![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 52 matches
- 2003
- Kostas G. Anagnostakis, Spyros Antonatos, Evangelos P. Markatos, Michalis Polychronakis:
E2xB: A Domain-Specific String Matching Algorithm for Intrusion Detection. SEC 2003: 217-228 - Meletis A. Belsis, Leonid Smalov:
Building an Enterprise IT Security Management System. SEC 2003: 181-192 - W. J. Brooks, Matthew J. Warren, William Hutchinson:
ISO 17799 and Australian Healthcare Organisations. SEC 2003: 417-420 - Cheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel:
Secure Audit Logging with Tamper-Resistant Hardware. SEC 2003: 73-84 - Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds:
Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets. SEC 2003: 97-108 - Constantine Daicos, Scott Knight:
Concerning Enterprise Network Vulnerability to HTTP Tunneling. SEC 2003: 13-24 - Ernesto Damiani, Sabrina De Capitani di Vimercati:
Securing XML-based Multimedia Content. SEC 2003: 61-72 - George Danezis:
Statistical Disclosure Attacks. SEC 2003: 421-426 - Bart De Decker, Gregory Neven, Frank Piessens:
Secure Vickrey Auctions without a Trusted Third Party. SEC 2003: 337-348 - Marcin Dobrucki, Teemupekka Virtanen:
Priorities in the Development of Network Intrusion Detection Systems. SEC 2003: 405-408 - Fredj Dridi, Michael Fischer, Günther Pernul:
CSAP - An Adaptable Security Module for the E-Government System Webocrat. SEC 2003: 301-312 - Claudiu Duma, Nahid Shahmehri, Patrick Lambrix:
A Flexible Category-Based Collusion-Restistant Key Management Scheme for Multicast. SEC 2003: 133-144 - Magdy S. El-Soudani, Mohamed A. Eissa:
Cooperative Defense Firewall Protocol. SEC 2003: 373-384 - Mariki M. Eloff, Jan H. P. Eloff:
Information Security Management System: Processes and Products. SEC 2003: 193-204 - Ulrika Evertsson, Urban Örthberg, Louise Yngström:
Integrating Security into Systems Development. SEC 2003: 157-168 - Paul Gaunard, Eric Dubois:
Bridging the Gap between Risk Analysis and Security Policies. SEC 2003: 409-412 - Jochen Haller, Philip Robinson, Thomas Walter, Roger Kilian-Kehr:
Framework and Architecture for Secure Mobile Business Applications. SEC 2003: 413-416 - Jerry den Hartog, Jan Verschuren, Erik P. de Vink, Jaap de Vos, W. Wiersma:
PINPAS: A Tool for Power Analysis of Smartcards. SEC 2003: 453-457 - Jaap-Henk Hoepman:
Security, Fault-Tolerance and their Verification for Ambient Systems. SEC 2003: 441-446 - Engelbert Hubbers, Martijn Oostdijk, Erik Poll:
From Finite State Machines to Provably Correct Java Card Applets. SEC 2003: 465-470 - R. J. Hulsebosch:
Privacy in Content Distribution Networks. SEC 2003: 435-440 - Bob Hulsebosch, Ernst-Jan Goedvolk, Wil Janssen:
Security Characteristics of E-Collaboration Environments. SEC 2003: 471-475 - Jing-Jang Hwang, Min-Hua Shao, Soushan Wu:
Establishing Chain of Evidence as a Base for Non-Repudiation Services. SEC 2003: 49-60 - Lech J. Janczewski, Andrew M. Colarik:
World Framework for Security Benchmark Changes. SEC 2003: 397-400 - Anas Abou El Kalam, Yves Deswarte:
Security Model for Health Care Computing and Communication Systems. SEC 2003: 277-288 - Georgios Kalogridis, Chan Yeob Yeun, Gary Clemo:
Flexible Delegation Security for Improved Distribution in Ubiquitous Environments. SEC 2003: 361-372 - Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis:
Introducing PKI to Enhance Security in Future Mobile Networks. SEC 2003: 109-120 - Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis:
Content, Context, Process Analysis of IS Security Policy Formation. SEC 2003: 145-156 - Scott Knight, Luciano Carosielli:
Detecting Malicious Use with Unlabelled Data Using Clustering and Outlier Analysis. SEC 2003: 205-216 - Yee Wei Law, Sandro Etalle, Pieter H. Hartel:
Assessing Security in Energy-Efficient Sensor Networks. SEC 2003: 459-463
skipping 22 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-23 08:31 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint