The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SEC"( http://dblp.L3S.de/Venues/SEC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/edge

Publication years (Num. hits)
1992 (38) 1993 (33) 1996 (49) 1997 (38) 1998-2000 (54) 2001 (33) 2002 (46) 2003 (52) 2004 (36) 2005 (41) 2006 (46) 2007 (47) 2008 (54) 2009 (39) 2010 (28) 2011 (27) 2012 (54) 2013 (32) 2014 (42) 2015 (43) 2016 (66) 2017 (75) 2018 (82) 2019 (92) 2020 (93) 2021 (81) 2022 (106) 2023 (79) 2024 (1)
Publication types (Num. hits)
inproceedings(1470) proceedings(37)
Venues (Conferences, Journals, ...)
SEC(1507)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 28 occurrences of 27 keywords

Results
Found 1507 publication records. Showing 1507 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Kai Rannenberg, Vijay Varadharajan, Christian Weber (eds.) Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings Search on Bibsonomy SEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Amir Herzberg, Haya Schulmann, Amitabh Saxena, Bruno Crispo Towards a Theory of White-Box Security. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nathan L. Clarke, Sevasti Karatzouni, Steven Furnell Flexible and Transparent User Authentication for Mobile Devices. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Joachim Biskup, Jan-Hendrik Lochner, Sebastian Sonntag Optimization of the Controlled Evaluation of Closed Relational Queries. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shay Gueron, Jean-Pierre Seifert On the Impossibility of Detecting Virtual Machine Monitors. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Thomas Brandstetter, Konstantin Knorr, Ute Rosenbaum A Structured Security Assessment Methodology for Manufacturers of Critical Infrastructure Components. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security Assessment Methodology, NERC CIP, Security Assessment Plan, Risk Analysis, Critical Infrastructure, Cyber Security
1Andreas Fuchs 0002, Sigrid Gürgens, Carsten Rudolph On the Security Validation of Integrated Security Solutions. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hongxia Jin, Jeffery Lotspiech Broadcast Encryption for Differently Privileged. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Quan Pham, Jason Reid, Adrian McCullagh, Ed Dawson On a Taxonomy of Delegation. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Puneet Gupta, Scott D. Stoller Verification of Security Policy Enforcement in Enterprise Systems. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mayla Brusò, Agostino Cortesi Non-repudiation Analysis with LySa. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yannis Soupionis, George Tountas, Dimitris Gritzalis Audio CAPTCHA for SIP-Based VoIP. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde Mining Stable Roles in RBAC. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Gerald Stefan Kostmajer, Herbert Stögner, Andreas Uhl Custom JPEG Quantization for Improved Iris Recognition Accuracy. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Andreas Leicher, Nicolai Kuntze, Andreas U. Schmidt Implementation of a Trusted Ticket System. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jan Paul Kolter, Thomas Kernchen, Günther Pernul Collaborative Privacy - A Community-Based Privacy Infrastructure. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Anas Abou El Kalam, Philippe Balbiani A Policy Language for Modelling Recommendations. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer Discovering Application-Level Insider Attacks Using Symbolic Execution. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yannis Mallios, Sudeep Modi, Aditya Agarwala, Christina Johns Persona: Network Layer Anonymity and Accountability for Next Generation Internet. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Lucas Nussbaum, Pierre Neyron, Olivier Richard On Robust Covert Channels Inside DNS. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Amir Herzberg Combining Authentication, Reputation and Classification to Make Phishing Unprofitable. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ahmad Samer Wazan, Romain Laborde, David W. Chadwick, François Barrère, Abdelmalek Benzekri Which Web Browsers Process SSL Certificates in a Standardized Way? Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sandra Steinbrecher, Stephan Groß, Markus Meichau Jason: A Scalable Reputation System for the Semantic Web. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secure semantic web, privacy-preserving data management, secure information integration, Trust management, identity management, reputation system
1Felix Leder, Peter Martini NGBPA Next Generation BotNet Protocol Analysis. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jorge Blasco Alís, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda, Miguel A. Orellana-Quiros Steganalysis of Hydan. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Dimitris Gritzalis, Javier López 0001 (eds.) Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde A Probabilistic Bound on the Basic Role Mining Problem and Its Applications. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yianna Danidou, Burkhard Schafer 0001 In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Marcel Fernandez, Josep Cotrina Navau, Miguel Soriano, Neus Domingo On the IPP Properties of Reed-Solomon Codes. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Christoph Benzmüller Automating Access Control Logics in Simple Type Theory with LEO-II. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ryan Farley, Xinyuan Wang 0005 Roving Bugnet: Distributed Surveillance Threat and Mitigation. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Abdullatif Shikfa, Melek Önen, Refik Molva Privacy-Preserving Content-Based Publish/Subscribe Networks. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Carlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo De Santis, Sara Foresti, Stefano Paraboschi, Pierangela Samarati Efficient Key Management for Enforcing Access Control in Outsourced Scenarios. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mohammad Ashiqur Rahaman, Yves Roudier, Philip Miseldine, Andreas Schaad Ontology-Based Secure XML Content Distribution. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Guillermo Navarro-Arribas, Joaquín García-Alfaro A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Pieter Verhaeghe, Jorn Lapon, Bart De Decker, Vincent Naessens, Kristof Verslype Security and Privacy Improvements for the Belgian eID Technology. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka How to Bootstrap Security for Ad-Hoc Network: Revisited. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Herbert Leitold, Reinhard Posch, Thomas Rössler Media-Break Resistant eSignatures in eGovernment: An Austrian Experience. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Li Yao, Ning Zhang 0001 A Generic Authentication LoA Derivation Model. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Alessandro Sorniotti, Refik Molva A Provably Secure Secret Handshake with Dynamic Controlled Matching. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Alessandro Piva, Claudio Orlandi, Michele Caini, Tiziano Bianchi, Mauro Barni Enhancing Privacy in Remote Data Classification. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Slim Rekhis, Jihène Krichène, Noureddine Boudriga DigForNet: Digital Forensic in Networking. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Thomas Scheffler, Stefan Geiß, Bettina Schnor An Implementation of a Privacy Enforcement Scheme based on the Java Security Framework using XACML Policies. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Shaun Posthumus, Rossouw von Solms Agency Theory: Can it be Used to Strengthen IT Governance?. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Nouha Oualha, Melek Önen, Yves Roudier A Security Protocol for Self-Organizing Data Storage. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Cormac Herley, Dinei A. F. Florêncio Protecting Financial Institutions from Brute-Force Attacks. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Roberto Battistoni, Alessandro Di Biagio, Roberto Di Pietro, Matteo Formica, Luigi V. Mancini A Live Digital Forensic system for Windows networks. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Giorgio Davanzo, Eric Medvet, Alberto Bartoli A Comparative Study of Anomaly Detection Techniques in Web Site Defacement Detection. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Nicoletta Dessì, Maria Grazia Fugini, R. A. Balachandar Policies and Security Aspects For Distributed Scientific Laboratories. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jeheon Han, Jonghoon Kwon, Heejo Lee HoneyID : Unveiling Hidden Spywares by Generating Bogus Events. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Wei Li 0021, Lingyu Wang 0001, Bo Zhu 0001, Lei Zhang 0004 An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Gail-Joon Ahn, Moonam Ko, Mohamed Shehab Portable User-Centric Identity Management. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Dennis Longley, Mark Branagan, William J. Caelli, Lam-for Kwok Feasibility of Automated Information Security Compliance Auditing. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Aris Gkoulalas-Divanis, Vassilios S. Verykios A Parallelization Framework for Exact Knowledge Hiding in Transactional Databases. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Exact knowledge hiding, Binary integer programming, Parallelization, Constraints satisfaction problems
1Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke Investigating the problem of IDS false alarms: An experimental study using Snort. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intrusion Detection System, Snort, False Alarm
1Nora Cuppens-Boulahia, Frédéric Cuppens, Diala Abi Haidar, Hervé Debar Negotiation of Prohibition: An Approach Based on Policy Rewriting. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Maurizio Adriano Strangio Establishing secure links in low-rate wireless personal area networks. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Stelios Dritsas, Yannis Soupionis, Marianthi Theoharidou, Yannis Mallios, Dimitris Gritzalis SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Kristof Verslype, Bart De Decker Ubiquitous Privacy-Preserving Identity Managment. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Qutaibah Althebyan, Brajendra Panda A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1George O. M. Yee, Larry Korba, Ronggong Song Assessing the Likelihood of Privacy Policy Compliance. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Samuel N. Hamilton, Wendy L. Hamilton Adversary Modeling and Simulation in Cyber Warfare. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Carlo Bellettini, Julian L. Rrushi A Product Machine Model for Anomaly Detection of Interposition Attacks on Cyber-Physical Systems. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yngve Espelid, Lars-Helge Netland, André N. Klingsheim, Kjell Jørgen Hole Robbing Banks with Their Own Software-an Exploit Against Norwegian Online Banks. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jianying Zhou 0001, Tanmoy Kanti Das, Javier López 0001 An Asynchronous Node Replication Attack in Wireless Sensor Networks. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Node Replication Attack, Distributed Detection Protocol, Wireless Sensor Network Security
1Florian Kerschbaum Practical Privacy-Preserving Benchmarking. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao User Session Modeling for Effective Application Intrusion Detection. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sushil Jajodia, Pierangela Samarati, Stelvio Cimato (eds.) Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy Search on Bibsonomy SEC The full citation details ... 2008 DBLP  BibTeX  RDF
1Patrick P. Tsang, Sean W. Smith YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Daniel Le Métayer, Claire Loiseaux ASTRA : A Security Analysis Method Based on Asset Tracking. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Joonsang Baek, Han Chiang Tan, Jianying Zhou 0001, Jun Wen Wong Realizing Stateful Public Key Encryption in Wireless Sensor Network. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Salem Benferhat, Karim Tabia Classification features for detecting Server-side and Client-side Web attacks. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Frédéric Dadeau, Marie-Laure Potet, Régis Tissot A B Formal Framework for Security Developments in the Domain of Smart Card Applications. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Conformance Relation, Access Control, Traceability, Security Model, B Method, Common Criteria
1Karsten Nohl, David Evans 0001 Hiding in Groups: On the Expressiveness of Privacy Distributions. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Hongxia Jin, Jeffery Lotspiech, Nimrod Megiddo Efficient Coalition Detection in Traitor Tracing. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Thomas Neubauer, Andreas Ekelhart, Stefan Fenz Interactive Selection of ISO 27001 Controls under Multiple Objectives. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Dongwon Seo, Heejo Lee, Ejovi Nuwere Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Muntaha Alawneh, Imad M. Abbadi Software Licence Protection and Management for Organisations. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Frédéric Majorczyk, Eric Totel, Ludovic Mé, Ayda Saïdane Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF COTS diversity, anomaly diagnosis, graph similarity, anomaly detection, design diversity
1Po-Yuan Teng, Shih-I Huang, Adrian Perrig Multi-Layer Encryption for Multi-Level Access Control in Wireless Sensor Networks. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Michele Colajanni, Daniele Gozzi, Mirco Marchetti Collaborative architecture for malware detection and analysis. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis A new Accounting Mechanism for Modern and Future AAA Services. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yongdong Wu, Haixia Yao, Feng Bao 0001 Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello Leveraging Lattices to Improve Role Mining. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Indrajit Ray, Sudip Chakraborty Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Manuel Sánchez, Óscar Cánovas Reverte, Gabriel López 0001, Antonio Fernandez Gómez-Skarmeta Managing the lifecycle of XACML delegation policies in federated environments. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Inez Raguenet, Carlos Maziero A Fuzzy Model for the Composition of Intrusion Detectors. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Brian Hay, Ronald Dodge, Kara L. Nance Using Virtualization to Create and Deploy Computer Security Lab Exercises. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jason Crampton, Hoon Wei Lim Role Signatures for Access Control in Open Distributed Systems. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yasuhiro Fujihara, Yuko Murayama, Kentarou Yamaguchi A user survey on the sense of security, Anshin. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jacques Saraydaryan, Luc Paffumi, Véronique Legrand, Stéphane Ubéda Behavioral Intrusion Detection Indicators. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jing Pan, J. I. den Hartog, Erik P. de Vink An Operation-Based Metric for CPA Resistance. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Maxwell G. Dondo A Vulnerability Prioritization System Using A Fuzzy Risk Analysis Approach. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Kien C. Nguyen, Tansu Alpcan, Tamer Basar A Decentralized Bayesian Attack Detection Algorithm for Network Security. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1William J. Caelli Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Tieyan Li, Guilin Wang Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, Christian Jung, Jens B. Schmitt Phishing in the Wireless: Implementation and Analysis. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang Crafting Web Counters into Covert Channels. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Carsten Rudolph Covert Identity Information in Direct Anonymous Attestation (DAA). Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Natsuko Hikage, Yuko Murayama, Carl Hauser Exploratory survey on an Evaluation Model for a Sense of Security. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 1507 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license