The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ISC"( http://dblp.L3S.de/Venues/ISC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/isw

Publication years (Num. hits)
2001 (38) 2002 (39) 2003 (34) 2004 (37) 2005 (39) 2006 (46) 2007 (30) 2008 (34) 2009 (39) 2010 (36) 2011 (27) 2012 (25) 2013 (65) 2014 (73) 2015 (70) 2016 (53) 2017 (49) 2018 (49) 2019 (42) 2020 (52) 2021 (47) 2022 (49) 2023 (52)
Publication types (Num. hits)
inproceedings(990) proceedings(35)
Venues (Conferences, Journals, ...)
ISC(1025)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 348 occurrences of 264 keywords

Results
Found 1025 publication records. Showing 1025 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski Provable Unlinkability Against Traffic Analysis Already After O(log(n)) Steps! Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ke Xu, Stephen R. Tate Universally Composable Secure Mobile Agent Computation. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Elisa Bertino, Elena Ferrari, Giovanni Mella An XML-Based Approach to Document Flow Verification. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ginger Myles, Christian S. Collberg Detecting Software Theft via Whole Program Path Birthmarks. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF copyright protection, software piracy, software birthmark
1Michael Backes 0001, Dennis Hofheinz How to Break and Repair a Universally Composable Signature Functionality. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Dimitar P. Guelev, Mark Ryan 0001, Pierre-Yves Schobbens Model-Checking Access Control Policies. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Monica Chew, J. D. Tygar Image Recognition CAPTCHAs. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Tsuyoshi Takagi, Sung-Ming Yen, Bo-Ching Wu Radix-r Non-Adjacent Form. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF radix-r representation, signed window method, elliptic curve cryptosystem, pairing based cryptosystem, Non-adjacent form
1Kelly Heffner, Christian S. Collberg The Obfuscation Executive. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Elisa Bertino, Teodoro Leggieri, Evimaria Terzi Securing DBMS: Characterizing and Detecting Query Floods. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Mark Foster, Joseph N. Wilson, Shigang Chen Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Guilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-Jae Moon Security Analysis of Two Signcryption Schemes. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF digital signature, encryption, Signcryption
1Xiaofeng Chen 0001, Fangguo Zhang, Kwangjo Kim Chameleon Hashing Without Key Exposure. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Raphael Chung-Wei Phan, Helena Handschuh On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Akashi Satoh, Sumio Morioka Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1José Luis Vivas, José A. Montenegro, Javier López 0001 Towards a Business Process-Driven Framework for Security Engineering with the UML. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Takeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto A Fast Signature Scheme Based on New On-line Computation. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Natsuki Ishida, Shin'ichiro Matsuo, Wakaha Ogata Divisible Voting Scheme. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Secure electronic voting and homomorphic encryption
1Hyejoung Yoo, Hyungwoo Lee, Sangjin Lee 0002, Jongin Lim 0001 Designated Verification of Non-invertible Watermark. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Feng Bao 0001 Security Analysis of a Password Authenticated Key Exchange Protocol. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar Easy Verifiable Primitives and Practical Public Key Cryptosystems. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Toru Akishita, Tsuyoshi Takagi Zero-Value Point Attacks on Elliptic Curve Cryptosystem. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF addition formula, zero-value register, side channel attack, differential power analysis, elliptic curve cryptosystem
1Javier Herranz, Carles Padró, Germán Sáez Distributed RSA Signature Schemes for General Access Structures. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Peter James Leadbitter, Nigel P. Smart Analysis of the Insecurity of ECMQV with Partially Known Nonces. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Paul C. van Oorschot Revisiting Software Protection. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Sigrid Gürgens, Carsten Rudolph, Holger Vogt On the Security of Fair Non-repudiation Protocols. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1David A. Wagner 0001 Cryptanalysis of an Algebraic Privacy Homomorphism. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Hongxia Jin, Jeffery Lotspiech Proactive Software Tampering Detection. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai The Role of Arbiters in Asymmetric Authentication Schemes. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Yongdong Wu Zero-Distortion Authentication Watermarking. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Tomasz Tyksinski Foundations of Differential Cryptanalysis in Abelian Groups. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Laurent Bussard, Yves Roudier, Roger Kilian-Kehr, Stefano Crosta Trust and Authorization in Pervasive B2E Scenarios. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt, Kaoru Kurosawa, Tri Van Le Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Chun Ruan, Vijay Varadharajan, Yan Zhang 0003 A Logic Model for Temporal Authorization Delegation with Negation. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Tuomas Aura Cryptographically Generated Addresses (CGA). Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Colin Boyd, Wenbo Mao (eds.) Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Adrian Baldwin, Simon Shiu Enabling Shared Audit Data. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Tri Van Le, Mike Burmester, Jiangyi Hu Short c-Secure Fingerprinting Codes. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF collusion secure, Fingerprinting, copyright protection
1Ueli M. Maurer Intrinsic Limitations of Digital Signatures and How to Cope with Them. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Andreas Pashalidis, Chris J. Mitchell Single Sign-On Using Trusted Platforms. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF TCPA, authentication, single sign-on
1Tim Kindberg, Kan Zhang Validating and Securing Spontaneous Associations between Wireless Devices. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle The Design and Implementation of Protocol-Based Hidden Key Recovery. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle A Note on Weak Keys of PES, IDEA, and Some Extended Variants. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Pramod Ramarao, Akhilesh Tyagi, Gyungho Lee Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploits. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Birgit Pfitzmann, Michael Waidner Reactively Secure Signature Schemes. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Shunsuke Araki A Nyberg-Rueppel Signature for Multiple Messages and Its Batch Verification. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Michael T. Goodrich, Roberto Tamassia, Jasminka Hasic An Efficient Dynamic and Distributed Cryptographic Accumulator. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Hiroaki Kikuchi Oblivious Counter and Majority Protocol. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Liqun Chen 0002, Keith Harrison, Andrew Moss, David Soldera, Nigel P. Smart Certification of Public Keys within an Identity Based System. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Guillermo Navarro 0001, Sergi Robles, Joan Borrell Role-Based Access Control for E-commerce Sea-of-Data Applications. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger A Realistic Protocol for Multi-party Certified Electronic Mail. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Soonhak Kwon, Heuisu Ryu Efficient Bit Serial Multiplication Using Optimal Normal Bases of Type II in GF (2m). Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF bit serial multiplication, optimal normal basis of type II, Finite field, dual basis
1Shoko Yonezawa, Goichiro Hanaoka, Junji Shikata, Hideki Imai Traceability Schemes for Signed Documents. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen, Peter Bellows, Jaroslav Flidr, Tom Lehman, Brian Schott Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Weidong Qiu, Kefei Chen, Dawu Gu A New Offline Privacy Protecting E-cash System with Revokable Anonymity. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF revokable anonymity, fair off-line system, Privacy protecting, E-Cash, electronic payment
1Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang 0004, Jeremy K.-P. Chen Quantifying Privacy Leakage through Answering Database Queries. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Value of information, Privacy, Data table, Quantitative model, Decision logic
1Nam-Yeun Kim, Dae-Ghon Kho, Kee-Young Yoo Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2m). Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1José R. M. Monteiro, Ricardo Dahab An Attack on a Protocol for Certified Delivery. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Alban Gabillon, Manuel Munier, Jean-Jacques Bascou, Laurent Gallon, Emmanuel Bruno An Access Control Model for Tree Data Structures. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Access Control, Security Policy, Tree Data Structures, Permission, Authorization Rule
1Nicolás González-Deleito, Olivier Markowitch Exclusion-Freeness in Multi-party Exchange Protocols. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Wai Han Soo, Azman Samsudin, Alwyn Goh Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF mental card game, Benes permutation network, Shuffle, mix-net
1Ed Dawson, Javier López 0001, José A. Montenegro, Eiji Okamoto A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli Automated Analysis of Some Security Mechanisms of SCEP. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Heejin Jang, Sangwook Kim Real-Time Intruder Tracing through Self-Replication. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Jiande Zheng A New Public Key Cryptosystem for Constrained Hardware. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai An Anonymous Loan System Based on Group Signature Scheme. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Group Signature, Privacy Protection, Optimistic Protocol, Timed-release Encryption, Anonymity Revocation
1Emmanuel Bresson, Jacques Stern Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Helger Lipmaa On Optimal Hash Tree Traversal for Interval Time-Stamping. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF interval time-stamping, Laplace's method for integrals, Analysis of algorithms, tree traversal, implementation complexity
1Akashi Satoh, Sumio Morioka Small and High-Speed Hardware Architectures for the 3GPP Standard Cipher KASUMI. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Masayuki Abe, Koutarou Suzuki Receipt-Free Sealed-Bid Auction. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF bid-rigging, receipt-free, chameleon bit-commitment, Sealed-bid auction
1John S. Baras, Maben Rabi Intrusion Detection with Support Vector Machines and Generative Models. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Katsuyuki Okeya, Kouichi Sakurai A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Higher-Order DPA Attack, Second-Order DPA Attack, Möller's Countermeasure, Side Channel Attacks, Differential Power Analysis, Elliptic Curve Cryptosystems
1Bodo Möller Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Agnes Hui Chan, Virgil D. Gligor (eds.) Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Yuji Watanabe, Masayuki Numao Conditional Cryptographic Delegation for P2P Data Sharing. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Kahil Jallad, Jonathan Katz, Bruce Schneier Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Taekyoung Kwon 0002 On the Difficulty of Protecting Private Keys in Software. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Josep Domingo-Ferrer A Provably Secure Additive and Multiplicative Privacy Homomorphism. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Encrypted data processing, Delegation of computing and data, E-gambling, Cryptography, Multilevel security, Privacy homomorphisms
1Apollònia Martínez Nadal, Josep Lluís Ferrer-Gomila Comments to the UNCITRAL Model Law on Electronic Signatures. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Vanesa Daza, Javier Herranz, Carles Padró, Germán Sáez A Distributed and Computationally Secure Key Distribution Scheme. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Feng Zhu, Duncan S. Wong, Agnes Hui Chan, Robbie Ye Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Helger Lipmaa Fast Software Implementations of SC2000. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Block cipher design, large S-boxes, SC2000, fast implementation
1Yasuyuki Sakai, Kouichi Sakurai Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Elliptic Curve Cryptosystems, Scalar Multiplication
1Marcel Fernandez, Miguel Soriano Fingerprinting Concatenated Codes with Efficient Identification. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Ismael Jiménez Calvo, Germán Sáez Approximate Power Roots in Zm. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  BibTeX  RDF
1Sofia K. Tzelepi, George Pangalos A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systems. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Antonio Ruiz-Martínez, Gregorio Martínez Pérez, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta SPEED Protocol: Smartcard-Based Payment with Encrypted Electronic Delivery. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Elisa Bertino, Barbara Carminati, Elena Ferrari A Secure Publishing Service for Digital Libraries of XML Documents. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Sigrid Gürgens, Javier López 0001 Suitability of a Classical Analysis Method for E-commerce Protocols. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF electronic commerce, cryptographic protocol, Security analysis, automatic theorem proving, protocol validation
1Dmitri Asonov, Markus Schaal, Johann Christoph Freytag Absolute Privacy in Voting. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi Hyppocrates. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Jae Seung Lee, Sang-Choon Kim Design of the Decision Support System for Network Security Management to Secure Enterprise Network. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang 0004 A Logical Model for Privacy Protection. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Privacy, Epistemic logic, Data table
1Mark Chapman, George I. Davida, Marc Rennhard A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Liqun Chen 0002, Wenbo Mao An Auditable Metering Scheme for Web Advertisement Applications. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Auditable metering, Tamper-resistant software, Lightweight security, Web advertisement
1George I. Davida, Yair Frankel (eds.) Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Fumitaka Hoshino, Masayuki Abe, Tetsutaro Kobayashi Lenient/Strict Batch Verification in Several Groups. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 1025 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license