default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 26 matches
- 2006
- Ahmed Alazzawe, Anis Alazzawe, Asad Nawaz, Duminda Wijesekera:
Analyzing Preauthentication Timestamps To Crack Kerberos V Passwords. WOSIS 2006: 267-277 - Sébastien Canard, Fabrice Clerc, Benjamin Morin:
A Secure Universal Loyalty Card. WOSIS 2006: 13-22 - Serge Chaumette, Achraf Karray, Damien Sauveron:
The Software Infrastructure of a Java Card Based Security Platform for Distributed Applications. WOSIS 2006: 101-114 - Vladimir M. Chernov, Oleg Bespolitov:
A New Method for Embedding Secret Data to the Container Image Using 'Chaotic' Discrete Orthogonal Transforms. WOSIS 2006: 115-124 - Christos K. Dimitriadis:
Honeynets in 3G - A Game Theoretic Analysis. WOSIS 2006: 146-152 - Charlott Eliasson, Andre Zuquete:
An Electronic Voting System Supporting VoteWeights. WOSIS 2006: 246-255 - Michael Hafner, Ruth Breu, Berthold Agreiter, Andrea Nowak:
SECTET - An Extensible Framework for the Realization of Secure Inter-Organizational Workflows. WOSIS 2006: 47-57 - Thomas Heyman, Bart De Win, Christophe Huygens, Wouter Joosen:
Improving Intrusion Detection through Alert Verification. WOSIS 2006: 207-216 - Yi Hu, Brajendra Panda:
Modeling Deceptive Action in Virtual Communities. WOSIS 2006: 125-134 - Simone Lupetti, Feike W. Dillema, Tage Stabell-Kulø:
Names in Cryptographic Protocols. WOSIS 2006: 185-194 - Miguel A. Martínez, Joaquín Lasheras, José Ambrosio Toval Álvarez, Mario Piattini:
An Audit Method of Personal Data Based on Requirements Engineering. WOSIS 2006: 217-231 - Oleksiy Mazhelis, Anton Naumenko:
The Place and Role of Security Patterns in Software Development Process. WOSIS 2006: 91-100 - Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
SREP: A Proposal for Establishing Security Requirements for the Development of Secure Information Systems. WOSIS 2006: 135-145 - Athanasios Moralis, Angelos Lenis, Mary Grammatikou, Symeon Papavassiliou, Basil S. Maglaris:
A Distributed Kerberized Access Architecture for Real Time Grids. WOSIS 2006: 23-32 - Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael:
An Ontology-Based Distributed Whiteboard to Determine Legal Responses to Online Cyber Attacks. WOSIS 2006: 232-245 - Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
Towards a UML 2.0 Profile for RBAC Modeling in Activity Diagrams. WOSIS 2006: 174-184 - Eva Rodríguez, Silvia Llorente, Jaime Delgado:
Protecting Notification of Events in Multimedia Systems. WOSIS 2006: 153-162 - David Garcia Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Security Patterns Related to Security Requirements. WOSIS 2006: 163-173 - Manuel Sánchez, Gabriel López, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta:
Grid Authorization Based on Existing AAA Architectures. WOSIS 2006: 3-12 - Luis Enrique Sánchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini:
Developing a Maturity Model for Information System Security Management within Small and Medium Size Enterprises. WOSIS 2006: 256-266 - William G. Sirett, John A. MacDonald, Keith Mayes, Constantinos Markantonakis:
Secure Deployment of Applications to Fielded Devices and Smart Cards. WOSIS 2006: 195-206 - Eliana Stavrou, Andreas Pitsillides:
Securing Mobile Healthcare Systems Based on Information Classification: DITIS Case Study. WOSIS 2006: 67-79 - Martin Steinebach, Sascha Zmudzinski, Sergey Neichtadt:
Robust-audio-hash Synchronized Audio Watermarking. WOSIS 2006: 58-66 - Antti Tuomisto, Mikko Savela:
Information Security and Business Continuity in SMEs. WOSIS 2006: 80-90 - Belén Vela, Eduardo Fernández-Medina, Esperanza Marcos, Mario Piattini:
A Model Driven Approach for Secure XML Database Development. WOSIS 2006: 33-46 - Eduardo Fernández-Medina, Mariemma Inmaculada Yagüe del Valle:
Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006. INSTICC Press 2006, ISBN 978-972-8865-52-8 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-30 09:32 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint