Search dblp for Publications

export results for "toc:db/journals/tcos/tcos4.bht:"

 download as .bib file

@article{DBLP:journals/tcos/AichMSM09,
  author       = {Subhendu Aich and
                  Samrat Mondal and
                  Shamik Sural and
                  Arun K. Majumdar},
  title        = {Role Based Access Control with Spatiotemporal Context for Mobile Applications},
  journal      = {Trans. Comput. Sci.},
  volume       = {4},
  pages        = {177--199},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01004-0\_10},
  doi          = {10.1007/978-3-642-01004-0\_10},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcos/AichMSM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcos/AlmasizadehA09,
  author       = {Jaafar Almasizadeh and
                  Mohammad Abdollahi Azgomi},
  title        = {A Method for Estimation of the Success Probability of an Intrusion
                  Process by Considering the Temporal Aspects of the Attacker Behavior},
  journal      = {Trans. Comput. Sci.},
  volume       = {4},
  pages        = {200--214},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01004-0\_11},
  doi          = {10.1007/978-3-642-01004-0\_11},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcos/AlmasizadehA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcos/BhaumikC09,
  author       = {Jaydeb Bhaumik and
                  Dipanwita Roy Chowdhury},
  title        = {An Integrated {ECC-MAC} Based on {RS} Code},
  journal      = {Trans. Comput. Sci.},
  volume       = {4},
  pages        = {117--135},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01004-0\_7},
  doi          = {10.1007/978-3-642-01004-0\_7},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcos/BhaumikC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcos/ChaurasiaVTA09,
  author       = {Brijesh Kumar Chaurasia and
                  Shekhar Verma and
                  G. S. Tomar and
                  Ajith Abraham},
  title        = {Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks},
  journal      = {Trans. Comput. Sci.},
  volume       = {4},
  pages        = {136--148},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01004-0\_8},
  doi          = {10.1007/978-3-642-01004-0\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcos/ChaurasiaVTA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcos/CrandallBYWOSWC09,
  author       = {Jedidiah R. Crandall and
                  John Brevik and
                  Shaozhi Ye and
                  Gary Wassermann and
                  Daniela Alvim Seabra de Oliveira and
                  Zhendong Su and
                  Shyhtsun Felix Wu and
                  Frederic T. Chong},
  title        = {Putting Trojans on the Horns of a Dilemma: Redundancy for Information
                  Theft Detection},
  journal      = {Trans. Comput. Sci.},
  volume       = {4},
  pages        = {244--262},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01004-0\_14},
  doi          = {10.1007/978-3-642-01004-0\_14},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcos/CrandallBYWOSWC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcos/DuttaD09,
  author       = {Ratna Dutta and
                  Tom Dowling},
  title        = {Secure and Efficient Group Key Agreements for Cluster Based Networks},
  journal      = {Trans. Comput. Sci.},
  volume       = {4},
  pages        = {87--116},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01004-0\_6},
  doi          = {10.1007/978-3-642-01004-0\_6},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcos/DuttaD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcos/ElbazCGLPT09,
  author       = {Reouven Elbaz and
                  David Champagne and
                  Catherine H. Gebotys and
                  Ruby B. Lee and
                  Nachiketh R. Potlapally and
                  Lionel Torres},
  title        = {Hardware Mechanisms for Memory Authentication: {A} Survey of Existing
                  Techniques and Engines},
  journal      = {Trans. Comput. Sci.},
  volume       = {4},
  pages        = {1--22},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01004-0\_1},
  doi          = {10.1007/978-3-642-01004-0\_1},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcos/ElbazCGLPT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcos/HaoZ09,
  author       = {Feng Hao and
                  Piotr Zielinski},
  title        = {The Power of Anonymous Veto in Public Discussion},
  journal      = {Trans. Comput. Sci.},
  volume       = {4},
  pages        = {41--52},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01004-0\_3},
  doi          = {10.1007/978-3-642-01004-0\_3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcos/HaoZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcos/MelloWFCB09,
  author       = {Emerson Ribeiro de Mello and
                  Michelle S. Wangham and
                  Joni da Silva Fraga and
                  Edson Tavares de Camargo and
                  Davi da Silva B{\"{o}}ger},
  title        = {A Model for Authentication Credentials Translation in Service Oriented
                  Architecture},
  journal      = {Trans. Comput. Sci.},
  volume       = {4},
  pages        = {68--86},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01004-0\_5},
  doi          = {10.1007/978-3-642-01004-0\_5},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcos/MelloWFCB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcos/MohamedA09,
  author       = {Emad Eldin Mohamed and
                  Hussein M. Abdel{-}Wahab},
  title        = {Collusion-Resistant Message Authentication in Overlay Multicast Communication},
  journal      = {Trans. Comput. Sci.},
  volume       = {4},
  pages        = {53--67},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01004-0\_4},
  doi          = {10.1007/978-3-642-01004-0\_4},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcos/MohamedA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcos/PereiraO09,
  author       = {F{\'{a}}bio Dac{\^{e}}ncio Pereira and
                  Edward David Moreno Ordonez},
  title        = {A Hardware Architecture for Integrated-Security Services},
  journal      = {Trans. Comput. Sci.},
  volume       = {4},
  pages        = {215--229},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01004-0\_12},
  doi          = {10.1007/978-3-642-01004-0\_12},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcos/PereiraO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcos/RakkayB09,
  author       = {Hind Rakkay and
                  Hanifa Boucheneb},
  title        = {Security Analysis of Role Based Access Control Models Using Colored
                  Petri Nets and CPNtools},
  journal      = {Trans. Comput. Sci.},
  volume       = {4},
  pages        = {149--176},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01004-0\_9},
  doi          = {10.1007/978-3-642-01004-0\_9},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcos/RakkayB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcos/RegazzoniEPGGMDPPLI09,
  author       = {Francesco Regazzoni and
                  Thomas Eisenbarth and
                  Axel Poschmann and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Frank K. G{\"{u}}rkaynak and
                  Marco Macchetti and
                  Zeynep Toprak Deniz and
                  Laura Pozzi and
                  Christof Paar and
                  Yusuf Leblebici and
                  Paolo Ienne},
  title        = {Evaluating Resistance of {MCML} Technology to Power Analysis Attacks
                  Using a Simulation-Based Methodology},
  journal      = {Trans. Comput. Sci.},
  volume       = {4},
  pages        = {230--243},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01004-0\_13},
  doi          = {10.1007/978-3-642-01004-0\_13},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcos/RegazzoniEPGGMDPPLI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcos/RocheA09,
  author       = {Victor P. Roche and
                  Unai Arronategui},
  title        = {Behavioural Characterization for Network Anomaly Detection},
  journal      = {Trans. Comput. Sci.},
  volume       = {4},
  pages        = {23--40},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01004-0\_2},
  doi          = {10.1007/978-3-642-01004-0\_2},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcos/RocheA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:journals/tcos/2009-4,
  editor       = {Marina L. Gavrilova and
                  Chih Jeng Kenneth Tan and
                  Edward D. Moreno},
  title        = {Transactions on Computational Science IV, Special Issue on Security
                  in Computing},
  series       = {Lecture Notes in Computer Science},
  volume       = {5430},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01004-0},
  doi          = {10.1007/978-3-642-01004-0},
  isbn         = {978-3-642-01003-3},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcos/2009-4.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics