default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 48 matches
- 2019
- Xu Wang, Ping Yu, Guangsheng Yu, Xuan Zha, Wei Ni, Ren Ping Liu, Y. Jay Guo:
A High-Performance Hybrid Blockchain System for Traceable IoT Applications. NSS 2019: 721-728 - Liu Liu, Chao Chen, Jun Zhang, Olivier Y. de Vel, Yang Xiang:
Unsupervised Insider Detection Through Neural Feature Learning and Model Optimisation. NSS 2019: 18-36 - Sibghat Ullah Bazai, Julian Jang-Jaccard:
SparkDA: RDD-Based High-Performance Data Anonymization Technique for Spark Platform. NSS 2019: 646-662 - Manjunath Bilur, Anugrah Gari, R. K. Shyamasundar:
Threat Assessment of Enterprise Applications via Graphical Modelling. NSS 2019: 146-166 - Adam Bobowski, Miroslaw Kutylowski:
Derandomized PACE with Mutual Authentication. NSS 2019: 697-705 - Yao Cheng, Cheng-Kang Chu, Hsiao-Ying Lin, Marius Lombard-Platet, David Naccache:
Keyed Non-parametric Hypothesis Tests. NSS 2019: 632-645 - Matthew Dekker, Vimal Kumar:
Using Audio Characteristics for Mobile Device Authentication. NSS 2019: 98-113 - Luís Dias, Hélder Reia, Rui Neves, Miguel Correia:
OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms. NSS 2019: 199-220 - Lars Diederichsen, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
A Graph Database-Based Approach to Analyze Network Log Files. NSS 2019: 53-73 - Qingqing Gan, Cong Zuo, Jianfeng Wang, Shifeng Sun, Xiaoming Wang:
Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey. NSS 2019: 37-52 - Shou-Hsuan Stephen Huang, Zechun Cao, Calvin E. Raines, Mai N. Yang, Camille Simon:
Detecting Intruders by User File Access Patterns. NSS 2019: 320-335 - Mitsuyoshi Imamura, Kazumasa Omote:
Difficulty of Decentralized Structure Due to Rational User Behavior on Blockchain. NSS 2019: 504-519 - Deina Kellezi, Christian Boegelund, Weizhi Meng:
Towards Secure Open Banking Architecture: An Evaluation with OWASP. NSS 2019: 185-198 - Peng Li, Junzuo Lai:
LaT-Voting: Traceable Anonymous E-Voting on Blockchain. NSS 2019: 234-254 - Kang Li, Wang Fat Lau, Man Ho Au:
A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter. NSS 2019: 615-631 - Jinhui Liu, Yong Yu:
Lattice Based Verifiably Encrypted Double Authentication Preventing Signatures. NSS 2019: 581-595 - Yang Liu, Hanxiao Xue, Guocheng Wei, Lisu Wu, Yu Wang:
A Comparative Study on Network Traffic Clustering. NSS 2019: 443-455 - Juan Luo, Lei Yang, Chun Wang, Huan Zhao:
Indoor Security Localization Algorithm Based on Location Discrimination Ability of AP. NSS 2019: 472-487 - Xinshu Ma, Chunpeng Ge, Zhe Liu:
Blockchain-Enabled Privacy-Preserving Internet of Vehicles: Decentralized and Reputation-Based Network Architecture. NSS 2019: 336-351 - Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Sara Ricci:
A Privacy-Enhancing Framework for Internet of Things Services. NSS 2019: 77-97 - Mohammad Saiful Islam Mamun, Rongxing Lu, Manon Gaudet:
Tell Them from Me: An Encrypted Application Profiler. NSS 2019: 456-471 - Mamoru Mimura:
Using Sparse Composite Document Vectors to Classify VBA Macros. NSS 2019: 714-720 - Othmane El Omri, Aymen Boudguiga, Malika Izabachène, Witold Klaudel:
Privacy-Preserving k-means Clustering: an Application to Driving Style Recognition. NSS 2019: 685-696 - Wei Ou, Entao Luo, Zhiyuan Tan, Lihong Xiang, Qin Yi, Chen Tian:
A Multi-attributes-Based Trust Model of Internet of Vehicle. NSS 2019: 706-713 - Chen Pan, Shuyang Tang, Zhonghui Ge, Zhiqiang Liu, Yu Long, Zhen Liu, Dawu Gu:
Gnocchi: Multiplexed Payment Channels for Cryptocurrencies. NSS 2019: 488-503 - Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama:
Traceable and Fully Anonymous Attribute Based Group Signature Scheme with Verifier Local Revocation from Lattices. NSS 2019: 675-684 - Bingqing Ren, Jiageng Chen, Shihao Zhou, Xiushu Jin, Zhe Xia, Kaitai Liang:
Cryptanalysis of Raindrop and FBC. NSS 2019: 536-551 - Ou Ruan, Yang Yang, Mingwu Zhang:
An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol. NSS 2019: 665-674 - Bagus Santoso, Yasutada Oohama, Chunhua Su:
Measuring Security of Symmetric Encryption Schemes Against On-the-Fly Side-Channel Key-Recovery Attacks. NSS 2019: 3-17 - Shingo Sato, Shoichi Hirose, Junji Shikata:
Sequential Aggregate MACs with Detecting Functionality Revisited. NSS 2019: 387-407
skipping 18 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-21 09:44 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint