default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 35 matches
- 2010
- Morteza Amini, Rasool Jalili:
Multi-level authorisation model and framework for distributed semantic-aware environments. IET Inf. Secur. 4(4): 301-321 (2010) - Zubair A. Baig, Khaled Salah:
Multi-Agent pattern recognition mechanism for detecting distributed denial of service attacks. IET Inf. Secur. 4(4): 333-343 (2010) - Padmalochan Bera, Santosh K. Ghosh, Pallab Dasgupta:
Integrated security analysis framework for an enterprise network - a formal approach. IET Inf. Secur. 4(4): 283-300 (2010) - Stephen Bishop, Hamed Okhravi, Shahram Rahimi, Yung-Chuan Lee:
Covert channel resistant information leakage protection using a multi-agent architecture. IET Inf. Secur. 4(4): 233-247 (2010) - Sergio Bravo-Solorio, Lu Gan, Asoke K. Nandi, Maurice F. Aburdene:
Secure private fragile watermarking scheme with improved tampering localisation accuracy. IET Inf. Secur. 4(3): 137-148 (2010) - Philippe Bulens, François-Xavier Standaert, Jean-Jacques Quisquater:
How to strongly link data and its medium: the paper case. IET Inf. Secur. 4(3): 125-136 (2010) - José M. Alcaraz Calero, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta:
Towards an authorisation model for distributed systems based on the Semantic Web. IET Inf. Secur. 4(4): 411-421 (2010) - Santosh Chandrasekhar, Saikat Chakrabarti, Mukesh Singhal, Kenneth L. Calvert:
Efficient proxy signatures based on trapdoor hash functions. IET Inf. Secur. 4(4): 322-332 (2010) - Joan Daemen, Vincent Rijmen:
Refinements of the ALRED construction and MAC security claims. IET Inf. Secur. 4(3): 149-157 (2010) - Haining Fan, Jia-Guang Sun, Ming Gu, Kwok-Yan Lam:
Overlap-free Karatsuba-Ofman polynomial multiplication algorithms. IET Inf. Secur. 4(1): 8-14 (2010) - Mitra Fatemi, Somayeh Salimi, Ahmad Salahi:
Anonymous roaming in universal mobile telecommunication system mobile networks. IET Inf. Secur. 4(2): 93-103 (2010) - Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Han-Chieh Chao:
Cluster-based secure communication mechanism in wireless ad hoc networks. IET Inf. Secur. 4(4): 352-360 (2010) - Feng Hao, Peter Y. A. Ryan, Piotr Zielinski:
Anonymous voting by two-round public discussion. IET Inf. Secur. 4(2): 62-67 (2010) - Wen-Tzeng Huang, Chih-Hsiang Chang, Che Wun Chiou, Fu-Hua Chou:
Concurrent error detection and correction in a polynomial basis multiplier over GF(2m). IET Inf. Secur. 4(3): 111-124 (2010) - Christian Damsgaard Jensen:
Supporting multi-agent reputation calculation in the Wikipedia Recommender System. IET Inf. Secur. 4(4): 273-282 (2010) - Deniz Karakoyunlu, Frank Kagan Gürkaynak, Berk Sunar, Yusuf Leblebici:
Efficient and side-channel-aware implementations of elliptic curve cryptosystems over prime fields. IET Inf. Secur. 4(1): 30-43 (2010) - Xin Li, Zhiping Jia, Peng Zhang, Ruihua Zhang, Haiyang Wang:
Trust-based on-demand multipath routing in mobile ad hoc networks. IET Inf. Secur. 4(4): 212-232 (2010) - Jing Liu, Laurent Vigneron:
Design and verification of a non-repudiation protocol based on receiver-side smart card. IET Inf. Secur. 4(1): 15-29 (2010) - Sudip Misra, P. Venkata Krishna, Kiran Isaac Abraham:
Adaptive link-state routing and intrusion detection in wireless mesh networks. IET Inf. Secur. 4(4): 374-389 (2010) - Mehrdad Nojoumian, Douglas R. Stinson, Morgan Grainger:
Unconditionally secure social secret sharing scheme. IET Inf. Secur. 4(4): 202-211 (2010) - Fatemeh Raji, Behrouz Tork Ladani:
Anonymity and security for autonomous mobile agents. IET Inf. Secur. 4(4): 397-410 (2010) - Habib F. Rashvand, Khaled Salah, José M. Alcaraz Calero, Lein Harn:
Distributed security for multi-agent systems - review and applications. IET Inf. Secur. 4(4): 188-201 (2010) - Pitipatana Sakarindr, Nirwan Ansari:
Survey of security services on group communications. IET Inf. Secur. 4(4): 258-272 (2010) - Yoones Asgharzadeh Sekhavat, Mohammad Fathian:
Mining frequent itemsets in the presence of malicious participants. IET Inf. Secur. 4(2): 80-92 (2010) - Mohammad Hassan Shirali-Shahreza, Sajad Shirali-Shahreza:
Real-time and MPEG-1 layer III compression resistant steganography in speech. IET Inf. Secur. 4(1): 1-7 (2010) - Vesselin Velichkov, Vincent Rijmen, Bart Preneel:
Algebraic cryptanalysis of a small-scale version of stream cipher Lex. IET Inf. Secur. 4(2): 49-61 (2010) - Bin Wang:
On the security of an identity-based proxy multi-signature scheme. IET Inf. Secur. 4(2): 45-48 (2010) - Wenqiang Wang, Shaozhen Chen:
Attribute-based ring signature scheme with constant-size signature. IET Inf. Secur. 4(2): 104-110 (2010) - Kun Wang, Meng Wu:
Cooperative communications based on trust model for mobile ad hoc networks. IET Inf. Secur. 4(2): 68-79 (2010) - Hong Wen, Pin-Han Ho, Qi Chai, Guang Gong:
Physical layer assisted authentication for distributed ad hoc wireless sensor networks. IET Inf. Secur. 4(4): 390-396 (2010)
skipping 5 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-01 16:08 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint