The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for protocols with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1970-1975 (15) 1976-1977 (21) 1978-1979 (32) 1980 (28) 1981 (41) 1982 (55) 1983 (113) 1984 (78) 1985 (77) 1986 (142) 1987 (119) 1988 (159) 1989 (229) 1990 (240) 1991 (253) 1992 (299) 1993 (290) 1994 (339) 1995 (391) 1996 (424) 1997 (481) 1998 (573) 1999 (681) 2000 (894) 2001 (993) 2002 (1237) 2003 (1480) 2004 (1961) 2005 (2445) 2006 (2467) 2007 (2537) 2008 (2634) 2009 (1789) 2010 (993) 2011 (944) 2012 (818) 2013 (829) 2014 (790) 2015 (772) 2016 (838) 2017 (794) 2018 (815) 2019 (815) 2020 (825) 2021 (718) 2022 (715) 2023 (674) 2024 (122)
Publication types (Num. hits)
article(9381) book(76) incollection(291) inproceedings(24380) phdthesis(728) proceedings(123)
Venues (Conferences, Journals, ...)
ICNP(1563) CoRR(1027) SIGCOMM(980) Security Protocols Workshop(811) NETWORKING(572) IACR Cryptol. ePrint Arch.(500) FORTE(341) LCN(283) ICC(249) CRYPTO(202) IEEE Trans. Parallel Distribut...(198) ISCC(193) INFOCOM(189) IEEE/ACM Trans. Netw.(184) ICDCS(182) IPDPS(177) More (+10 of total 3896)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 25318 occurrences of 6008 keywords

Results
Found 34979 publication records. Showing 34979 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
21Joshua D. Guttman Shapes: Surveying Crypto Protocol Runs. Search on Bibsonomy Formal Models and Techniques for Analyzing Security Protocols The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Hubert Comon-Lundh, Stéphanie Delaune, Jonathan K. Millen Constraint solving techniques and enriching the model with equational theories. Search on Bibsonomy Formal Models and Techniques for Analyzing Security Protocols The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Michaël Rusinowitch, Mathieu Turuani Verifying a bounded number of sessions and its complexity. Search on Bibsonomy Formal Models and Techniques for Analyzing Security Protocols The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Joseph Bonneau Getting Web Authentication Right A Best-Case Protocol for the Remaining Life of Passwords. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Virgil D. Gligor Towards a Theory of Trust in Networks of Humans and Computers (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Bangdao Chen, Long Hoang Nguyen 0001, Andrew William Roscoe When Context Is Better Than Identity: Authentication by Context Using Empirical Channels. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Alf Zugenmaier Risk of Blind Controller Patterns for Multitag User Interfaces (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Ross J. Anderson Can We Fix the Security Economics of Federated Authentication? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Michael Roe The Metaplace Security Model. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Bruce Christianson Introduction: Alice Doesn't Live Here Anymore (Transcript). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Michael Roe The Metaplace Security Model (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Joseph Bonneau, Rubin Xu Scrambling for Lightweight Censorship Resistance. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Sjouke Mauw Selective Location Blinding Using Hash Chains (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Gabriele Lenzini, Sjouke Mauw, Jun Pang 0001 Selective Location Blinding Using Hash Chains. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Omar Choudary 0001 Make Noise and Whisper: A Solution to Relay Attacks (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Joseph Bonneau Getting Web Authentication Right (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Alex Shafarenko Gearing Up: How to Eat Your Cryptocake and Still Have It (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Rubin Xu Scrambling for Lightweight Censorship Resistance (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Alexander V. Shafarenko, Bruce Christianson Gearing Up: How to Eat Your Cryptocake and Still Have It. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Alf Zugenmaier Risks of Blind Controllers and Deaf Views in Model View Controller Patterns for Multitag User Interfaces. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Feng Hao 0001, Peter Y. A. Ryan How to Sync with Alice. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Virgil D. Gligor, Jeannette M. Wing Towards a Theory of Trust in Networks of Humans and Computers. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Ross J. Anderson Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21James Malcolm The Sense of Security and a Countermeasure for the False Sense (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Jonathan Anderson, Frank Stajano, Robert N. M. Watson How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Jirí Kur, Vashek Matyas, Andriy Stetsko, Petr Svenda Attack Detection vs. Privacy - How to Find the Link or How to Hide It? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Matt Blaze One-Way Cryptography (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Yuko Murayama, Yasuhiro Fujihara, Dai Nishioka The Sense of Security and a Countermeasure for the False Sense. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Frank Stajano Pico: No More Passwords! Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Jirí Kur, Andriy Stetsko Attack Detection vs Privacy - How to Find the Link or How to Hide It (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Feng Hao 0001 How to Sync with Alice (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Jonathan Anderson How to Keep Bad Papers Out of Conferences (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman, Kevin Xu, Matt Blaze One-Way Cryptography. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Mike Burmester His Late Master's Voice (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Mike Burmester His Late Master's Voice: Barking for Location Privacy. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Frank Stajano Pico: No More Passwords! (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Bangdao Chen When Context Is Better Than Identity (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Omar Choudary 0001, Frank Stajano Make Noise and Whisper: A Solution to Relay Attacks. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Bengt Jonsson 0001, Jörg Kreiker, Marta Z. Kwiatkowska (eds.) Quantitative and Qualitative Analysis of Network Protocols, 31.01. - 05.02.2010 Search on Bibsonomy Quantitative and Qualitative Analysis of Network Protocols The full citation details ... 2010 DBLP  BibTeX  RDF
21Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe (eds.) Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Tobe Toben, Bernd Westphal, Jan-Hendrik Rakow Spotlight Abstraction of Agents and Areas. Search on Bibsonomy Quantitative and Qualitative Analysis of Network Protocols The full citation details ... 2010 DBLP  BibTeX  RDF
21Ross J. Anderson It's the Anthropology, Stupid! (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Richard Mortier, Anil Madhavapeddy, Theodore Hong, Derek Gordon Murray, Malte Schwarzkopf Using Dust Clouds to Enhance Anonymous Communication. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Su-Yang Yu, Jeff Yan Security Design in Human Computation Games. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Giampaolo Bella, Peter Y. A. Ryan, Vanessa Teague Virtually Perfect Democracy. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Virgil D. Gligor Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Ross J. Anderson, Frank Stajano It's the Anthropology, Stupid! Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Saad Aloteibi On the Value of Hybrid Security Testing (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Michael Roe Censorship of eBooks (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Virgil D. Gligor Security Limitations of Virtualization and How to Overcome Them. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Jonathan Anderson On Storing Private Keys in the Cloud (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Bruce Christianson, Alex Shafarenko, Frank Stajano, Ford-Long Wong Relay-Proof Channels Using UWB Lasers. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Joseph Bonneau Digital Immolation - New Directions for Online Protest. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Dieter Gollmann Caught in the Maze of Security Standards (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Sandy Clark, Matt Blaze, Jonathan M. Smith Blood in the Water - Are there Honeymoon Effects Outside Software? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Malte Schwarzkopf Using Dust Clouds to Enhance Anonymous Communication (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Mauro Conti Censorship-Resilient Communications through Information Scattering (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21George Danezis Generating Channel Ids in Virtual World Operating Systems (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Jeff Yan Security Design in Human Computation Games (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Bruce Christianson Introduction: Virtually Perfect Security (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Peter Y. A. Ryan Virtually Perfect Democracy (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Jan Meier, Dieter Gollmann Caught in the Maze of Security Standards. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Sandy Clark Blood in the Water (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Saad Aloteibi, Frank Stajano On the Value of Hybrid Security Testing. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Paulo Veríssimo Security Made, Not Perfect, But Automatic. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Bruce Christianson Recapitulation. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Paulo Veríssimo Security Made, Not Perfect, But Automatic (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Alex Shafarenko Relay-Proof Channels Using UWB Lasers (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Michael Roe Censorship of eBooks (Extended Abstract). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Partha Das Chowdhury, Bruce Christianson More Security or Less Insecurity. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Joseph Bonneau Digital Immolation (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Stefano Ortolani, Mauro Conti, Bruno Crispo Censorship-Resilient Communications through Information Scattering. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Jonathan Anderson, Frank Stajano On Storing Private Keys in the Cloud. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Bruce Christianson More Security or Less Insecurity (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Michael Roe Generating Channel Ids in Virtual World Operating Systems (Extended Abstract). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe (eds.) Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Paul Syverson Why I'm Not an Entropist. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Peter Y. A. Ryan, Vanessa Teague Pretty Good Democracy. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Jonathan Anderson, Frank Stajano Not That Kind of Friend. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Orson Scott Card The Final Word. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Matt Blaze Below the Salt. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Stephen William Clarke, Bruce Christianson, Hannan Xiao Trust*: Using Local Guarantees to Extend the Reach of Trust. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Bruce Christianson Introduction: Brief Encounters. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21George Danezis The Least Privacy-Damaging Centralised Traffic Data Retention Architecture. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Virgil D. Gligor, Adrian Perrig, Jun Zhao 0007 Brief Encounters with a Random Key Graph. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Paul Syverson Why I'm Not an Entropist. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21George Danezis The Least Privacy-Damaging Centralised Traffic Data Retention Architecture. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Xavier Chantry Attacking Each Other. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Sören Preibusch Establishing Distributed Hidden Friendship Relations. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Simon N. Foley, Vivien M. Rooney Qualitative Analysis for Trust Management. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Bruce Christianson Trust*: Using Local Guarantees to Extend the Reach of Trust. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Matt Blaze Is the Honeymoon over? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Ross J. Anderson The Trust Economy of Brief Encounters. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Jirí Kur, Václav Matyás, Petr Svenda Evolutionary Design of Attack Strategies. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Petr Svenda Evolutionary Design of Attack Strategies. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Matt Blaze, Patrick D. McDaniel Below the Salt. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Virgil D. Gligor Brief Encounters with a Random Key Graph. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Dusko Pavlovic, Catherine Meadows 0001 Deriving Ephemeral Authentication Using Channel Axioms. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Chris J. Mitchell A Novel Stateless Authentication Protocol. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Simon N. Foley Qualitative Analysis for Trust Management. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 34979 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license