Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 37 matches
- 2011
- Massimiliano Albanese, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian:
Scalable Analysis of Attack Scenarios. ESORICS 2011: 416-433 - Steve Barker, Valerio Genovese:
Socially Constructed Trust for Distributed Authorization. ESORICS 2011: 262-277 - David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi:
Adapting Helios for Provable Ballot Privacy. ESORICS 2011: 335-354 - Arnar Birgisson, Andrei Sabelfeld:
Multi-run Security. ESORICS 2011: 372-391 - Marina Blanton, Paolo Gasti:
Secure and Efficient Protocols for Iris and Fingerprint Identification. ESORICS 2011: 190-209 - Sören Bleikertz, Thomas Groß, Matthias Schunter, Konrad Eriksson:
Automated Information Flow Analysis of Virtualized Infrastructures. ESORICS 2011: 392-415 - Piero A. Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro:
Towards a Mechanism for Incentivating Privacy. ESORICS 2011: 472-488 - Michele Boreale, Francesca Pampaloni, Michela Paolini:
Quantitative Information Flow, with a View. ESORICS 2011: 588-606 - Billy Bob Brumley, Nicola Tuveri:
Remote Timing Attacks Are Still Practical. ESORICS 2011: 355-371 - Elie Bursztein, Baptiste Gourdin, John C. Mitchell:
Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for Weblogs. ESORICS 2011: 133-149 - Yueqiang Cheng, Xuhua Ding, Robert H. Deng:
DriverGuard: A Fine-Grained Protection on I/O Flows. ESORICS 2011: 227-244 - Jason Crampton:
Time-Storage Trade-Offs for Cryptographically-Enforced Access Control. ESORICS 2011: 245-261 - Cas Cremers:
Key Exchange in IPsec Revisited: Formal Analysis of IKEv1 and IKEv2. ESORICS 2011: 315-334 - Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu:
Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing. ESORICS 2011: 628-647 - Hannes Federrath, Karl-Peter Fuchs, Dominik Herrmann, Christopher Piosecny:
Privacy-Preserving DNS: Analysis of Broadcast, Range Queries and Mix-Based Protection Methods. ESORICS 2011: 665-683 - Jens Hermans, Andreas Pashalidis, Frederik Vercauteren, Bart Preneel:
A New RFID Privacy Model. ESORICS 2011: 568-587 - Amir Herzberg, Ronen Margulies:
Forcing Johnny to Login Safely - Long-Term User Study of Forcing and Training Login Mechanisms. ESORICS 2011: 452-471 - Murtuza Jadliwala, Igor Bilogrevic, Jean-Pierre Hubaux:
Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective. ESORICS 2011: 548-567 - Alfred Kobsa, Rishab Nithyanand, Gene Tsudik, Ersin Uzun:
Usability of Display-Equipped RFID Tags for Security Purposes. ESORICS 2011: 434-451 - Gunnar Kreitz:
Timing Is Everything: The Importance of History Detection. ESORICS 2011: 117-132 - Zhen Liu, Zhenfu Cao, Qiong Huang, Duncan S. Wong, Tsz Hon Yuen:
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles. ESORICS 2011: 278-297 - Diogo Mónica, Carlos Ribeiro:
WiFiHop - Mitigating the Evil Twin Attack through Multi-hop Detection. ESORICS 2011: 21-39 - Raymond Mui, Phyllis G. Frankl:
Preventing Web Application Injections with Complementary Character Coding. ESORICS 2011: 80-99 - Dang Vinh Pham, Joss Wright, Dogan Kesdogan:
A Practical Complexity-Theoretic Analysis of Mix Systems. ESORICS 2011: 508-527 - Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun:
Investigation of Signal and Message Manipulations on the Wireless Channel. ESORICS 2011: 40-59 - Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller:
Who Wrote This Code? Identifying the Authors of Program Binaries. ESORICS 2011: 172-189 - Philippe De Ryck, Lieven Desmet, Wouter Joosen, Frank Piessens:
Automatic and Precise Client-Side Protection against CSRF Attacks. ESORICS 2011: 100-116 - Nashad Ahmed Safa, Saikat Sarkar, Reihaneh Safavi-Naini, Majid Ghaderi:
Secure Localization Using Dynamic Verifiers. ESORICS 2011: 1-20 - Dominique Schröder:
How to Aggregate the CL Signature Scheme. ESORICS 2011: 298-314 - Alexander Ulrich, Ralph Holz, Peter Hauck, Georg Carle:
Investigating the OpenPGP Web of Trust. ESORICS 2011: 489-507
skipping 7 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-01 06:20 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint