Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 46 matches
- 2006
- Rafael Accorsi:
On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems. SEC 2006: 329-339 - Claudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Fulvio Frati, Pierangela Samarati:
CAS++: An Open Source Single Sign-On Solution for Secure e-Services. SEC 2006: 208-220 - Michael Backes, Birgit Pfitzmann:
On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol. SEC 2006: 233-245 - Jabiri Kuwe Bakari, Charles N. Tarimo, Christer Magnusson, Louise Yngström:
Bridging the Gap between General Management and Technicians - A Case Study in ICT Security. SEC 2006: 442-447 - Zinaida Benenson, Felix C. Freiling, Ernest Hammerschmidt, Stefan Lucks, Lexi Pimenidis:
Authenticated Query Flooding in Sensor Networks. SEC 2006: 38-49 - Yacine Bouzida, Frédéric Cuppens:
Detecting Known and Novel Network Intrusions. SEC 2006: 258-270 - Jan Camenisch:
Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. SEC 2006: 135-147 - Jan Camenisch:
Anonymous Credentials: Opportunities and Challenges. SEC 2006: 460 - Jan Camenisch, Dieter Sommer, Roger Zimmermann:
A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures. SEC 2006: 25-37 - Chia Yuan Cho, Sin Yeung Lee, Chung Pheng Tan, Yong Tai Tan:
Network Forensics on Packet Fingerprints. SEC 2006: 401-412 - Marijke Coetzee, Jan H. P. Eloff:
A Framework for Web Services Trust. SEC 2006: 74-86 - Benjamin D. Cone, Michael F. Thompson, Cynthia E. Irvine, Thuy D. Nguyen:
Cyber Security Training and Awareness Through Game Play. SEC 2006: 431-436 - Yuri Demchenko, Leon Gommans, Cees de Laat:
Using VO Concept for Managing Dynamic Security Associations. SEC 2006: 377-388 - Ronald C. Dodge, Aaron J. Ferguson:
Using Phishing for User Email Security Awareness. SEC 2006: 454-459 - Lynette Drevin, Hennie A. Kruger, Tjaart Steyn:
Value-Focused Assessment of Information Communication and Technology Security Awareness in an Academic Environment. SEC 2006: 448-453 - Dinei A. F. Florêncio, Cormac Herley:
Analysis and Improvement of Anti-Phishing Schemes. SEC 2006: 148-157 - Stephen Flowerday, Rossouw von Solms:
Trust: An Element of Information Security. SEC 2006: 87-98 - Steven Furnell, Adila Jusoh, Dimitris Katsabas, Paul Dowland:
Considering the Usability of End-User Security Software. SEC 2006: 307-316 - Nils Gruschka, Norbert Luttenberger:
Protecting Web Services from DoS Attacks by SOAP Message Validation. SEC 2006: 171-182 - Almut Herzog, Nahid Shahmehri:
A Usability Study of Security Policy Management. SEC 2006: 296-306 - Martin Gilje Jaatun, Inger Anne Tøndel, Frédéric Paint, Tor Hjalmar Johannessen, John Charles Francis, Claire Duranton:
Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets. SEC 2006: 389-400 - Martin Karresand, Nahid Shahmehri:
Oscar - File Type Identification of Binary Data in Disk Clusters and RAM Pages. SEC 2006: 413-424 - Florian Kerschbaum:
Practical Private Regular Expression Matching. SEC 2006: 461-470 - Darko Kirovski, Nebojsa Jojic, Paul Roberts:
Click Passwords. SEC 2006: 351-363 - Kameswari Kotapati, Peng Liu, Thomas F. La Porta:
CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks. SEC 2006: 158-170 - Andreas K. Mattas, Ioannis Mavridis, Iason Pagkalos:
A Paradigm for Dynamic and Decentralized Administration of Access Control in Workflow Applications. SEC 2006: 196-207 - Oleksiy Mazhelis, Seppo Puuronen, Mika Raento:
Evaluating Classifiers for Mobile-Masquerader Detection. SEC 2006: 271-283 - Pietro Michiardi, Refik Molva:
Identity Based Message Authentication for Dynamic Networks. SEC 2006: 50-61 - Hassnaa Moustafa, Gilles Bourdon, Yvon Gourhant:
Providing Authentication and Access Control in Vehicular Network Environment. SEC 2006: 62-73 - Vincent Naessens, Bart De Decker:
A Methodology for Designing Controlled Anonymous Applications. SEC 2006: 111-122
skipping 16 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-01 05:12 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint