|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5416 occurrences of 2387 keywords
|
|
|
Results
Found 9246 publication records. Showing 9246 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
14 | Giuliano Casale, Stefano Zanero |
GIVS: Integrity Validation for Grid Security. |
International Conference on Computational Science (3) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Alin Deutsch, Bertram Ludäscher, Alan Nash |
Rewriting Queries Using Views with Access Patterns Under Integrity Constraints. |
ICDT |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Stefano Grivet-Talocia, Igor S. Stievano, Ivan A. Maio, Flavio G. Canavero |
Linear and nonlinear macromodels for power/signal integrity. |
ISCAS (6) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Nobuyuki Nishiguchi |
An advance RTL to GDS2 design methodology for 90 nm and below system LSIs to solve timing closure, signal integrity and design for manufacturing. |
ISCAS (6) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Martin Jandl, Alexander Szep, Robert Smeikal, Karl M. Göschka |
Increasing Availability by Sacrificing Data Integrity - A Problem Statement. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder |
Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Dwaine E. Clarke, G. Edward Suh, Blaise Gassend, Ajay Sudan, Marten van Dijk, Srinivas Devadas |
Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data. |
S&P |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Thomas Werner, Claus Vetter |
Data integrity in electric utility IT systems: a case study. |
ETFA |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Leopoldo E. Bertossi, Loreto Bravo, Enrico Franconi, Andrei Lopatenko |
Complexity and Approximation of Fixing Numerical Attributes in Databases Under Integrity Constraints. |
DBPL |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Ajoy Kumar Palit, Volker Meyer, Walter Anheier, Jürgen Schlöffel |
ABCD Modeling of Crosstalk Coupling Noise to Analyze the Signal Integrity Losses on the Victim Interconnect in DSM Chips. |
VLSI Design |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Michael J. Smith 0004, Marie desJardins |
A framework for decomposing reputation in MAS into competence and integrity. |
AAMAS |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Sophie Cockcroft |
The Design and Implementation of a Repository for the Management of Spatial Data Integrity Constraints. |
GeoInformatica |
2004 |
DBLP DOI BibTeX RDF |
spatial data quality, user interface, repository, business rules, system development, database constraints |
14 | Fabian Vargas 0001, Rubem Dutra Ribeiro Fagundes, Daniel Barros Jr., Diogo B. Brum, Eduardo Luis Rhod |
Merging a DSP-Oriented Signal Integrity Technique and SW-Based Fault Handling Mechanisms to Ensure Reliable DSP Systems. |
J. Electron. Test. |
2004 |
DBLP DOI BibTeX RDF |
digital signal processing (DSP) systems, electromagnetic interference (EMI), speech recognition system (SRS), on-line testing, noise immunity |
14 | Robyn R. Lutz, Ines Carmen Mikulski |
Ongoing Requirements Discovery in High-Integrity Systems. |
IEEE Softw. |
2004 |
DBLP DOI BibTeX RDF |
requirements/specifications management, maintenance and enhancement, software and system safety, error processing, distribution, product metrics |
14 | Josep Rius Vázquez, José Pineda de Gyvez |
Power Supply Noise Monitor for Signal Integrity Faults. |
DATE |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Jordi Cabot, Jordi Conesa |
Automatic Integrity Constraint Evolution due to Model Subtract Operations. |
ER (Workshops) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Arso Savanovic, Dusan Gabrijelcic, Borka Jerman-Blazic, Janez Bester |
Implementation and Evaluation of Integrity Protection Facilities for Active Grids. |
International Conference on Computational Science |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Su-Wei Wu, Yao-Wen Chang |
Efficient power/ground network analysis for power integrity-driven design methodology. |
DAC |
2004 |
DBLP DOI BibTeX RDF |
footnotesize floorplanning, power/ground network |
14 | Adrian J. Hilton, Jon G. Hall |
High-Integrity Interfacing to Programmable Logic with Ada. |
Ada-Europe |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Jaewon Lee, Heeyoul Kim, Hyunsoo Yoon |
Tamper Resistant Software by Integrity-Based Encryption. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
Tamper Resistant Software, Security, Software Protection |
14 | Jagun Kwon, Andy J. Wellings, Steve King 0001 |
Assessment of the Java programming language for use in high integrity systems. |
ACM SIGPLAN Notices |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Vittorio Ricchiuti |
Power Bus Signal Integrity Improvement and EMI Mitigation on Multilayer High-Speed Digital PCBs with Embedded Capacitance. |
IEEE Trans. Mob. Comput. |
2003 |
DBLP DOI BibTeX RDF |
Embedded capacitance, power bus, power/ground layers, power supply decoupling, electric field strength, S-parameters |
14 | Andrew J. Fry |
Integrity-based self-validation test scheduling. |
IEEE Trans. Reliab. |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Boris Dahav, Opher Etzion |
Distributed Enforcement of Integrity Constraints. |
Distributed Parallel Databases |
2003 |
DBLP DOI BibTeX RDF |
database exception handling, self-stabilization in databases, distributed rules systems, distributed databases |
14 | Andrea Calì, Saverio De Nigris, Domenico Lembo, Gabriele Messineo, Riccardo Rosati 0001, Marco Ruzzi |
DIS@DIS: A System for Semantic Data Integration under Integrity Constraints. |
WISE |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Andrea Acquaviva, Alessandro Bogliolo |
A Bottom-Up Approach to On-Chip Signal Integrity. |
PATMOS |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Antoni Olivé |
Integrity Constraints Definition in Object-Oriented Conceptual Modeling Languages. |
ER |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Dwaine E. Clarke, Srinivas Devadas, Marten van Dijk, Blaise Gassend, G. Edward Suh |
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Roberto Gorrieri, Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli |
Compositional Verification of Integrity for Digital Stream Signature Protocols. |
ACSD |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Mauro Borchardt, Carlos Maziero, Edgard Jamhour |
An Architecture for On-the-Fly File Integrity Checking. |
LADC |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Tetsu Iwata, Kaoru Kurosawa |
On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Wolfgang A. Halang |
Automated Control Systems for the Safety Integrity Levels 3 and 4. |
WORDS Fall |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Anna Formica |
Finite Satisfiability of Integrity Constraints in Object-Oriented Database Schemas. |
IEEE Trans. Knowl. Data Eng. |
2002 |
DBLP DOI BibTeX RDF |
constraint satisfiability (consistency), recursive schemas, axioms of infinity, equality constraints, object-oriented databases |
14 | Paul F. Ross |
Whatever became of integrity? |
Commun. ACM |
2002 |
DBLP DOI BibTeX RDF |
World Wide Web (WWW), HTML |
14 | Qiang Gu, Alan Marshall 0001 |
Using CORBA's Advanced Services to Enhance the Integrity of QoS Management Programmable Networks. |
MMNS |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Mark A. Hale |
Maintaining Referential Integrity on the Web. |
ICFEM |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Andrea Calì, Diego Calvanese, Giuseppe De Giacomo, Maurizio Lenzerini |
Data Integration under Integrity Constraints. |
CAiSE |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Soon-Kyeong Kim, David A. Carrington |
A Formal Model of the UML Metamodel: The UML State Machine and Its Integrity Constraints. |
ZB |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Harith Alani, Srinandan Dasmahapatra, Nicholas Gibbins, Hugh Glaser, Steve Harris, Yannis Kalfoglou, Kieron O'Hara, Nigel Shadbolt |
Managing Reference: Ensuring Referential Integrity of Ontologies for the Semantic Web. |
EKAW |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Amir Attarha, Mehrdad Nourani |
Test Pattern Generation for Signal Integrity Faults on Long Interconnects. |
VTS |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Rajgopal Kannan, Sudipta Sarangi, Sibabrata Ray, S. Sitharama Iyengar |
Minimal Sensor Integrity in Sensor Grids. |
ICPP |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Darko Kirovski, Milenko Drinic, Miodrag Potkonjak |
Enabling trusted software integrity. |
ASPLOS |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Peter P. Puschner, Andy J. Wellings |
A Profile for High-Integrity Real-Time Java Programs. |
ISORC |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Hilarie K. Orman |
Data Integrity for Mildly Active Content. |
Active Middleware Services |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Josef Scharinger |
Construction of Data Dependent Chaotic Permutation Hashes to Ensure Communications Integrity. |
ICN (2) |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Kostas Marinis, Nikos K. Moshopoulos, Fotis Karoubalis, Kiamal Z. Pekmestzi |
On the Hardware Implementation of the 3GPP Confidentiality and Integrity Algorithms. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Francesco Buccafurri, Filippo Furfaro, Domenico Saccà |
Estimating Range Queries Using Aggregate Data with Integrity Constraints: A Probabilistic Approach. |
ICDT |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Xavier Hannotin, Paolo Maggi, Riccardo Sisto |
Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study. |
Mobile Agents |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Gordon S. Blair, Geoff Coulson, Michael Clarke, Nikos Parlavantzas |
Performance and Integrity in the OpenORB Reflective Middleware. |
Reflection |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Richard Rabbat, Tom McNeal, Tim Burke |
A High-Availability Clustering Architecture with Data Integrity Guarantees. |
CLUSTER |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Diomidis Spinellis |
Reflection as a mechanism for software integrity verification. |
ACM Trans. Inf. Syst. Secur. |
2000 |
DBLP DOI BibTeX RDF |
message digest, cryptographic hash function, embedded device |
14 | John R. Michener, Tolga Acar |
Managing System and Active-Content Integrity. |
Computer |
2000 |
DBLP DOI BibTeX RDF |
|
14 | Tim Clement, Ian Cottam, Peter K. D. Froome, Claire Jones |
The Development of a Commercial "Shrink-Wrapped Application" to Safety Integrity Level 2: The DUST-EXPERTTM Story. |
SAFECOMP |
1999 |
DBLP DOI BibTeX RDF |
|
14 | Isabelle Mirbel, Barbara Pernici, Michalis Vazirgiannis |
Temporal Integrity Constraints in Interactive Multimedia Documents. |
ICMCS, Vol. 2 |
1999 |
DBLP DOI BibTeX RDF |
|
14 | John K. Debenham |
Context as Fuzzy Degrees of Acceptability for Knowledge Base Integrity. |
CONTEXT |
1999 |
DBLP DOI BibTeX RDF |
|
14 | Laura Mota-Herranz, Matilde Celma |
Automatic Generation of Trigger Rules for Integrity Enforcement in Relational Databases with View Definition. |
FQAS |
1998 |
DBLP DOI BibTeX RDF |
|
14 | Rolf Drechsler |
Verifying Integrity of Decision Diagrams. |
SAFECOMP |
1998 |
DBLP DOI BibTeX RDF |
|
14 | Alan Burns 0001, Brian Dobbing, George Romanski |
The Ravenscar Tasking Profile for High Integrity Real-Time Programs. |
Ada-Europe |
1998 |
DBLP DOI BibTeX RDF |
|
14 | W. L. Yeung |
Semantics-Based Support Tools for High Integrity Ada Software. |
Ada-Europe |
1997 |
DBLP DOI BibTeX RDF |
|
14 | Akhil Kumar 0001, J. Leon Zhao |
A Framework for Dynamic Routing and Operational Integrity Controls in a Workflow Management System. |
HICSS (3) |
1996 |
DBLP DOI BibTeX RDF |
|
14 | Ashish Gupta 0001, Jennifer Widom |
Local Verification of Global Integrity Constraints in Distributed Databases. |
SIGMOD Conference |
1993 |
DBLP DOI BibTeX RDF |
SQL, Datalog |
14 | Swarup Reddi |
Integrity Constraint Enforcement in the Functional Database Language PFL. |
BNCOD |
1993 |
DBLP DOI BibTeX RDF |
|
14 | Jan Chomicki |
Real-Time Integrity Constraints. |
PODS |
1992 |
DBLP DOI BibTeX RDF |
|
14 | M. M. Fonkam, W. A. Gray |
Employing Integrity Constraints for Query Modification and Intensional Answer Generation in Multi-database Systems. |
BNCOD |
1992 |
DBLP DOI BibTeX RDF |
|
14 | Ken Satoh, Noboru Iwayama |
A Correct Goal-directed Proof Procedure for a General Logic Program with Integrity Constraints. |
ELP |
1992 |
DBLP DOI BibTeX RDF |
|
14 | Bart Preneel, David Chaum, Walter Fumy, Cees J. A. Jansen, Peter Landrock, Gert Roelofsen |
Race Integrity Primitives Evaluation (RIPE): A Status Report. |
EUROCRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
14 | Rainer Manthey |
Integrity and Recursion: Two Key Issues for Deductive Databases. |
IS/KI |
1990 |
DBLP DOI BibTeX RDF |
|
14 | Olga De Troyer |
RIDL*: A Tool for the Computer-Assisted Engineering of Large Databases in the Presence of Integrity Constraints. |
SIGMOD Conference |
1989 |
DBLP DOI BibTeX RDF |
|
14 | Joos Vandewalle, David Chaum, Walter Fumy, Cees J. A. Jansen, Peter Landrock, Gert Roelofsen |
A European Call For Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation. |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
14 | Subhasish Mazumdar, David W. Stemple, Tim Sheard |
Resolving the Tension between Integrity and Security Using a Theorem Prover. |
SIGMOD Conference |
1988 |
DBLP DOI BibTeX RDF |
|
14 | Udo W. Lipeck, Dasu Feng |
Construction of Deterministic Transition Graphs from Dynamic Integrity Constraints. |
WG |
1988 |
DBLP DOI BibTeX RDF |
|
14 | James P. Delgrande |
Formal Limits on the Automatic Generation and Maintenance of Integrity Constraints. |
PODS |
1987 |
DBLP DOI BibTeX RDF |
|
14 | Richard A. Smith, Leslie Chalmers, Charles C. Wood |
Security and audit: Needs of the business sector for security and integrity controls. |
ACM Annual Conference |
1984 |
DBLP DOI BibTeX RDF |
|
14 | Elizabeth N. Fong, Stephen R. Kimbleton |
Database semantic integrity for a network data manager. |
AFIPS National Computer Conference |
1980 |
DBLP DOI BibTeX RDF |
|
14 | Rudolf Bayer |
On the Integrity of Data Bases and Resource Locking. |
IBM Symposium: Data Base Systems |
1975 |
DBLP DOI BibTeX RDF |
|
10 | He Wang 0020, Sylvia L. Osborn |
Static and Dynamic Delegation in the Role Graph Model. |
IEEE Trans. Knowl. Data Eng. |
2011 |
DBLP DOI BibTeX RDF |
security, Access controls, integrity and protection |
10 | Carl A. Gunter, David M. Liebovitz, Bradley A. Malin |
Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems. |
IEEE Secur. Priv. |
2011 |
DBLP DOI BibTeX RDF |
security and privacy protection knowledge, data engineering tools and techniques, security, privacy, integrity and protection, public policy issues |
10 | Shubhashis Sengupta, Vikrant S. Kaulgud, Vibhu Saujanya Sharma |
Cloud Computing Security-Trends and Research Directions. |
SERVICES |
2011 |
DBLP DOI BibTeX RDF |
Security, Cloud Computing, Data integrity, Survey, confidentiality, Trusted Computing |
10 | Krzysztof Kepa, Fearghal Morgan, Peter Athanas |
ERDB: An Embedded Routing Database for Reconfigurable Systems. |
FPL |
2011 |
DBLP DOI BibTeX RDF |
design integrity, security, FPGA, autonomic computing, partial reconfiguration, configurable systems |
10 | Ahmed A. Ataullah, Frank Wm. Tompa |
Lifecycle Management of Relational Records for External Auditing and Regulatory Compliance. |
POLICY |
2011 |
DBLP DOI BibTeX RDF |
modeling integrity constraints, object lifecycle modeling, relational database, records management |
10 | Sean Turner |
Secure/Multipurpose Internet Mail Extensions. |
IEEE Internet Comput. |
2010 |
DBLP DOI BibTeX RDF |
S/MIME, message integrity, non-repudiation of origin, Internet, authentication, digital signatures, encryption, IETF, data confidentiality |
10 | Weilian Su, Nikolaos V. Alchazidis, Tri T. Ha |
Multiple RFID Tags Access Algorithm. |
IEEE Trans. Mob. Comput. |
2010 |
DBLP DOI BibTeX RDF |
Passive RFID systems, framed slotted aloha, progressing scanning algorithm, data integrity, tags, collisions |
10 | Ron Kohavi, Roger Longbotham, Toby Walker |
Online Experiments: Practical Lessons. |
Computer |
2010 |
DBLP DOI BibTeX RDF |
Online experiments, Data traps, Statistical integrity constraints, Web technologies |
10 | Haibo Hu 0001, Jianliang Xu |
2PASS: Bandwidth-Optimized Location Cloaking for Anonymous Location-Based Services. |
IEEE Trans. Parallel Distributed Syst. |
2010 |
DBLP DOI BibTeX RDF |
security, integrity, distributed applications, Mobile applications, protection |
10 | Kyriacos E. Pavlou, Richard T. Snodgrass |
The Tiled Bitmap Forensic Analysis Algorithm. |
IEEE Trans. Knowl. Data Eng. |
2010 |
DBLP DOI BibTeX RDF |
security, temporal databases, Database management, integrity and protection |
10 | Marco A. Casanova, Tanara Lauschner, Luiz André P. Paes Leme, Karin Koogan Breitman, António L. Furtado 0001, Vânia Maria Ponte Vidal |
Modeling the Mediated Schema Constraints. |
ECBS |
2010 |
DBLP DOI BibTeX RDF |
mediated schema, Description Logics, Integrity constraint |
10 | Thomas Zefferer, Thomas Knall |
An electronic-signature based circular resolution database system. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
Austrian citizen card, business workflow, circular resolution, qualified electronic signature, integrity, decision making, non-repudiation, electronic document |
10 | Shadi A. Aljawarneh, Maher Dababneh, Hiba Hosseny, Eklass Alwadi |
A Web Client Authentication System Using Smart Card for e-Systems: Initial Testing and Evaluation. |
ICDS |
2010 |
DBLP DOI BibTeX RDF |
data integrity, web application, web based-systems, HMAC, security vulnerabilities, tampering, Web authentication |
10 | Niko Popitsch, Bernhard Haslhofer |
DSNotify: handling broken links in the web of data. |
WWW |
2010 |
DBLP DOI BibTeX RDF |
instance matching, link integrity, blocking, linked data, broken links |
10 | Takamasa Isohara, Keisuke Takemori, Yutaka Miyake, Ning Qu, Adrian Perrig |
LSM-Based Secure System Monitoring Using Kernel Protection Schemes. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
Secure system monitoring, Linux Security Module, Lifetime kernel code integrity, Mandatory Access Control |
10 | A. A. Adekunle, S. R. Woodhead |
Zone Based Systems Design Framework for the Realisation of Efficient Block Cipher Based Message Authentication Code Algorithms. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
integrity, block ciphers, information security, message authentication, ubiquitous networks |
10 | Joel Mana Gonçalves |
Privacy and Information Security in Brazil? Yes, We Have It and We Do It! |
ITNG |
2010 |
DBLP DOI BibTeX RDF |
Integrity, Management, Policies, Availability, Certification, Confidentiality |
10 | Khan Ferdous Wahid |
Maximizing Ethernet Security by Switch-Based Single Secure Domain. |
ITNG |
2010 |
DBLP DOI BibTeX RDF |
global confidentiality, global integrity, LAN security, MACsec, secure device identity |
10 | Steve Barker |
Personalizing access control by generalizing access control. |
SACMAT |
2010 |
DBLP DOI BibTeX RDF |
integrity, privacy policies, access control models |
10 | Kelvin Nilsen |
Ada-Java middleware for legacy software modernization. |
JTRES |
2010 |
DBLP DOI BibTeX RDF |
mixed-language development, software modernization, Java, real-time, Ada, safety-critical, object oriented development, high-integrity systems, mission-critical |
10 | Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil D. Gligor, Adrian Perrig |
TrustVisor: Efficient TCB Reduction and Attestation. |
IEEE Symposium on Security and Privacy |
2010 |
DBLP DOI BibTeX RDF |
Minimal TCB, Virtualization, Trusted Computing, TPM, Attestation, Integrity Measurement |
10 | Mikolaj Bojanczyk, Anca Muscholl, Thomas Schwentick, Luc Segoufin |
Two-variable logic on data trees and XML reasoning. |
J. ACM |
2009 |
DBLP DOI BibTeX RDF |
XML, consistency, Integrity constraints, DTDs, implications |
10 | Zhenyu Hu, JianChun Jiang, Fuchun Sun 0001 |
Using IND-CVA for constructing secure communication. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
integrity, authenticated encryption, semantic security, universally composable security, secure channel |
10 | Zhenyu Hu, Fuchun Sun 0001, JianChun Jiang |
Ciphertext verification security of symmetric encryption schemes. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
reaction attack, IND-CPA, IND-CCA, privacy, integrity, encryption |
10 | Di Ma, Gene Tsudik |
A new approach to secure logging. |
ACM Trans. Storage |
2009 |
DBLP DOI BibTeX RDF |
Secure logging, forward secure sequential aggregate (FssAgg) authentication, forward-secure stream integrity, MACs, signatures, truncation attack |
|
|