The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for protection with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1968 (18) 1969-1973 (23) 1974-1975 (29) 1976 (30) 1977 (21) 1978 (25) 1979 (21) 1980 (15) 1981 (17) 1982 (23) 1983 (18) 1984 (27) 1985 (23) 1986 (23) 1987 (27) 1988 (33) 1989 (44) 1990 (36) 1991 (91) 1992 (55) 1993 (68) 1994 (59) 1995 (65) 1996 (96) 1997 (118) 1998 (131) 1999 (168) 2000 (232) 2001 (339) 2002 (361) 2003 (639) 2004 (843) 2005 (1008) 2006 (1107) 2007 (1175) 2008 (1164) 2009 (987) 2010 (662) 2011 (701) 2012 (807) 2013 (856) 2014 (912) 2015 (802) 2016 (966) 2017 (881) 2018 (1037) 2019 (1164) 2020 (1157) 2021 (1209) 2022 (1166) 2023 (1181) 2024 (253)
Publication types (Num. hits)
article(7850) book(33) data(8) incollection(362) inproceedings(14243) phdthesis(341) proceedings(76)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 7090 occurrences of 2819 keywords

Results
Found 22916 publication records. Showing 22913 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Zongli Tang, Xingming Li A Mixed Shared and Multi Paths Protection Scheme with SRLG Constraints. Search on Bibsonomy SNPD (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Robert Chebli, Mohamad Sawan, Yvon Savaria, Kamal El-Sankary High-Voltage DMOS Integrated Circuits with Floating Gate Protection Technique. Search on Bibsonomy ISCAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Hui-Kai Su, Cheng-Shong Wu, Yuan-Sun Chu IP Local Node Protection. Search on Bibsonomy ICSNC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Kenneth S. Edge, Richard A. Raines, Michael R. Grimaila, Rusty O. Baldwin, Robert W. Bennington, Christopher E. Reuter The Use of Attack and Protection Trees to Analyze Security for an Online Banking System. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Ho-Jeong Yu, Kyoung-Min Yoo, Kyeong-Eun Han, Won-Hyuk Yang, Sang-Yeol Lee, Young-Chon Kim 1+X: A Novel Protection Scheme for Optical Burst Switched Networks. Search on Bibsonomy ICOIN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Maohua Lu, Shibiao Lin, Tzi-cker Chiueh Efficient Logging and Replication Techniques for Comprehensive Data Protection. Search on Bibsonomy MSST The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Jorge Guajardo, Sandeep S. Kumar, Geert Jan Schrijen, Pim Tuyls FPGA Intrinsic PUFs and Their Use for IP Protection. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Gerald Quirchmayr, Christopher C. Wills Data Protection and Privacy Laws in the Light of RFID and Emerging Technologies. Search on Bibsonomy TrustBus The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Qingguang Ji, Sihan Qing, Yeping He A formal model for integrity protection based on DTE technique. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF integrity policy, information flow, formal model, type, domain
20Shraga I. Bross, Simon Litsyn Improved Upper Bounds for Codes With Unequal Error Protection. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Soontae Kim Area-efficient error protection for caches. Search on Bibsonomy DATE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20You-Ru Lin, Hui-Yu Huang, Wen-Hsing Hsu An embedded watermark technique in video for copyright protection. Search on Bibsonomy ICPR (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Chao-Yong Hsu, Chun-Shien Lu, Soo-Chang Pei Joint Screening Halftoning and Visual Cryptography for Image Protection. Search on Bibsonomy IWDW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Hung-Yi Liu, Chung-Wei Lin, Szu-Jui Chou, Wei-Ting Tu, Chih-Hung Liu 0001, Yao-Wen Chang, Sy-Yen Kuo Current path analysis for electrostatic discharge protection. Search on Bibsonomy ICCAD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Paolo Nesi, Davide Rogai, Andrea Vallotti A Protection Processor for MPEG-21 Players. Search on Bibsonomy ICME The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Chen-Yin Liao, Jen-Wei Yeh, Ming-Seng Kao A Copy Protection Technique Using Multi-level Error Coding. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Paul T. Myrda, Eric A. Udren System-Wide Replacement Strategy for Substation Protection and Automation Systems. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20M. Abdesh S. K. Khan, T. S. Radwan, M. Azizur Rahman Wavelet Packet Transform Based Protection of Disturbances in Three-Phase Interior Permanent Magnet Motor Fed from Sinusoidal PWM Voltage Source Inverter. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Ted Huffmire, Shreyas Prasad, Timothy Sherwood, Ryan Kastner Policy-Driven Memory Protection for Reconfigurable Hardware. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Embedded Systems, Computer Security, Security Policies, Policy Languages, Reference Monitors, Separation Kernels
20Stephen Lau, Scott Campbell, William T. Kramer, Brian Tierney S06 - Computing protection in open HPC environments. Search on Bibsonomy SC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Rui D. Jorge, Carlos Viegas Damásio Diagnosis of Power System Protection. Search on Bibsonomy IEA/AIE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Tomaz Klobucar Privacy and data protection in technology-enhanced professional learning. Search on Bibsonomy AICT/ICIW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Ghassan Al-Regib, Yucel Altunbasak, Jarek Rossignac An unequal error protection method for progressively transmitted 3D models. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Bob Hutchinson The future of systematic information protection. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Shoichiro Seno, Teruko Fujii, Motofumi Tanabe, Eiichi Horiuchi, Yoshimasa Baba, Tetsuo Ideguchi A Proposal and Evaluation of Multi-class Optical Path Protection Scheme for Reliable Computing. Search on Bibsonomy HPCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20David M. Nicol, Hamed Okhravi Performance analysis of binary code protection. Search on Bibsonomy WSC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Anna Urra, Eusebi Calle, José-Luis Marzo Enhanced Protection Using Shared Segment Backups in a Multiservice GMPLS-Based Networks. Search on Bibsonomy ISCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Qingkai Ma, Liangliang Xiao, I-Ling Yen, Manghui Tu, Farokh B. Bastani An Adaptive Multiparty Protocol for Secure Data Protection. Search on Bibsonomy ICPADS (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Son-Hong Ngo, Xiaohong Jiang 0001, Susumu Horiguchi Dynamic Lightpath Protection in WDM optical Networks Using Ant-based Mobile Agents. Search on Bibsonomy IAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Changjie Wang, Ho-fung Leung Mobile Agents for Secure Electronic Commerce Transactions with Privacy Protection of the Customers. Search on Bibsonomy EEE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Gisle Grimen, Christian Mönch, Roger Midtstraum Software-Based Copy Protection for Temporal Media During Dissemination and Playback. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Elyse Rosenbaum, Sami Hyvonen On-chip ESD protection for RF I/Os: devices, circuits and models. Search on Bibsonomy ISCAS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Xiaoming Wang, Bin B. Zhu, Shipeng Li 0001 A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network. Search on Bibsonomy DRMTICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Yu-Quan Zhang, Sabu Emmanuel A Novel Framework for Multiple Creatorship Protection of Digital Movies. Search on Bibsonomy DRMTICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Vural Ünlü, Thomas Hess The Access-Usage-Control-Matrix: A Heuristic Tool for Implementing a Selected Level of Technical Content Protection. Search on Bibsonomy CEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Sung-eok Jeon Redundant Protection Problem in the Hierarchical GMPLS Networks. Search on Bibsonomy LCN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Sabina Hosic, Aykut Hocanin, Hasan Demirel Unequal Error Protection Using Convolutional Codes for PCA-Coded Images. Search on Bibsonomy ICIAR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Victor F. Sanchez, Mrinal K. Mandal 0001 Efficient channel protection for JPEG2000 bitstream. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Rouying Zhan, Haigang Feng, Qiong Wu 0013, Haolu Xie, Xiaokang Guan, Guang Chen, Albert Z. Wang ESDInspector: a new layout-level ESD protection circuitry design verification tool using a smart-parametric checking mechanism. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Pin-Han Ho, Hussein T. Mouftah A novel survivable routing algorithm for shared segment protection in mesh WDM networks with partial wavelength conversion. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Srinivasan Ramasubramanian On Failure Dependent Protection in Optical Grooming Networks. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Darli A. A. Mello, Marcio S. Savasini, Jefferson U. Pelegrini, Helio Waldman On-Arrival Planning for Sub-Graph Routing Protection in WDM Networks. Search on Bibsonomy OpNeTec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Ranjan Gangopadhyay, Giancarlo Prati, N. Rao Semi-Lightpath Approach for Bandwidth Guaranteed Protection in IP-Over-WDM Networks. Search on Bibsonomy OpNeTec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Rouying Zhan, Haigang Feng, Qiong Wu 0013, Xiaokang Guan, Guang Chen, Haolu Xie, Albert Z. Wang Concept and extraction method of ESD-critical parameters for function-based layout-level ESD protection circuit design verification. Search on Bibsonomy ASP-DAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Jukka Ylitalo, Pekka Nikander BLIND: A Complete Identity Protection Framework for End-Points. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Andrew K. Wright, John A. Kinast, Joe McCarty Low-Latency Cryptographic Protection for SCADA Communications. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Vito Cappellini, Giovanna Damiani, Alessandro Piva Protection of Cultural Heritage Contents on the Web. Search on Bibsonomy DEXA Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Chen-Shie Ho, Ing-Yi Chen, Sy-Yen Kuo Dynamic Sub-mesh Protection under Dynamic Traffic Demands in Dense WDM Networks. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Sun-il Kim, Steven S. Lumetta Capacity-Efficient Protection with Fast Recovery in Optically Transparent Mesh Networks. Search on Bibsonomy BROADNETS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Wang Yao, Byrav Ramamurthy Survivable Traffic Grooming with Path Protection at the Connection Level in WDM Mesh Networks. Search on Bibsonomy BROADNETS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Ricardo Staciarini Puttini, Ludovic Mé, Rafael Timóteo de Sousa Júnior Preventive and Corrective Protection for Mobile Ad Hoc Network Routing Protocols. Search on Bibsonomy WONS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Atte Helminen, U. Pulkkinen Quantitative Reliability Estimation of a Computer-Based Motor Protection Relay Using Bayesian Networks. Search on Bibsonomy SAFECOMP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Yeongsub Cho, Sangrae Cho, Daeseon Choi, Seunghun Jin, Kyoil Chung, Cheehang Park A Location Privacy Protection Mechanism for Smart Space. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20S. Sridharan, Ghanshyam Nayak, P. R. Mukund LNA design optimization with reference to ESD protection circuitry. Search on Bibsonomy ISCAS (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Hiroki Sayama Self-Protection Maintains Diversity of Artificial Self-Replicators. Search on Bibsonomy Evolvable Hardware The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Paolo Maggi, Riccardo Sisto A configurable mobile agent data protection protocol. Search on Bibsonomy AAMAS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF mobile agents, data integrity, cryptographic protocols, data authenticity
20José Ambrosio Toval Álvarez, Alfonso Olmos, Mario Piattini Legal Requirements Reuse: A Critical Success Factor for Requirements Quality and Personal Data Protection. Search on Bibsonomy RE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20E. S. Siougle, Vasilios Zorkadis A Model Enabling Law Compliant Privacy Protection through the Selection and Evaluation of Appropriate Security Controls. Search on Bibsonomy InfraSec The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Hungjen Wang, Eytan H. Modiano, Muriel Médard Partial path protection for WDM networks: end-to-end recovery using local failure information. Search on Bibsonomy ISCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Ming-Dou Ker, Kuo-Chun Hsu On-chip ESD protection circuit design with novel substrate-triggered SCR device in sub-quarter-micron CMOS process. Search on Bibsonomy ISCAS (5) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Chu-Hsing Lin, Chen-Yu Lee A Software Protection System for Internet Commerce. Search on Bibsonomy IEEE Pacific Rim Conference on Multimedia The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20H. Feng, R. Zhan, Q. Wu, G. Chen, X. Guan, A. Z. Wang RC-SCR: a novel low-voltage ESD protection circuit with new triggering mechanism. Search on Bibsonomy APCCAS (2) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Choshu Ito, Kaustav Banerjee, Robert W. Dutton Analysis and Design of ESD Protection Circuits for High-Frequency/RF Applications. Search on Bibsonomy ISQED The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
20Arun G. Phadke, Nouredine Hadjsaid Measurements for Adaptive Protection and Control in a Competitive Market. Search on Bibsonomy HICSS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Timothy Fraser LOMAC: Low Water-Mark Integrity Protection for COTS Environments. Search on Bibsonomy S&P The full citation details ... 2000 DBLP  DOI  BibTeX  RDF low water-mark, linux security, access control, integrity, mandatory access control, security policy model
20Ming-Dou Ker, Hun-Hsien Chang, Tung-Yang Chen ESD buses for whole-chip ESD protection. Search on Bibsonomy ISCAS (1) The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
20Tzi-cker Chiueh, Ganesh Venkitachalam, Prashant Pradhan Intra-Address Space Protection using Segmentation Hardware. Search on Bibsonomy Workshop on Hot Topics in Operating Systems The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Kernel Extensions, Segmentation, Extensibility, Component Based Software Development
20James Noble 0001, Jan Vitek, John Potter Flexible Alias Protection. Search on Bibsonomy ECOOP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
20Wai W. Fung, James W. Gray III Protection Against EEPROM Modification Attacks. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
20Ming-Dou Ker, Chung-Yu Wu, Tao Cheng, Hun-Hsien Chang Capacitor-couple ESD protection circuit for deep-submicron low-voltage CMOS ASIC. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
20Warwick Ford, Michael J. Wiener A Key Distribution Method for Object-Based Protection. Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
20Oded Goldreich 0001 Towards a Theory of Software Protection. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
20Joos Vandewalle, René Govaerts, W. De Becker, Marc Decroos, G. Speybrouck Implementation Study of Public Key Cryptographic Protection in an Existing Electronic Mail and Document Handling System. Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
20Douglas W. Jones Systematic Protection Mechanism Design. Search on Bibsonomy ASPLOS The full citation details ... 1982 DBLP  DOI  BibTeX  RDF Ada
20Matt Bishop Hierarchical Take-Grant Protection Systems. Search on Bibsonomy SOSP The full citation details ... 1981 DBLP  DOI  BibTeX  RDF
19Lee M. Hively, Frederick T. Sheldon, Anna Cinzia Squicciarini Toward Scalable Trustworthy Computing Using the Human-Physiology-Immunity Metaphor. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF C.2.2 Network Protocols, trust establishment system, acces control models, K.6.5.a Authentication, K.6.5 Security and Protection, D.4.6.a Access controls, A.1 Introductory and Survey, C.2.0.f Network-level security and protection, C.4.f Reliability, D.2.15 Software and System Safety, Security, Software Engineering, Reliability, formal methods, Validation, Dependability, negotiations, peer to peer system, Statistical Methods, Testing strategies, Requirements/Specifications, availability and serviceability, Software/Program Verification
19Carl A. Gunter, David M. Liebovitz, Bradley A. Malin Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF security and privacy protection knowledge, data engineering tools and techniques, security, privacy, integrity and protection, public policy issues
19Chris Strasburg, Sandeep Krishnan, Karin S. Dorman, Samik Basu 0001, Johnny S. Wong Masquerade Detection in Network Environments. Search on Bibsonomy SAINT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF D.4.6. Security and Privacy Protection, H.1.2. User/Machine Systems, K.6.5. Security and Protection
19Saraju P. Mohanty, Bharat K. Bhargava Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks. Search on Bibsonomy ACM Trans. Multim. Comput. Commun. Appl. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF invisible watermarking, Watermarking, image, copyright protection, content protection
19Fang Liu 0025, Xiuzhen Cheng 0001, Liran Ma, Kai Xing SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Network-level security and protection, integrity and protection
19William G. J. Halfond, Alessandro Orso, Pete Manolios WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security and Protection, Protection mechanisms
19Zhenhai Duan, Xin Yuan 0001, Jaideep Chandrashekar Controlling IP Spoofing through Interdomain Packet Filters. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Infrastructure Protection, Routing Protocols, BGP, DDoS, Network-level security and protection, IP Spoofing
19Eunjin Jung, Ehab S. Elmallah, Mohamed G. Gouda Optimal Dispersal of Certificate Chains. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF certificate graph, certificate dispersal, public-key management, authentication, authentication, security and protection, Security and privacy protection
19Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cost/performance, Security, Simulation, Optimization, Algorithms, Dynamic programming, Wireless communication, Emerging technologies, Wireless systems, Data encryption, Data Encryption, Security and Privacy Protection, integrity and protection
19Jun Yang 0002, Lan Gao, Youtao Zhang Improving Memory Encryption Performance in Secure Processors. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF hardware/software protection, security and protection, Memory design
19Alen Peacock, Xian Ke, Matthew Wilkerson Typing Patterns: A Key to User Identification. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Keystroke, Security, Pattern Recognition, Authentication, Authentication, Biometrics, Typing, Intellectual Property, User Authentication, network-level security and protection, Security and Privacy Protection, User Identification
19Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere Software piracy prevention through diversity. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF software piracy prevention, tailored updates, authentication, diversity, identification, copyright protection, intellectual property protection
19Gustavo Neuberger, Fernanda Gusmão de Lima Kastensmidt, Luigi Carro, Ricardo Augusto da Luz Reis A multiple bit upset tolerant SRAM memory. Search on Bibsonomy ACM Trans. Design Autom. Electr. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Hamming and Reed-Solomon codes, high-level protection technique, protection against radiation, fault injection, Fault tolerant memory
19Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, Emil Lupu, Morris Sloman A Flexible Access Control Service for Java Mobile Code. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF flexible access control service, Java mobile code, remote servers, distributed heterogeneous clients, foreign code execution, host node protection, code protection, sandbox model, downloaded code, source location, inter-organisational environments, expressive languages, Ponder, Java security architecture, Java, Internet, specification languages, security policies, signature, distributed programming, Internet applications, authorisation, declarative language, technology diffusion, dynamic loading
19Bogdan Kasztenny, Eugeniusz Rosolowski A digital protective relay as a real-time microprocessor system. Search on Bibsonomy ECBS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF power system protection, digital protective relay, real-time microprocessor system, protection system, hardware, power system, software structures
19Earl C. Van Horn Three criteria for designing computing systems to facilitate debugging. Search on Bibsonomy Commun. ACM The full citation details ... 1968 DBLP  DOI  BibTeX  RDF computer design criteria, computer systems design, computing reliability, deterministic computers, input equipment, input equipment design, multiprogrammed system design, multiprogrammed systems, parallel processing, parallel programming, parallel, debugging, operating systems, programming, programming languages, information security, program testing, determinism, program debugging, protection, multiprogramming, multiprocessing, repeatability, computer systems, memory protection, reproducibility, programming language semantics, programming language design, virtual computers, computer design, information privacy, program semantics, operating systems design, multi processing
18Ian Reay, Scott Dick, James Miller 0001 A large-scale empirical study of P3P privacy policies: Stated actions vs. legal obligations. Search on Bibsonomy ACM Trans. Web The full citation details ... 2009 DBLP  DOI  BibTeX  RDF legislation and enforcement, electronic commerce, Privacy protection, P3P
18Zhe Jin, Andrew Beng Jin Teoh, Thian Song Ong, Connie Tee Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing. Search on Bibsonomy IVIC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF fingerprint minutiae, random triangle hashing, template protection, cancelable biometrics
18Xiaoguang Liu 0001, Gang Wang 0001, Feng Wang, Yongzhi Song SnapCDP : A CDP System Based on LVM. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Continuous Data Protection, Backup Technology, Logical Volume Manager
18Esma Aïmeur, Gilles Brassard, José M. Fernandez 0001, Flavien Serge Mani Onana Alambic : a privacy-preserving recommender system for electronic commerce. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Semi-trusted third party, Recommender system, Privacy protection, Web personalization, Secure two-party computation
18Mitsuo Hayasaka, Tetsuya Miki A Network Architecture with High Availability for Real-time Premium Traffic over the Internet. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Path protection, Forward error correction, Packet loss ratio
18Esma Aïmeur, Gilles Brassard, José M. Fernandez 0001, Flavien Serge Mani Onana, Zbigniew Rakowski Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF recommender systems, privacy protection, hybrid recommender systems
18Francesco Flammini, Andrea Gaglione, Nicola Mazzocca, Concetta Pragliola Quantitative Security Risk Assessment and Management for Railway Transportation Infrastructures. Search on Bibsonomy CRITIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Quantitative Approaches, Cost/Benefit Evaluation, Security, Risk Analysis, Railways, Critical Infrastructure Protection
18Nikolai Joukov, Josef Sipek GreenFS: making enterprise computers greener by protecting them better. Search on Bibsonomy EuroSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF continuous data protection, power efficiency, backup
18Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ahamad Protectit: trusted distributed services operating on sensitive data. Search on Bibsonomy EuroSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF traffic interception, trusted data path, data protection
Displaying result #901 - #1000 of 22913 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license