|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7090 occurrences of 2819 keywords
|
|
|
Results
Found 22916 publication records. Showing 22913 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
20 | Zongli Tang, Xingming Li |
A Mixed Shared and Multi Paths Protection Scheme with SRLG Constraints. |
SNPD (1) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Robert Chebli, Mohamad Sawan, Yvon Savaria, Kamal El-Sankary |
High-Voltage DMOS Integrated Circuits with Floating Gate Protection Technique. |
ISCAS |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Hui-Kai Su, Cheng-Shong Wu, Yuan-Sun Chu |
IP Local Node Protection. |
ICSNC |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Kenneth S. Edge, Richard A. Raines, Michael R. Grimaila, Rusty O. Baldwin, Robert W. Bennington, Christopher E. Reuter |
The Use of Attack and Protection Trees to Analyze Security for an Online Banking System. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Ho-Jeong Yu, Kyoung-Min Yoo, Kyeong-Eun Han, Won-Hyuk Yang, Sang-Yeol Lee, Young-Chon Kim |
1+X: A Novel Protection Scheme for Optical Burst Switched Networks. |
ICOIN |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Maohua Lu, Shibiao Lin, Tzi-cker Chiueh |
Efficient Logging and Replication Techniques for Comprehensive Data Protection. |
MSST |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Jorge Guajardo, Sandeep S. Kumar, Geert Jan Schrijen, Pim Tuyls |
FPGA Intrinsic PUFs and Their Use for IP Protection. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Gerald Quirchmayr, Christopher C. Wills |
Data Protection and Privacy Laws in the Light of RFID and Emerging Technologies. |
TrustBus |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Qingguang Ji, Sihan Qing, Yeping He |
A formal model for integrity protection based on DTE technique. |
Sci. China Ser. F Inf. Sci. |
2006 |
DBLP DOI BibTeX RDF |
integrity policy, information flow, formal model, type, domain |
20 | Shraga I. Bross, Simon Litsyn |
Improved Upper Bounds for Codes With Unequal Error Protection. |
IEEE Trans. Inf. Theory |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Soontae Kim |
Area-efficient error protection for caches. |
DATE |
2006 |
DBLP DOI BibTeX RDF |
|
20 | You-Ru Lin, Hui-Yu Huang, Wen-Hsing Hsu |
An embedded watermark technique in video for copyright protection. |
ICPR (4) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Chao-Yong Hsu, Chun-Shien Lu, Soo-Chang Pei |
Joint Screening Halftoning and Visual Cryptography for Image Protection. |
IWDW |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Hung-Yi Liu, Chung-Wei Lin, Szu-Jui Chou, Wei-Ting Tu, Chih-Hung Liu 0001, Yao-Wen Chang, Sy-Yen Kuo |
Current path analysis for electrostatic discharge protection. |
ICCAD |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Paolo Nesi, Davide Rogai, Andrea Vallotti |
A Protection Processor for MPEG-21 Players. |
ICME |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Chen-Yin Liao, Jen-Wei Yeh, Ming-Seng Kao |
A Copy Protection Technique Using Multi-level Error Coding. |
ICISC |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Paul T. Myrda, Eric A. Udren |
System-Wide Replacement Strategy for Substation Protection and Automation Systems. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
|
20 | M. Abdesh S. K. Khan, T. S. Radwan, M. Azizur Rahman |
Wavelet Packet Transform Based Protection of Disturbances in Three-Phase Interior Permanent Magnet Motor Fed from Sinusoidal PWM Voltage Source Inverter. |
CCECE |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Ted Huffmire, Shreyas Prasad, Timothy Sherwood, Ryan Kastner |
Policy-Driven Memory Protection for Reconfigurable Hardware. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
Embedded Systems, Computer Security, Security Policies, Policy Languages, Reference Monitors, Separation Kernels |
20 | Stephen Lau, Scott Campbell, William T. Kramer, Brian Tierney |
S06 - Computing protection in open HPC environments. |
SC |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Rui D. Jorge, Carlos Viegas Damásio |
Diagnosis of Power System Protection. |
IEA/AIE |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Tomaz Klobucar |
Privacy and data protection in technology-enhanced professional learning. |
AICT/ICIW |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Ghassan Al-Regib, Yucel Altunbasak, Jarek Rossignac |
An unequal error protection method for progressively transmitted 3D models. |
IEEE Trans. Multim. |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Bob Hutchinson |
The future of systematic information protection. |
SAC |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Shoichiro Seno, Teruko Fujii, Motofumi Tanabe, Eiichi Horiuchi, Yoshimasa Baba, Tetsuo Ideguchi |
A Proposal and Evaluation of Multi-class Optical Path Protection Scheme for Reliable Computing. |
HPCC |
2005 |
DBLP DOI BibTeX RDF |
|
20 | David M. Nicol, Hamed Okhravi |
Performance analysis of binary code protection. |
WSC |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Anna Urra, Eusebi Calle, José-Luis Marzo |
Enhanced Protection Using Shared Segment Backups in a Multiservice GMPLS-Based Networks. |
ISCC |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Qingkai Ma, Liangliang Xiao, I-Ling Yen, Manghui Tu, Farokh B. Bastani |
An Adaptive Multiparty Protocol for Secure Data Protection. |
ICPADS (1) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Son-Hong Ngo, Xiaohong Jiang 0001, Susumu Horiguchi |
Dynamic Lightpath Protection in WDM optical Networks Using Ant-based Mobile Agents. |
IAT |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Changjie Wang, Ho-fung Leung |
Mobile Agents for Secure Electronic Commerce Transactions with Privacy Protection of the Customers. |
EEE |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Gisle Grimen, Christian Mönch, Roger Midtstraum |
Software-Based Copy Protection for Temporal Media During Dissemination and Playback. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Elyse Rosenbaum, Sami Hyvonen |
On-chip ESD protection for RF I/Os: devices, circuits and models. |
ISCAS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Xiaoming Wang, Bin B. Zhu, Shipeng Li 0001 |
A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Yu-Quan Zhang, Sabu Emmanuel |
A Novel Framework for Multiple Creatorship Protection of Digital Movies. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Vural Ünlü, Thomas Hess |
The Access-Usage-Control-Matrix: A Heuristic Tool for Implementing a Selected Level of Technical Content Protection. |
CEC |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Sung-eok Jeon |
Redundant Protection Problem in the Hierarchical GMPLS Networks. |
LCN |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Sabina Hosic, Aykut Hocanin, Hasan Demirel |
Unequal Error Protection Using Convolutional Codes for PCA-Coded Images. |
ICIAR |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Victor F. Sanchez, Mrinal K. Mandal 0001 |
Efficient channel protection for JPEG2000 bitstream. |
IEEE Trans. Circuits Syst. Video Technol. |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Rouying Zhan, Haigang Feng, Qiong Wu 0013, Haolu Xie, Xiaokang Guan, Guang Chen, Albert Z. Wang |
ESDInspector: a new layout-level ESD protection circuitry design verification tool using a smart-parametric checking mechanism. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Pin-Han Ho, Hussein T. Mouftah |
A novel survivable routing algorithm for shared segment protection in mesh WDM networks with partial wavelength conversion. |
IEEE J. Sel. Areas Commun. |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Srinivasan Ramasubramanian |
On Failure Dependent Protection in Optical Grooming Networks. |
DSN |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Darli A. A. Mello, Marcio S. Savasini, Jefferson U. Pelegrini, Helio Waldman |
On-Arrival Planning for Sub-Graph Routing Protection in WDM Networks. |
OpNeTec |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Ranjan Gangopadhyay, Giancarlo Prati, N. Rao |
Semi-Lightpath Approach for Bandwidth Guaranteed Protection in IP-Over-WDM Networks. |
OpNeTec |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Rouying Zhan, Haigang Feng, Qiong Wu 0013, Xiaokang Guan, Guang Chen, Haolu Xie, Albert Z. Wang |
Concept and extraction method of ESD-critical parameters for function-based layout-level ESD protection circuit design verification. |
ASP-DAC |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Jukka Ylitalo, Pekka Nikander |
BLIND: A Complete Identity Protection Framework for End-Points. |
Security Protocols Workshop |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Andrew K. Wright, John A. Kinast, Joe McCarty |
Low-Latency Cryptographic Protection for SCADA Communications. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Vito Cappellini, Giovanna Damiani, Alessandro Piva |
Protection of Cultural Heritage Contents on the Web. |
DEXA Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Chen-Shie Ho, Ing-Yi Chen, Sy-Yen Kuo |
Dynamic Sub-mesh Protection under Dynamic Traffic Demands in Dense WDM Networks. |
AINA (2) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Sun-il Kim, Steven S. Lumetta |
Capacity-Efficient Protection with Fast Recovery in Optically Transparent Mesh Networks. |
BROADNETS |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Wang Yao, Byrav Ramamurthy |
Survivable Traffic Grooming with Path Protection at the Connection Level in WDM Mesh Networks. |
BROADNETS |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Ricardo Staciarini Puttini, Ludovic Mé, Rafael Timóteo de Sousa Júnior |
Preventive and Corrective Protection for Mobile Ad Hoc Network Routing Protocols. |
WONS |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Atte Helminen, U. Pulkkinen |
Quantitative Reliability Estimation of a Computer-Based Motor Protection Relay Using Bayesian Networks. |
SAFECOMP |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Yeongsub Cho, Sangrae Cho, Daeseon Choi, Seunghun Jin, Kyoil Chung, Cheehang Park |
A Location Privacy Protection Mechanism for Smart Space. |
WISA |
2003 |
DBLP DOI BibTeX RDF |
|
20 | S. Sridharan, Ghanshyam Nayak, P. R. Mukund |
LNA design optimization with reference to ESD protection circuitry. |
ISCAS (1) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Hiroki Sayama |
Self-Protection Maintains Diversity of Artificial Self-Replicators. |
Evolvable Hardware |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Paolo Maggi, Riccardo Sisto |
A configurable mobile agent data protection protocol. |
AAMAS |
2003 |
DBLP DOI BibTeX RDF |
mobile agents, data integrity, cryptographic protocols, data authenticity |
20 | José Ambrosio Toval Álvarez, Alfonso Olmos, Mario Piattini |
Legal Requirements Reuse: A Critical Success Factor for Requirements Quality and Personal Data Protection. |
RE |
2002 |
DBLP DOI BibTeX RDF |
|
20 | E. S. Siougle, Vasilios Zorkadis |
A Model Enabling Law Compliant Privacy Protection through the Selection and Evaluation of Appropriate Security Controls. |
InfraSec |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Hungjen Wang, Eytan H. Modiano, Muriel Médard |
Partial path protection for WDM networks: end-to-end recovery using local failure information. |
ISCC |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Ming-Dou Ker, Kuo-Chun Hsu |
On-chip ESD protection circuit design with novel substrate-triggered SCR device in sub-quarter-micron CMOS process. |
ISCAS (5) |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Chu-Hsing Lin, Chen-Yu Lee |
A Software Protection System for Internet Commerce. |
IEEE Pacific Rim Conference on Multimedia |
2002 |
DBLP DOI BibTeX RDF |
|
20 | H. Feng, R. Zhan, Q. Wu, G. Chen, X. Guan, A. Z. Wang |
RC-SCR: a novel low-voltage ESD protection circuit with new triggering mechanism. |
APCCAS (2) |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Choshu Ito, Kaustav Banerjee, Robert W. Dutton |
Analysis and Design of ESD Protection Circuits for High-Frequency/RF Applications. |
ISQED |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Arun G. Phadke, Nouredine Hadjsaid |
Measurements for Adaptive Protection and Control in a Competitive Market. |
HICSS |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Timothy Fraser |
LOMAC: Low Water-Mark Integrity Protection for COTS Environments. |
S&P |
2000 |
DBLP DOI BibTeX RDF |
low water-mark, linux security, access control, integrity, mandatory access control, security policy model |
20 | Ming-Dou Ker, Hun-Hsien Chang, Tung-Yang Chen |
ESD buses for whole-chip ESD protection. |
ISCAS (1) |
1999 |
DBLP DOI BibTeX RDF |
|
20 | Tzi-cker Chiueh, Ganesh Venkitachalam, Prashant Pradhan |
Intra-Address Space Protection using Segmentation Hardware. |
Workshop on Hot Topics in Operating Systems |
1999 |
DBLP DOI BibTeX RDF |
Kernel Extensions, Segmentation, Extensibility, Component Based Software Development |
20 | James Noble 0001, Jan Vitek, John Potter |
Flexible Alias Protection. |
ECOOP |
1998 |
DBLP DOI BibTeX RDF |
|
20 | Wai W. Fung, James W. Gray III |
Protection Against EEPROM Modification Attacks. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
20 | Ming-Dou Ker, Chung-Yu Wu, Tao Cheng, Hun-Hsien Chang |
Capacitor-couple ESD protection circuit for deep-submicron low-voltage CMOS ASIC. |
IEEE Trans. Very Large Scale Integr. Syst. |
1996 |
DBLP DOI BibTeX RDF |
|
20 | Warwick Ford, Michael J. Wiener |
A Key Distribution Method for Object-Based Protection. |
CCS |
1994 |
DBLP DOI BibTeX RDF |
|
20 | Oded Goldreich 0001 |
Towards a Theory of Software Protection. |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
|
20 | Joos Vandewalle, René Govaerts, W. De Becker, Marc Decroos, G. Speybrouck |
Implementation Study of Public Key Cryptographic Protection in an Existing Electronic Mail and Document Handling System. |
EUROCRYPT |
1985 |
DBLP DOI BibTeX RDF |
|
20 | Douglas W. Jones |
Systematic Protection Mechanism Design. |
ASPLOS |
1982 |
DBLP DOI BibTeX RDF |
Ada |
20 | Matt Bishop |
Hierarchical Take-Grant Protection Systems. |
SOSP |
1981 |
DBLP DOI BibTeX RDF |
|
19 | Lee M. Hively, Frederick T. Sheldon, Anna Cinzia Squicciarini |
Toward Scalable Trustworthy Computing Using the Human-Physiology-Immunity Metaphor. |
IEEE Secur. Priv. |
2011 |
DBLP DOI BibTeX RDF |
C.2.2 Network Protocols, trust establishment system, acces control models, K.6.5.a Authentication, K.6.5 Security and Protection, D.4.6.a Access controls, A.1 Introductory and Survey, C.2.0.f Network-level security and protection, C.4.f Reliability, D.2.15 Software and System Safety, Security, Software Engineering, Reliability, formal methods, Validation, Dependability, negotiations, peer to peer system, Statistical Methods, Testing strategies, Requirements/Specifications, availability and serviceability, Software/Program Verification |
19 | Carl A. Gunter, David M. Liebovitz, Bradley A. Malin |
Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems. |
IEEE Secur. Priv. |
2011 |
DBLP DOI BibTeX RDF |
security and privacy protection knowledge, data engineering tools and techniques, security, privacy, integrity and protection, public policy issues |
19 | Chris Strasburg, Sandeep Krishnan, Karin S. Dorman, Samik Basu 0001, Johnny S. Wong |
Masquerade Detection in Network Environments. |
SAINT |
2010 |
DBLP DOI BibTeX RDF |
D.4.6. Security and Privacy Protection, H.1.2. User/Machine Systems, K.6.5. Security and Protection |
19 | Saraju P. Mohanty, Bharat K. Bhargava |
Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks. |
ACM Trans. Multim. Comput. Commun. Appl. |
2008 |
DBLP DOI BibTeX RDF |
invisible watermarking, Watermarking, image, copyright protection, content protection |
19 | Fang Liu 0025, Xiuzhen Cheng 0001, Liran Ma, Kai Xing |
SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks. |
IEEE Trans. Mob. Comput. |
2008 |
DBLP DOI BibTeX RDF |
Security, Network-level security and protection, integrity and protection |
19 | William G. J. Halfond, Alessandro Orso, Pete Manolios |
WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation. |
IEEE Trans. Software Eng. |
2008 |
DBLP DOI BibTeX RDF |
Security and Protection, Protection mechanisms |
19 | Zhenhai Duan, Xin Yuan 0001, Jaideep Chandrashekar |
Controlling IP Spoofing through Interdomain Packet Filters. |
IEEE Trans. Dependable Secur. Comput. |
2008 |
DBLP DOI BibTeX RDF |
Infrastructure Protection, Routing Protocols, BGP, DDoS, Network-level security and protection, IP Spoofing |
19 | Eunjin Jung, Ehab S. Elmallah, Mohamed G. Gouda |
Optimal Dispersal of Certificate Chains. |
IEEE Trans. Parallel Distributed Syst. |
2007 |
DBLP DOI BibTeX RDF |
certificate graph, certificate dispersal, public-key management, authentication, authentication, security and protection, Security and privacy protection |
19 | Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi |
Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
Cost/performance, Security, Simulation, Optimization, Algorithms, Dynamic programming, Wireless communication, Emerging technologies, Wireless systems, Data encryption, Data Encryption, Security and Privacy Protection, integrity and protection |
19 | Jun Yang 0002, Lan Gao, Youtao Zhang |
Improving Memory Encryption Performance in Secure Processors. |
IEEE Trans. Computers |
2005 |
DBLP DOI BibTeX RDF |
hardware/software protection, security and protection, Memory design |
19 | Alen Peacock, Xian Ke, Matthew Wilkerson |
Typing Patterns: A Key to User Identification. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
Keystroke, Security, Pattern Recognition, Authentication, Authentication, Biometrics, Typing, Intellectual Property, User Authentication, network-level security and protection, Security and Privacy Protection, User Identification |
19 | Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere |
Software piracy prevention through diversity. |
Digital Rights Management Workshop |
2004 |
DBLP DOI BibTeX RDF |
software piracy prevention, tailored updates, authentication, diversity, identification, copyright protection, intellectual property protection |
19 | Gustavo Neuberger, Fernanda Gusmão de Lima Kastensmidt, Luigi Carro, Ricardo Augusto da Luz Reis |
A multiple bit upset tolerant SRAM memory. |
ACM Trans. Design Autom. Electr. Syst. |
2003 |
DBLP DOI BibTeX RDF |
Hamming and Reed-Solomon codes, high-level protection technique, protection against radiation, fault injection, Fault tolerant memory |
19 | Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, Emil Lupu, Morris Sloman |
A Flexible Access Control Service for Java Mobile Code. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
flexible access control service, Java mobile code, remote servers, distributed heterogeneous clients, foreign code execution, host node protection, code protection, sandbox model, downloaded code, source location, inter-organisational environments, expressive languages, Ponder, Java security architecture, Java, Internet, specification languages, security policies, signature, distributed programming, Internet applications, authorisation, declarative language, technology diffusion, dynamic loading |
19 | Bogdan Kasztenny, Eugeniusz Rosolowski |
A digital protective relay as a real-time microprocessor system. |
ECBS |
1997 |
DBLP DOI BibTeX RDF |
power system protection, digital protective relay, real-time microprocessor system, protection system, hardware, power system, software structures |
19 | Earl C. Van Horn |
Three criteria for designing computing systems to facilitate debugging. |
Commun. ACM |
1968 |
DBLP DOI BibTeX RDF |
computer design criteria, computer systems design, computing reliability, deterministic computers, input equipment, input equipment design, multiprogrammed system design, multiprogrammed systems, parallel processing, parallel programming, parallel, debugging, operating systems, programming, programming languages, information security, program testing, determinism, program debugging, protection, multiprogramming, multiprocessing, repeatability, computer systems, memory protection, reproducibility, programming language semantics, programming language design, virtual computers, computer design, information privacy, program semantics, operating systems design, multi processing |
18 | Ian Reay, Scott Dick, James Miller 0001 |
A large-scale empirical study of P3P privacy policies: Stated actions vs. legal obligations. |
ACM Trans. Web |
2009 |
DBLP DOI BibTeX RDF |
legislation and enforcement, electronic commerce, Privacy protection, P3P |
18 | Zhe Jin, Andrew Beng Jin Teoh, Thian Song Ong, Connie Tee |
Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing. |
IVIC |
2009 |
DBLP DOI BibTeX RDF |
fingerprint minutiae, random triangle hashing, template protection, cancelable biometrics |
18 | Xiaoguang Liu 0001, Gang Wang 0001, Feng Wang, Yongzhi Song |
SnapCDP : A CDP System Based on LVM. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
Continuous Data Protection, Backup Technology, Logical Volume Manager |
18 | Esma Aïmeur, Gilles Brassard, José M. Fernandez 0001, Flavien Serge Mani Onana |
Alambic : a privacy-preserving recommender system for electronic commerce. |
Int. J. Inf. Sec. |
2008 |
DBLP DOI BibTeX RDF |
Semi-trusted third party, Recommender system, Privacy protection, Web personalization, Secure two-party computation |
18 | Mitsuo Hayasaka, Tetsuya Miki |
A Network Architecture with High Availability for Real-time Premium Traffic over the Internet. |
J. Netw. Syst. Manag. |
2008 |
DBLP DOI BibTeX RDF |
Path protection, Forward error correction, Packet loss ratio |
18 | Esma Aïmeur, Gilles Brassard, José M. Fernandez 0001, Flavien Serge Mani Onana, Zbigniew Rakowski |
Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
recommender systems, privacy protection, hybrid recommender systems |
18 | Francesco Flammini, Andrea Gaglione, Nicola Mazzocca, Concetta Pragliola |
Quantitative Security Risk Assessment and Management for Railway Transportation Infrastructures. |
CRITIS |
2008 |
DBLP DOI BibTeX RDF |
Quantitative Approaches, Cost/Benefit Evaluation, Security, Risk Analysis, Railways, Critical Infrastructure Protection |
18 | Nikolai Joukov, Josef Sipek |
GreenFS: making enterprise computers greener by protecting them better. |
EuroSys |
2008 |
DBLP DOI BibTeX RDF |
continuous data protection, power efficiency, backup |
18 | Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ahamad |
Protectit: trusted distributed services operating on sensitive data. |
EuroSys |
2008 |
DBLP DOI BibTeX RDF |
traffic interception, trusted data path, data protection |
|
|