The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "Communications and Multimedia Security"( http://dblp.L3S.de/Venues/Communications_and_Multimedia_Security )

URL (DBLP): http://dblp.uni-trier.de/db/conf/cms

Publication years (Num. hits)
1996 (28) 1999 (22) 2001 (36) 2002 (23) 2003 (22) 2004 (21) 2005 (47) 2006 (23) 2010 (24) 2011 (30) 2012 (25) 2013 (24) 2014 (16)
Publication types (Num. hits)
inproceedings(328) proceedings(13)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 88 occurrences of 78 keywords

Results
Found 341 publication records. Showing 341 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Dalia Khader D-Shuffle for Prêt à Voter. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ping Chen, Lieven Desmet, Christophe Huygens A Study on Advanced Persistent Threats. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Faysal Boukayoua, Jorn Lapon, Bart De Decker, Vincent Naessens Secure Storage on Android with Context-Aware Access Control. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dalia Khader Introduction to Attribute Based Searchable Encryption. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Abdulrahman Al-Mutairi, Stephen D. Wolthusen Malicious MPLS Policy Engine Reconnaissance. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rodolphe Marques, André Zúquete Decentralized Bootstrap for Social Overlay Networks. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Alexander Chan, Tzipora Halevi, Nasir D. Memon Touchpad Input for Continuous Biometric Authentication. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rui Melo Biscaia The Fundamental Principle of Breach Prevention. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Andrea Kolberger, Ingrid Schaumüller-Bichl, Martin Deutschmann Risk Analysis of Physically Unclonable Functions. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bart De Decker, André Zúquete (eds.) Communications and Multimedia Security - 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Paulo Pinto, Bernardo Patrão, Henrique Santos 0001 Free Typed Text Using Keystroke Dynamics for Continuous Authentication. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1André Pereira, Manuel Eduardo Correia, Pedro Brandão USB Connection Vulnerabilities on Android Smartphones: Default and Vendors' Customizations. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bernd Zwattendorfer, Daniel Slamanig, Klaus Stranacher, Felix Hörandner A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dmitry Chernyavskiy, Natalia G. Miloslavskaya An Approach to Information Security Policy Modeling for Enterprise Networks. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Paulo Mateus, Nikola Paunkovic, João Rodrigues, André Souto Enhancing Privacy with Quantum Networks. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Suaad S. Alarifi, Stephen D. Wolthusen Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Y. Sreenivasa Rao, Ratna Dutta Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Huajian Liu, Yiyao Li, Martin Steinebach Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Edward Caprin, Yan Zhang SocACL: An ASP-Based Access Control Language for Online Social Networks. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Konstantinos Raftopoulos, Klimis S. Ntalianis, Paraskevi K. Tzouveli, Nicolas Tsapatsoulis, Aleatha Parker-Wood, Marin Ferecatu Watermark Resynchronization: An Efficient Approach Based on Eulerian Tours around a Robust Skeleton. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Takayuki Yamada, Seiichi Gohshi, Isao Echizen Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sabah A. Jassim Face Recognition from Degraded Images - Super Resolution Approach by Non-adaptive Image-Independent Compressive Sensing Dictionaries. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jutta Hämmerle-Uhl, Michael Pober, Andreas Uhl Towards a Standardised Testsuite to Assess Fingerprint Matching Robustness: The StirMark Toolkit - Cross-Feature Type Comparisons. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mario Hildebrandt, Andrey Makrushin, Kun Qian 0001, Jana Dittmann Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mario Hildebrandt, Jennifer Sturm, Jana Dittmann, Claus Vielhauer Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xiaofeng Xia An Equivalent Access Based Approach for Building Collaboration Model between Distinct Access Control Models. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hieu Cuong Nguyen, Stefan Katzenbeisser 0001 Detecting Resized Double JPEG Compressed Images - Using Support Vector Machine. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Andreas Westfeld, Jürgen Wurzer, Christian Fabian, Ernst Piller Pit Stop for an Audio Steganography Algorithm. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Matthias Trojahn, Florian Arndt, Frank Ortmeier Authentication with Time Features for Keystroke Dynamics on Touchscreens. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Boris Assanovich, William Puech, Iuliia Tkachenko Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Benedikt Driessen, Markus Dürmuth Achieving Anonymity against Major Face Recognition Algorithms. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens Client-Side Biometric Verification Based on Trusted Computing. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gábor György Gulyás, Sándor Imre Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Martin Steinebach, Peter Klöckner, Nils Reimers, Dominik Wienand, Patrick Wolf Robust Hash Algorithms for Text. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer (eds.) Communications and Multimedia Security - 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Andreas Hasselberg, René Zimmermann, Christian Kraetzer, Tobias Scheidat, Claus Vielhauer, Karl Kümmel Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jana Fruth, Carsten Schulze, Marleen Rohde, Jana Dittmann E-Learning of IT Security Threats: A Game Prototype for Children. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sachar Paulus, Nazila Gol Mohammadi, Thorsten Weyer Trustworthy Software Development. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Geoffrey Ottoy, Jorn Lapon, Vincent Naessens, Bart Preneel, Lieven De Strycker Dedicated Hardware for Attribute-Based Credential Verification. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marcel Eckert, Igor Podebrad, Bernd Klauer Hardware Based Security Enhanced Direct Memory Access. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1André Zúquete, Pedro Correia, Miguel Rocha A Framework for Enforcing User-Based Authorization Policies on Packet Filter Firewalls. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Graeme Horsman, Christopher Laing, Paul Vickers A Method for Reducing the Risk of Errors in Digital Forensic Investigations. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Amar Siad A New Approach for Private Searches on Public-Key Encrypted Data. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jan Hajny, Lukas Malina Practical Revocable Anonymous Credentials. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mouhamadou L. Diong, Patrick Bas, Chloé Pelle, Wadih Sawaya Document Authentication Using 2D Codes: Maximizing the Decoding Performance Using Statistical Inference. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Siani Pearson Privacy Management in Global Organisations. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Steffen Wendzel, Jörg Keller 0001 Systematic Engineering of Control Protocols for Covert Channels. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hieu Cuong Nguyen, Stefan Katzenbeisser 0001 Robust Resampling Detection in Digital Images. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Karl Kümmel, Tobias Scheidat, Claus Vielhauer, Jana Dittmann Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Patrik Bichsel, Jan Camenisch, Bart De Decker, Jorn Lapon, Vincent Naessens, Dieter Sommer Data-Minimizing Authentication Goes Mobile. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Andrey Makrushin, Tobias Kiertscher, Robert Fischer 0001, Stefan Gruhn, Claus Vielhauer, Jana Dittmann Computer-Aided Contact-Less Localization of Latent Fingerprints in Low-Resolution CWL Scans. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jürgen Fuß, Wolfgang Kastl, Robert Kolmhofer, Georg Schönberger, Florian Wex Cuteforce Analyzer: Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Elke Franz, Stefan Pfennig, André Fischer Efficiency of Secure Network Coding Schemes. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Milica Milutinovic, Vincent Naessens, Bart De Decker Privacy-Preserving Scheduling Mechanism for eHealth Systems. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tobias Scheidat, Karl Kümmel, Claus Vielhauer Short Term Template Aging Effects on Biometric Dynamic Handwriting Authentication Performance. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1William Perrizo, Arjun G. Roy Predicate-Tree Based Pretty Good Privacy of Data. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Roland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang A New Approach to Commutative Watermarking-Encryption. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Robert Fischer 0001, Tobias Kiertscher, Stefan Gruhn, Tobias Scheidat, Claus Vielhauer From Biometrics to Forensics: A Feature Collection and First Feature Fusion Approaches for Latent Fingerprint Detection Using a Chromatic White Light (CWL) Sensor. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Zhuo Wei, Xuhua Ding, Robert Huijie Deng, Yongdong Wu No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hanno Langweg OOXML File Analysis of the July 22nd Terrorist Manual. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jon Crowcroft, Ian Brown From Panopticon to Fresnel, Dispelling a False Sense of Security. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mohamed Maachaoui, Anas Abou El Kalam, Christian Fraboul, Abdellah Ait Ouahman Multi-level Authentication Based Single Sign-On for IMS Services. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Bart De Decker, David W. Chadwick (eds.) Communications and Multimedia Security - 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Saloomeh Shariati, François Koeune, François-Xavier Standaert Security Analysis of Image-Based PUFs for Anti-counterfeiting. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Patrick Bas, Teddy Furon Are 128 Bits Long Keys Possible in Watermarking? Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Karl Kümmel, Tobias Scheidat, Christian Arndt, Claus Vielhauer Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bart De Decker, Jorn Lapon, Vincent Naessens, Andreas Uhl (eds.) Communications and Multimedia Security, 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21,2011. Proceedings Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Geoffrey Ottoy, Jeroen Martens, Nick Saeys, Bart Preneel, Lieven De Strycker, Jean-Pierre Goemaere, Tom Hamelinckx A Modular Test Platform for Evaluation of Security Protocols in NFC Applications. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Philipp Winter, Harald Lampesberger, Markus Zeilinger, Eckehard Hermann On Detecting Abrupt Changes in Network Entropy Time Series. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kurt Dietrich, Johannes Winter, Granit Luzhnica, Siegfried Podesser Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Milica Milutinovic, Roel Peeters, Bart De Decker Secure Negotiation for Manual Authentication Protocols. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Reinhard Huber, Herbert Stögner, Andreas Uhl Two-Factor Biometric Recognition with Integrated Tamper-Protection Watermarking. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Li Weng, Bart Preneel A Secure Perceptual Hash Algorithm for Image Content Authentication. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Georg Schönberger, Jürgen Fuß GPU-Assisted AES Encryption Using GCM. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu Dynamic Software Birthmark for Java Based on Heap Memory Analysis. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider 0003 Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version). Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jana Fruth, Ronny Merkel, Jana Dittmann Security Warnings for Children's Smart Phones: A First Design Approach. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ronny Merkel, Jana Dittmann, Claus Vielhauer Approximation of a Mathematical Aging Function for Latent Fingerprint Traces Based on First Experiments Using a Chromatic White Light (CWL) Sensor and the Binary Pixel Aging Feature. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Daniel Slamanig Anonymous Authentication from Public-Key Encryption Revisited - (Extended Abstract). Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jorn Lapon, Markulf Kohlweiss, Bart De Decker, Vincent Naessens Analysis of Revocation Strategies for Anonymous Idemix Credentials. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ronald E. Leenes Who Needs Facebook Anyway - Privacy and Sociality in Social Network Sites. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Lisa Rajbhandari, Einar Snekkenes Mapping between Classical Risk Management and Game Theoretical Approaches. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dung Q. Nguyen, Li Weng, Bart Preneel Radon Transform-Based Secure Image Hashing. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mohamed Maachaoui, Anas Abou El Kalam, Christian Fraboul A Secure One-Way Authentication Protocol in IMS Context. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mehdi Fallahpour, David Megías High Capacity FFT-Based Audio Watermarking. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jaap-Henk Hoepman Mobile Identity Management. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Muhammad Asim, Luan Ibraimi, Milan Petkovic Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Koen Decroix, Milica Milutinovic, Bart De Decker, Vincent Naessens A Generic Architecture for Integrating Health Monitoring and Advanced Care Provisioning. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Steffen Wendzel, Jörg Keller 0001 Low-Attention Forwarding for Mobile Network Covert Channels. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Matthew Hall, Reinoud Koornstra, Miranda Mowbray Efficient Prevention of Credit Card Leakage from Enterprise Networks. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Moti Yung From Protecting a System to Protecting a Global Ecosystem. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Krzysztof Juszczyszyn, Grzegorz Kolaczek Motif-Based Attack Detection in Network Communication Graphs. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Konstantinos Rantos Digital Signatures: How Close Is Europe to Truly Interoperable Solutions? Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mahdi R. Alaghband, Mohammad Reza Aref A Secure Key Management Framework for Heterogeneous Wireless Sensor Networks. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Fuwen Liu, Hartmut König Cryptanalysis of a SIP Authentication Scheme. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Christopher James Hargreaves, Howard Chivers Detecting Hidden Encrypted Volumes. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Matthias Häsel, Luigi Lo Iacono Security in OpenSocial-Instrumented Social Networking Services. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nils Gruschka, Luigi Lo Iacono Security for XML Data Binding. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Peter Meerwald, Andreas Uhl Watermark Detection for Video Bookmarking Using Mobile Phone Camera. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kurt Dietrich Anonymous Client Authentication for Transport Layer Security. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 341 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license