Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/tcos/tcos4.bht:"
@article{DBLP:journals/tcos/AichMSM09, author = {Subhendu Aich and Samrat Mondal and Shamik Sural and Arun K. Majumdar}, title = {Role Based Access Control with Spatiotemporal Context for Mobile Applications}, journal = {Trans. Comput. Sci.}, volume = {4}, pages = {177--199}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01004-0\_10}, doi = {10.1007/978-3-642-01004-0\_10}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcos/AichMSM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcos/AlmasizadehA09, author = {Jaafar Almasizadeh and Mohammad Abdollahi Azgomi}, title = {A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior}, journal = {Trans. Comput. Sci.}, volume = {4}, pages = {200--214}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01004-0\_11}, doi = {10.1007/978-3-642-01004-0\_11}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcos/AlmasizadehA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcos/BhaumikC09, author = {Jaydeb Bhaumik and Dipanwita Roy Chowdhury}, title = {An Integrated {ECC-MAC} Based on {RS} Code}, journal = {Trans. Comput. Sci.}, volume = {4}, pages = {117--135}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01004-0\_7}, doi = {10.1007/978-3-642-01004-0\_7}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcos/BhaumikC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcos/ChaurasiaVTA09, author = {Brijesh Kumar Chaurasia and Shekhar Verma and G. S. Tomar and Ajith Abraham}, title = {Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks}, journal = {Trans. Comput. Sci.}, volume = {4}, pages = {136--148}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01004-0\_8}, doi = {10.1007/978-3-642-01004-0\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcos/ChaurasiaVTA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcos/CrandallBYWOSWC09, author = {Jedidiah R. Crandall and John Brevik and Shaozhi Ye and Gary Wassermann and Daniela Alvim Seabra de Oliveira and Zhendong Su and Shyhtsun Felix Wu and Frederic T. Chong}, title = {Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection}, journal = {Trans. Comput. Sci.}, volume = {4}, pages = {244--262}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01004-0\_14}, doi = {10.1007/978-3-642-01004-0\_14}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcos/CrandallBYWOSWC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcos/DuttaD09, author = {Ratna Dutta and Tom Dowling}, title = {Secure and Efficient Group Key Agreements for Cluster Based Networks}, journal = {Trans. Comput. Sci.}, volume = {4}, pages = {87--116}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01004-0\_6}, doi = {10.1007/978-3-642-01004-0\_6}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcos/DuttaD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcos/ElbazCGLPT09, author = {Reouven Elbaz and David Champagne and Catherine H. Gebotys and Ruby B. Lee and Nachiketh R. Potlapally and Lionel Torres}, title = {Hardware Mechanisms for Memory Authentication: {A} Survey of Existing Techniques and Engines}, journal = {Trans. Comput. Sci.}, volume = {4}, pages = {1--22}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01004-0\_1}, doi = {10.1007/978-3-642-01004-0\_1}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcos/ElbazCGLPT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcos/HaoZ09, author = {Feng Hao and Piotr Zielinski}, title = {The Power of Anonymous Veto in Public Discussion}, journal = {Trans. Comput. Sci.}, volume = {4}, pages = {41--52}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01004-0\_3}, doi = {10.1007/978-3-642-01004-0\_3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcos/HaoZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcos/MelloWFCB09, author = {Emerson Ribeiro de Mello and Michelle S. Wangham and Joni da Silva Fraga and Edson Tavares de Camargo and Davi da Silva B{\"{o}}ger}, title = {A Model for Authentication Credentials Translation in Service Oriented Architecture}, journal = {Trans. Comput. Sci.}, volume = {4}, pages = {68--86}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01004-0\_5}, doi = {10.1007/978-3-642-01004-0\_5}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcos/MelloWFCB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcos/MohamedA09, author = {Emad Eldin Mohamed and Hussein M. Abdel{-}Wahab}, title = {Collusion-Resistant Message Authentication in Overlay Multicast Communication}, journal = {Trans. Comput. Sci.}, volume = {4}, pages = {53--67}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01004-0\_4}, doi = {10.1007/978-3-642-01004-0\_4}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcos/MohamedA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcos/PereiraO09, author = {F{\'{a}}bio Dac{\^{e}}ncio Pereira and Edward David Moreno Ordonez}, title = {A Hardware Architecture for Integrated-Security Services}, journal = {Trans. Comput. Sci.}, volume = {4}, pages = {215--229}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01004-0\_12}, doi = {10.1007/978-3-642-01004-0\_12}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcos/PereiraO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcos/RakkayB09, author = {Hind Rakkay and Hanifa Boucheneb}, title = {Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools}, journal = {Trans. Comput. Sci.}, volume = {4}, pages = {149--176}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01004-0\_9}, doi = {10.1007/978-3-642-01004-0\_9}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcos/RakkayB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcos/RegazzoniEPGGMDPPLI09, author = {Francesco Regazzoni and Thomas Eisenbarth and Axel Poschmann and Johann Gro{\ss}sch{\"{a}}dl and Frank K. G{\"{u}}rkaynak and Marco Macchetti and Zeynep Toprak Deniz and Laura Pozzi and Christof Paar and Yusuf Leblebici and Paolo Ienne}, title = {Evaluating Resistance of {MCML} Technology to Power Analysis Attacks Using a Simulation-Based Methodology}, journal = {Trans. Comput. Sci.}, volume = {4}, pages = {230--243}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01004-0\_13}, doi = {10.1007/978-3-642-01004-0\_13}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcos/RegazzoniEPGGMDPPLI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcos/RocheA09, author = {Victor P. Roche and Unai Arronategui}, title = {Behavioural Characterization for Network Anomaly Detection}, journal = {Trans. Comput. Sci.}, volume = {4}, pages = {23--40}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01004-0\_2}, doi = {10.1007/978-3-642-01004-0\_2}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcos/RocheA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:journals/tcos/2009-4, editor = {Marina L. Gavrilova and Chih Jeng Kenneth Tan and Edward D. Moreno}, title = {Transactions on Computational Science IV, Special Issue on Security in Computing}, series = {Lecture Notes in Computer Science}, volume = {5430}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01004-0}, doi = {10.1007/978-3-642-01004-0}, isbn = {978-3-642-01003-3}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcos/2009-4.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.