The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "Security Protocols Workshop"( http://dblp.L3S.de/Venues/Security_Protocols_Workshop )

URL (DBLP): http://dblp.uni-trier.de/db/conf/spw

Publication years (Num. hits)
1996 (18) 1997 (18) 1998 (32) 1999 (20) 2000 (35) 2001 (35) 2002 (21) 2003 (42) 2004 (41) 2005 (45) 2006 (39) 2007 (31) 2008 (34) 2009 (40) 2010 (37) 2011 (37) 2012 (30) 2013 (31) 2014 (38) 2015 (37) 2016 (26) 2017 (34) 2018 (35)
Publication types (Num. hits)
inproceedings(733) proceedings(23)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 12 occurrences of 11 keywords

Results
Found 756 publication records. Showing 756 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jeff Yan How Does Match-Fixing Inform Computer Game Security? (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fabio Massacci, Chan Nam Ngo, Daniele Venturi 0001, Julian Williams Non-monotonic Security Protocols and Failures in Financial Intermediation. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sarah Azouvi, Alexander Hicks, Steven J. Murdoch Incentives in Security Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Graham Rymer, David Llewellyn-Jones Raven Authentication Service - Attacks and Countermeasures. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tudor Dumitras Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Erinn Atwater, Ian Goldberg Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ross Anderson Making Bitcoin Legal (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Taciane Martimiano, Jean Everson Martina Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Joan Feigenbaum, Daniel J. Weitzner On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Erinn Atwater, Ian Goldberg Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Steven J. Murdoch Incentives in Security Protocols (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kat Krol, David Llewellyn-Jones, Seb Aebischer, Claudio Dettoni, Frank Stajano Intentionality and Agency in Security. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Patrick McCorry Why Preventing a Cryptocurrency Heist Isn't Good Enough (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ross Anderson, Ilia Shumailov, Mansoor Ahmed Making Bitcoin Legal. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Peter Y. A. Ryan HoneyPAKEs (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Virgil D. Gligor, Maverick Woo Requirements for Root of Trust Establishment. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Martin Kleppmann, Stephan A. Kollmann, Diana A. Vasile, Alastair R. Beresford From Secure Messaging to Secure Collaboration. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lukas Nemec Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wanpeng Li Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vashek Matyás, Petr Svenda, Frank Stajano, Bruce Christianson, Jonathan Anderson (eds.) Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Graham Rymer Raven Authentication Service Attacks and Countermeasures (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1José Becerra, Peter B. Rønne, Peter Y. A. Ryan, Petra Sala HoneyPAKEs. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tudor Dumitras, Yigitcan Kaya, Radu Marginean, Octavian Suciu Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Frank Stajano, T. Mark A. Lomas User Authentication for the Internet of Things. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wanpeng Li, Chris J. Mitchell, Thomas Chen Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lukas Nemec, Radim Ostádal, Vashek Matyas, Petr Svenda Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fabio Massacci Non-monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1T. Mark A. Lomas User Authentication for the Internet of Things (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Patrick McCorry, Malte Möser, Syed Taha Ali Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Daniel J. Weitzner On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kat Krol Intentionality and Agency in Security (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jeff Yan How Does Match-Fixing Inform Computer Game Security? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jean Everson Martina Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Martin Kleppmann From Secure Messaging to Secure Collaboration (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Virgil D. Gligor Requirements for Root of Trust Establishment (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Marcus Völp, Francisco Rocha, Jeremie Decouchant, Jiangshan Yu, Paulo Jorge Esteves Veríssimo Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Simon N. Foley Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ross Anderson Reconciling Multiple Objectives - Politics or Markets? (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Dylan Clarke End to End Security is Not Enough (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jonathan Weekes Controlling Your Neighbour's Bandwidth for Fun and for Profit (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ross J. Anderson, Khaled Baqer Reconciling Multiple Objectives - Politics or Markets? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Frank Stajano Assuring the Safety of Asymmetric Social Protocols (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Milan Broz Extending Full Disk Encryption for the Future. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1A. W. Roscoe, Peter Y. A. Ryan Auditable PAKEs: Approaching Fair Exchange Without a TTP. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thanh Bui Key Exchange with the Help of a Public Ledger (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chan Nam Ngo The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Paul Wernick Simulating Perceptions of Security (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marios O. Choudary Security from Disjoint Paths: Is It Possible? (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Joan Feigenbaum, Bryan Ford Multiple Objectives of Lawful-Surveillance Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Paul Wernick, Bruce Christianson, Joseph Spring Simulating Perceptions of Security. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sergiu Costea, Marios O. Choudary, Costin Raiciu Security from Disjoint Paths: Is It Possible? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Peter Y. A. Ryan Auditable PAKEs: Approaching Fair Exchange Without a TTP (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hugo Jonker A Security Perspective on Publication Metrics (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hugo Jonker, Sjouke Mauw A Security Perspective on Publication Metrics. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Dylan Clarke, Syed Taha Ali End to End Security is Not Enough. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jonathan Anderson, Vashek Matyás, Bruce Christianson, Frank Stajano (eds.) Security Protocols XXIV - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Partha Das Chowdhury, Bruce Christianson Self Attestation of Things. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fabio Massacci, Chan Nam Ngo, Jing Nie, Daniele Venturi 0001, Julian Williams The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mark Dermot Ryan Making Decryption Accountable (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Simon N. Foley Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marcus Völp Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Milan Broz Extending Full Disk Encryption for the Future (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Frank Stajano, Jonathan Anderson, Bruce Christianson, Vashek Matyás (eds.) Security Protocols XXV - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jonathan Weekes, Shishir Nagaraja Controlling Your Neighbour's Bandwidth for Fun and for Profit. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Partha Das Chowdhury Self Attestation of Things (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mark Dermot Ryan Making Decryption Accountable. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Virgil D. Gligor, Frank Stajano Assuring the Safety of Asymmetric Social Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Joan Feigenbaum Multiple Objectives of Lawful-Surveillance Protocols (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thanh Bui, Tuomas Aura Key Exchange with the Help of a Public Ledger. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1A. W. Roscoe Detecting Failed Attacks on Human-Interactive Security Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Radim Ostádal, Petr Svenda, Vashek Matyás Reconsidering Attacker Models in Ad-Hoc Networks. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Paul Wernick, Bruce Christianson The Price of Belief: Insuring Credible Trust? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Olgierd Pieczul, Simon N. Foley The Evolution of a Security Control. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Brian J. Kidney, Jonathan Anderson Exploiting Autocorrect to Attack Privacy. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Min Suk Kang, Virgil D. Gligor, Vyas Sekar Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Brian J. Kidney Exploiting Autocorrect to Attack Privacy (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hugo Jonker Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1David Llewellyn-Jones Explicit Delegation Using Configurable Cookies (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jeff Yan Novel Security and Privacy Perspectives of Camera Fingerprints. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Frank Stajano Red Button and Yellow Button: Usable Security for Lost Security Tokens (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Virgil D. Gligor Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Khaled Baqer, Ross J. Anderson SMAPs: Short Message Authentication Protocols (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1David Llewellyn-Jones, Graeme Jenkinson, Frank Stajano Explicit Delegation Using Configurable Cookies. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jeff Yan Novel Security and Privacy Perspectives of Camera Fingerprints (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hugo L. Jonker, Sjouke Mauw, Rolando Trujillo-Rasua Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Andreas Happe Malicious Clients in Distributed Secret Sharing Based Storage Networks (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Khaled Baqer, S. Johann Bezuidenhoudt, Ross J. Anderson, Markus G. Kuhn SMAPs: Short Message Authentication Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Giampaolo Bella, Bruce Christianson, Luca Viganò 0001 Invisible Security. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bruce Christianson The Price of Belief: Insuring Credible Trust? (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Petr Svenda Reconsidering Attacker Models in Ad-Hoc Networks (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ian Goldberg, Graeme Jenkinson, David Llewellyn-Jones, Frank Stajano Red Button and Yellow Button: Usable Security for Lost Security Tokens. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Giampaolo Bella Invisible Security (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Olgierd Pieczul, Simon N. Foley The Evolution of a Security Control or Why Do We Need More Qualitative Research of Software Vulnerabilties? (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1A. W. Roscoe Detecting Failed Attacks on Human-Interactive Security Protocols (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Andreas Happe, Stephan Krenn, Thomas Lorünser Malicious Clients in Distributed Secret Sharing Based Storage Networks. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Syed Taha Ali, Dylan Clarke, Patrick McCorry Bitcoin: Perils of an Unregulated Global P2P Currency. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Keith Irwin Redesigning Secure Protocols to Compel Security Checks. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Joan Feigenbaum, Brad Rosen On the Use of Security and Privacy Technology as a Plot Device. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Vit Bukac, Radim Ostádal, Petr Svenda, Tatevik Baghdasaryan, Vashek Matyas Challenges of Fiction in Network Security - Perspective of Virtualized Environments. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tavish Vaidya, Micah Sherr Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 756 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license