Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 23 matches
- 2012
- Joaquín García-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Sabrina De Capitani di Vimercati:
Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7122, Springer 2012, ISBN 978-3-642-28878-4 [contents] - 2011
- Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch:
Web Services Verification and Prudent Implementation. DPM/SETOP 2011: 173-189 - Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch, Mathieu Turuani:
Distributed Orchestration of Web Services under Security Constraints. DPM/SETOP 2011: 235-252 - Gildas Avoine:
Privacy Challenges in RFID. DPM/SETOP 2011: 1-8 - Joachim Biskup, Cornelia Tadros:
Inference-Proof View Update Transactions with Minimal Refusals. DPM/SETOP 2011: 104-121 - Julio César Hernández Castro, Pedro Peris-Lopez, Jean-Philippe Aumasson:
On the Key Schedule Strength of PRESENT. DPM/SETOP 2011: 253-263 - Christian A. Duncan, Vir V. Phoha:
On the Complexity of Aggregating Information for Authentication and Profiling. DPM/SETOP 2011: 58-71 - Yulong Fu, Ousmane Koné:
Network Securing against Threatening Requests. DPM/SETOP 2011: 280-294 - Mariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Hanieh Azkia, Frédéric Cuppens, Gouenou Coatrieux, Ana R. Cavalli, Amel Mammar:
Using Requirements Engineering in an Automatic Security Policy Derivation Process. DPM/SETOP 2011: 155-172 - Christine Hennebert, Vincent Berg:
A Framework of Deployment Strategy for Hierarchical WSN Security Management. DPM/SETOP 2011: 310-318 - Muhammad Sabir Idrees, Gabriel Serme, Yves Roudier, Anderson Santana de Oliveira, Hervé Grall, Mario Südholt:
Evolving Security Requirements in Multi-layered Service-Oriented-Architectures. DPM/SETOP 2011: 190-205 - Helge Janicke, Mohamed Sarrab, Hamza Aldabbas:
Controlling Data Dissemination. DPM/SETOP 2011: 303-309 - Alexandros Karakasidis, Vassilios S. Verykios, Peter Christen:
Fake Injection Strategies for Private Phonetic Matching. DPM/SETOP 2011: 9-24 - Maria N. Koukovini, Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Dimitra I. Kaklamani, Iakovos S. Venieris:
A Workflow Checking Approach for Inherent Privacy Awareness in Network Monitoring. DPM/SETOP 2011: 295-302 - Leanid Krautsevich, Fabio Martinelli, Charles Morisset, Artsiom Yautsiukhin:
Risk-Based Auto-delegation for Probabilistic Availability. DPM/SETOP 2011: 206-220 - Carles Martínez-García, Guillermo Navarro-Arribas, Joan Borrell:
Intra-role Progression in RBAC: An RPG-Like Access Control Scheme. DPM/SETOP 2011: 221-234 - Ilaria Matteucci, Marinella Petrocchi, Marco Luca Sbodio, Luca Wiegand:
A Design Phase for Data Sharing Agreements. DPM/SETOP 2011: 25-41 - Javier Parra-Arnau, David Rebollo-Monedero, Jordi Forné:
A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings. DPM/SETOP 2011: 42-57 - Alexander Pretschner, Enrico Lovat, Matthias Büchler:
Representation-Independent Data Usage Control. DPM/SETOP 2011: 122-140 - Enric Pujol-Gil, Nikolaos Chatzis:
A Traffic Regulation Method Based on MRA Signatures to Reduce Unwanted Traffic from Compromised End-User Machines. DPM/SETOP 2011: 264-279 - Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi, Hamid Behnam:
On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol. DPM/SETOP 2011: 90-103 - Jaydip Sen:
Secure and Privacy-Aware Searching in Peer-to-Peer Networks. DPM/SETOP 2011: 72-89 - Aimilia Tasidou, Pavlos S. Efraimidis:
Using Personal Portfolios to Manage Customer Data. DPM/SETOP 2011: 141-154
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-02 07:13 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint