default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 43 matches
- 2011
- Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Mohammed Meziani:
Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes. ISA 2011: 146-155 - Soltan Alharbi, Jens H. Weber-Jahnke, Issa Traoré:
The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review. ISA 2011: 87-100 - Byoungman An, Youngseop Kim, Oh-Jin Kwon:
High Speed and Low-Complexity Mode Decision for Advanced Video Coding. ISA 2011: 339-348 - Maricel O. Balitanas, Seung-Hwan Jeon, Tai-Hoon Kim:
Retrofit to CAIN of IP-Based Supervisory Control and Data Acquisition System. ISA 2011: 211-218 - Jun-Pil Boo, Do-Hyeun Kim:
Development of Integrated Adapter Based on Multi-sensor Networks for Tracking and Surveillance. ISA 2011: 333-338 - Ines Bouzouita, Michel Liquiere, Samir Elloumi, Ali Jaoua:
A Comparative Study of a New Associative Classification Approach for Mining Rare and Frequent Classification Rules. ISA 2011: 43-52 - Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui, Gerhard Hoffmann, Mohammed Meziani, Robert Niebuhr:
Recent Progress in Code-Based Cryptography. ISA 2011: 21-32 - Pierre-Louis Cayrel, Gerhard Hoffmann, Michael Schneider:
GPU Implementation of the Keccak Hash Function Family. ISA 2011: 33-42 - Yong-Kyun Cho, Young-Bum Park:
Requirements Analysis and Critical Requirement Derivation Method Using Macrostruktur. ISA 2011: 367-377 - Young B. Choi, Tae Hwan Oh, Rajath Chouta:
RFID Implementation and Security Issues. ISA 2011: 236-249 - Lukás Durfina, Jakub Kroustek, Petr Zemek, Dusan Kolár, Tomás Hruska, Karel Masarík, Alexander Meduna:
Design of a Retargetable Decompiler for a Static Platform-Independent Malware Analysis. ISA 2011: 72-86 - Ji-Yeon Hwang, Seung-Jung Shin, DaeHyun Ryu:
Improvement of Message Processing Method for SOA Based Digital Set-Top Box System. ISA 2011: 306-312 - Wonjun Jang, Sikwan Cho, Hyung-Woo Lee:
User-Oriented Pseudo Biometric Image Based One-Time Password Mechanism on Smart Phone. ISA 2011: 395-404 - Jang Mook Kang, Jae Sang Cha, You-Jin Song, Goo-Man Park, Eun-Young Ko, Myong-Chul Shin, Jeong Jin Kang, YouSik Hong:
A Scheme for Role-Based 3D CCTV Using CS-RBAC (Context-Sensitivity Role-Based Access Control). ISA 2011: 378-383 - Jang Mook Kang, You-Jin Song, Jae Sang Cha, Seon-Hee Lee:
A Study for Security Scheme and the Right to Be Forgotten Based on Social Network Service for Smart-Phone Environment. ISA 2011: 326-332 - Jayaprakash Kar:
Non-interactive Deniable Authentication Protocol Using Generalized ECDSA Signature Scheme. ISA 2011: 166-176 - Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan:
Information Security Awareness Campaign: An Alternate Approach. ISA 2011: 1-10 - Gyuyeong Kim, Hyuntae Kim, Jangsik Park, Yunsik Yu:
Vehicle Tracking Based on Kalman Filter in Tunnel. ISA 2011: 250-256 - Hyuntae Kim, Daehyun Ryu, Jangsik Park:
A Noise Robust Echo Canceller with Post-processing Using Liner Predictor and Wiener filter. ISA 2011: 264-274 - Seung-Hyun Lee, Kyung-Soo Jang, Kee-Hyun Choi, Choon-Sung Nam, Dong Ryeol Shin:
An Efficient Private Registry Management System Using DHT Based on FIPA Agent Platform. ISA 2011: 282-291 - Fabio Manganiello, Mirco Marchetti, Michele Colajanni:
Multistep Attack Detection and Alert Correlation in Intrusion Detection Systems. ISA 2011: 101-110 - Gerasimos C. Meletiou, Yannis C. Stamatiou, Apostolos Tsiakalos:
Lower Bounds for Interpolating Polynomials for Square Roots of the Elliptic Curve Discrete Logarithm. ISA 2011: 177-187 - Mohammed Meziani, Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui:
2SC: An Efficient Code-Based Stream Cipher. ISA 2011: 111-122 - Mohammed Meziani, Özgür Dagdelen, Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui:
S-FSB: An Improved Variant of the FSB Hash Family. ISA 2011: 132-145 - Mohamed Saied Emam Mohamed, Stanislav Bulygin, Johannes Buchmann:
Using SAT Solving to Improve Differential Fault Analysis of Trivium. ISA 2011: 62-71 - Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann:
Towards Algebraic Cryptanalysis of HFE Challenge 2. ISA 2011: 123-131 - Noureldien Abdelrhman Noureldien, Mahmud Awadelkariem, DeiaEldien M. Ahmed:
A Detrministic Factorization and Primality Testing Algorithm for Integers of the Form Z Mod 6 = -1. ISA 2011: 156-165 - Jangsik Park, Hyuntae Kim, Gyuyeong Kim, Yunsik Yu:
Vessel Tracking Using Adaboost Algorithm and AIS Information. ISA 2011: 384-388 - Jangsik Park, Hyuntae Kim, Yunsik Yu:
Implementation Fire Detection Algorithm Using Fixed Point Digital Signal Processor. ISA 2011: 275-281 - Rosslin John Robles, Tai-Hoon Kim:
Application Program Interface as Back-Up Data Source for SCADA Systems. ISA 2011: 219-226
skipping 13 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-09 15:28 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint