default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 23 matches
- 2022
- Peter Y. A. Ryan, Cristian Toma:
Innovative Security Solutions for Information Technology and Communications - 14th International Conference, SecITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13195, Springer 2022, ISBN 978-3-031-17509-1 [contents] - 2021
- Md. Akhtaruzzaman Adnan, Atika Younus, Md. Harun Al Kawser, Natasha Adhikary, Ahsan Habib, Rakib Ul Haque:
Identification of Data Breaches from Public Forums. SecITC 2021: 46-56 - Emanuele Bellini, Anna Hambitzer, Matteo Protopapa, Matteo Rossi:
Limitations of the Use of Neural Networks in Black Box Cryptanalysis. SecITC 2021: 100-124 - Romain Brisse, Simon Boche, Frédéric Majorczyk, Jean-François Lalande:
KRAKEN: A Knowledge-Based Recommender System for Analysts, to Kick Exploration up a Notch. SecITC 2021: 1-17 - Vlad Constantin Craciun, Andrei-Catalin Mogage:
Building Deobfuscated Applications from Polymorphic Binaries. SecITC 2021: 308-323 - Li Duan, Yong Li, Lijun Liao:
Perfect Anonymous Authentication and Secure Communication in Internet-of-Things. SecITC 2021: 190-209 - Li Duan, Yong Li, Lijun Liao:
Flexible Group Non-interactive Key Exchange in the Standard Model. SecITC 2021: 210-227 - Christian Franck, Johann Großschädl:
Optimized Implementation of SHA-512 for 16-Bit MSP430 Microcontrollers. SecITC 2021: 86-99 - Marian Gusatu, Ruxandra F. Olimid:
Improved Security Solutions for DDoS Mitigation in 5G Multi-access Edge Computing. SecITC 2021: 286-295 - Evgnosia-Alexandra Kelesidis:
An Optimization of Bleichenbacher's Oracle Padding Attack. SecITC 2021: 145-155 - Xiaojuan Lu, Bohan Li, Shichang Wang, Dongdai Lin:
Conditional Differential Cryptanalysis on Bagua. SecITC 2021: 178-189 - Diana Maimut, George Teseleanu:
New Configurations of Grain Ciphers: Security Against Slide Attacks. SecITC 2021: 260-285 - Abdul Saboor Malik, Muhammad Khuram Shahzad, Mehdi Hussain:
A Forensic Framework for Webmail Threat Detection Using Log Analysis. SecITC 2021: 57-69 - Mihai-Zicu Mina, Emil Simion:
A Multifunctional Modular Implementation of Grover's Algorithm. SecITC 2021: 228-247 - Kashi Neupane:
Long-Term Secure Asymmetric Group Key Agreement. SecITC 2021: 296-307 - Suthee Ruangwises:
Using Five Cards to Encode Each Integer in $\mathbb {Z}/6\mathbb {Z}$. SecITC 2021: 165-177 - Luan Cardoso dos Santos, Johann Großschädl:
An Evaluation of the Multi-platform Efficiency of Lightweight Cryptographic Permutations. SecITC 2021: 70-85 - George Teseleanu:
Lightweight Swarm Authentication. SecITC 2021: 248-259 - Cristian-Valeriu Toma, Catalin Boja, Marius Popa, Mihai Doinea, Cristian Ciurea:
Viruses, Exploits, Malware and Security Issues on IoT Devices. SecITC 2021: 324-334 - Somanath Tripathy, Narendra Singh, Divyanshu N. Singh:
ADAM: Automatic Detection of Android Malware. SecITC 2021: 18-31 - Esra Yeniaras, Murat Cenk:
Improved Polynomial Multiplication Algorithms over Characteristic Three Fields and Applications to NTRU Prime. SecITC 2021: 125-144 - Dániel Zentai:
UC Analysis of the Randomized McEliece Cryptosystem. SecITC 2021: 156-164 - Xiaona Zhang, Yang Liu, Yu Chen:
Attack on the Common Prime Version of Murru and Saettone's RSA Cryptosystem. SecITC 2021: 32-45
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-06 20:19 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint