mehr, Morteza Amini, Hamid Reza Shahriari |
Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Robert H. Deng, Feng Bao 0001, HweeHwa Pang, Jianying Zhou 0001 (eds.) |
Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoqin Huang, Lin Chen 0020, Linpeng Huang, Minglu Li 0001 |
An Identity-Based Grid Security Infrastructure Model. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
Identity Cryptography, Public Key Infrastructure, Security Group Communication |
1 | Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau |
A New Class of Codes for Fingerprinting Schemes. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann |
Risk Assessment of Production Networks Using Honeynets - Some Practical Experience. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati |
Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau |
Countermeasures for Preventing Comb Method Against SCA Attacks. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
comb method, pre-computed table, memory space, side channel attacks, Elliptic curve, scalar multiplication |
1 | Frode Hansen, Vladimir A. Oleshchuk |
Conformance Checking of RBAC Policy and its Implementation. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Zhuowei Li 0001, Amitabha Das, Sabu Emmanuel |
Model Redundancy vs. Intrusion Detection. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Joseph K. Liu, Duncan S. Wong |
A Restricted Multi-show Credential System and Its Application on E-Voting. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo |
Token-Controlled Public Key Encryption. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo |
An Email Worm Vaccine Architecture. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Zhongchao Yu, Chuk-Yang Seng, Tao Jiang 0004, Xue Wu, William A. Arbaugh |
Robust Routing in Malicious Environment for Ad Hoc Networks. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Bin Liang, Heng Liu, Wenchang Shi, Yanjun Wu |
Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Patrick P. Tsang, Victor K. Wei |
Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yanmei Fang, Limin Gu, Jiwu Huang |
Performance Analysis of CDMA-Based Watermarking with Quantization Scheme. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Tao Zhang, Mingzeng Hu, Xiao-chun Yun, Yongzheng Zhang 0002 |
Computer Vulnerability Evaluation Using Fault Tree Analysis. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Philip Robinson, Christian Schaefer, Thomas Walter 0001 |
POSSET - Policy-Driven Secure Session Transfer. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Zonghua Zhang, Hong Shen 0001 |
A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Kung Chen, Chih-Mao Huang |
A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Heejin Park, Sang-Kil Park, Ki-Ryong Kwon, Dong Kyue Kim |
Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yanjun Wu, Wenchang Shi, Hongliang Liang, Qinghua Shang, Chunyang Yuan, Bin Liang |
Security On-demand Architecture with Multiple Modules Support. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Wenbao Jiang, Chen Li 0005, Shuang Hao, Yiqi Dai |
Using Trust for Restricted Delegation in Grid Environments. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | André Adelsbach, Ulrich Huber 0001, Ahmad-Reza Sadeghi |
Secure Software Delivery and Installation in Embedded Systems. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Zuowen Tan, Zhuojun Liu, Mingsheng Wang |
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Kerstin Lemke, Ahmad-Reza Sadeghi, Christian Stüble |
An Open Approach for Designing Secure Electronic Immobilizers. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Chin-Chen Chang 0001, Chun-Sen Tseng, Chia-Chen Lin 0001 |
Hiding Data in Binary Images. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen 0001, Yumin Wang |
t-Out-of-n String/Bit Oblivious Transfers Revisited. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Hany A. Samuel, Yasser H. Dakroury, Hussein I. Shahein |
Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
Security, Peer-to-Peer Networks, Trust Management, Reputation Systems |
1 | Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau |
Tracing Traitors by Guessing Secrets. The q-Ary Case. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Hågen Hasle, Yngve Kristiansen, Ketil Kintel, Einar Snekkenes |
Measuring Resistance to Social Engineering. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
Information security, Security metrics, Security testing, Vulnerability analysis, Social engineering |
1 | Fangyong Hou, Zhiying Wang 0003, Kui Dai, Yun Liu |
Protecting Mass Data Basing on Small Trusted Agent. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #801 - #900 of 901 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|