default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 48 matches
- 2007
- David Arditti, Côme Berbain, Olivier Billet, Henri Gilbert:
Compact FPGA implementations of QUAD. AsiaCCS 2007: 347-349 - Mikhail J. Atallah, Marina Blanton, Keith B. Frikken:
Efficient techniques for realizing geo-spatial access control. AsiaCCS 2007: 82-92 - Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee, Peng Liu, Wang-Chien Lee:
Incremental adaptation of XPath access control views. AsiaCCS 2007: 105-116 - Joonsang Baek, Willy Susilo, Jianying Zhou:
New constructions of fuzzy identity-based encryption. AsiaCCS 2007: 368-370 - Meenakshi Balasubramanian, Abhishek Bhatnagar, Namit Chaturvedi, Atish Datta Chowdhury, Arul Ganesh:
A framework for decentralized access control. AsiaCCS 2007: 93-104 - David A. Basin, Ernst-Rüdiger Olderog, Paul E. Sevinç:
Specifying and analyzing security automata using CSP-OZ. AsiaCCS 2007: 70-81 - Mark Bregman:
Keynote speech. AsiaCCS 2007: 1 - Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Raymond N. J. Veldhuis:
Fuzzy extractors for continuous distributions. AsiaCCS 2007: 353-355 - Debra L. Cook, Angelos D. Keromytis, Moti Yung:
Elastic block ciphers: the basic design. AsiaCCS 2007: 350-352 - M. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle:
Extended privilege inheritance in RBAC. AsiaCCS 2007: 383-385 - Virgil D. Gligor:
On the evolution of adversary models in security protocols: from the beginning to sensor networks. AsiaCCS 2007: 3 - Johann Großschädl, Alexander Szekely, Stefan Tillich:
The energy cost of cryptographic key establishment in wireless sensor networks. AsiaCCS 2007: 380-382 - Hioki Hirohisa:
Crocus: a steganographic filesystem manager. AsiaCCS 2007: 344-346 - Sushil Jajodia:
Topological analysis of network attack vulnerability. AsiaCCS 2007: 2 - Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu:
Keystroke statistical learning model for web authentication. AsiaCCS 2007: 359-361 - Przemyslaw Kubiak, Miroslaw Kutylowski, Filip Zagórski:
Kleptographic attacks on a cascade of mix servers. AsiaCCS 2007: 57-62 - Tri Van Le, Mike Burmester, Breno de Medeiros:
Universally composable and forward-secure RFID authentication and authenticated key exchange. AsiaCCS 2007: 242-252 - Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig:
BASE: an incrementally deployable mechanism for viable IP spoofing prevention. AsiaCCS 2007: 20-31 - Yingjiu Li, Xuhua Ding:
Protecting RFID communications in supply chains. AsiaCCS 2007: 234-241 - Yang Li, Binxing Fang, Li Guo, You Chen:
Network anomaly detection based on TCM-KNN algorithm. AsiaCCS 2007: 13-19 - Ninghui Li, Ziqing Mao:
Administration in role-based access control. AsiaCCS 2007: 127-138 - Lynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis Hsu, Karl N. Levitt:
A framework for diversifying windows native APIs to tolerate code injection attacks. AsiaCCS 2007: 392-394 - Anh-Quynh Nguyen, Yoshiyasu Takefuji:
A novel approach for a file-system integrity monitor tool of Xen virtual machine. AsiaCCS 2007: 194-202 - Chaoyi Pang, David P. Hansen, Anthony J. Maeder:
Managing RBAC states with transitive relations. AsiaCCS 2007: 139-148 - Tae-Kyou Park, Ilkyeun Ra:
SPECS: smart partial enciphering service for accessing encrypted files with efficient and transparent. AsiaCCS 2007: 377-379 - Vishwas Patil, Alessandro Mei, Luigi V. Mancini:
Addressing interoperability issues in access control models. AsiaCCS 2007: 389-391 - Jason Reid, Juan Manuel González Nieto, Tee Tang, Bouchra Senadji:
Detecting relay attacks with timing-based protocols. AsiaCCS 2007: 204-213 - Patrick Röder, Omid Tafreschi, Claudia Eckert:
History-based access control for XML documents. AsiaCCS 2007: 386-388 - Reihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt:
Unconditionally secure ring authentication. AsiaCCS 2007: 173-181 - Matthias Schwan:
An extended model of security policy for multi-applicative smart cards. AsiaCCS 2007: 226-233
skipping 18 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-02 16:24 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint