Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2013
- Alessandro Barenghi, Gerardo Pelosi, Federico Terraneo:
Secure and efficient design of software block cipher implementations on microcontrollers. Int. J. Grid Util. Comput. 4(2/3): 110-118 (2013) - Ray Carroll, Sasitharan Balasubramaniam, Junichi Suzuki, Chonho Lee, William Donnelly, Dmitri Botvich:
Bio-inspired service management framework: green data-centres case study. Int. J. Grid Util. Comput. 4(4): 278-292 (2013) - ByungRae Cha, JongWon Kim:
Handling and analysis of fake multimedia contents threats with collective intelligence in P2P file sharing environments. Int. J. Grid Util. Comput. 4(1): 1-9 (2013) - Shamsul Kamal Ahmad Khalid, Mustafa Mat Deris, Kamaruddin Malik Mohamad:
Anti-cropping digital image watermarking using Sudoku. Int. J. Grid Util. Comput. 4(2/3): 169-177 (2013) - Wazir Zada Khan, Mohamad Naufal bin Mohamad Saad, Mohammed Y. Aalsalem:
Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks. Int. J. Grid Util. Comput. 4(2/3): 119-127 (2013) - Roman Kopetzky, Markus Günther, Natalia Kryvinska, Andreas Mladenow, Christine Strauss, Christian Stummer:
Strategic management of disruptive technologies: a practical framework in the context of voice services and of computing towards the cloud. Int. J. Grid Util. Comput. 4(1): 47-59 (2013) - Cristian Lai, Claude Moulin:
Semantic indexing modelling of resources within a distributed system. Int. J. Grid Util. Comput. 4(1): 21-39 (2013) - Sujuan Li, Futai Zhang:
Leakage-resilient identity-based encryption scheme. Int. J. Grid Util. Comput. 4(2/3): 187-196 (2013) - Yichun Liu:
Fairness analysis of e-commerce protocols based on strand spaces. Int. J. Grid Util. Comput. 4(2/3): 128-133 (2013) - Timothy M. Lynar, Simon, Ric D. Herbert, William J. Chivers:
Reducing energy consumption in distributed computing through economic resource allocation. Int. J. Grid Util. Comput. 4(4): 231-241 (2013) - Sergio Nesmachnow, Santiago Iturriaga:
Multiobjective grid scheduling using a domain decomposition based parallel micro evolutionary algorithm. Int. J. Grid Util. Comput. 4(1): 70-84 (2013) - Mikhail Nesterenko, Sébastien Tixeuil:
Ideal stabilisation. Int. J. Grid Util. Comput. 4(4): 219-230 (2013) - Siwei Peng, Baojiang Cui, Ru Jia, Shurui Liang, Yiying Zhang:
A novel vulnerability detection method for ZigBee MAC layer. Int. J. Grid Util. Comput. 4(2/3): 134-143 (2013) - Ronald Petrlic, Stephan Sekula, Christoph Sorge:
A privacy-friendly architecture for future cloud computing. Int. J. Grid Util. Comput. 4(4): 265-277 (2013) - Yona Raekow, Christian Simmendinger, Domenic Jenz, Piotr Grabowski:
On-demand software licence provisioning in grid and cloud computing. Int. J. Grid Util. Comput. 4(1): 10-20 (2013) - Qingni Shen, Yahui Yang, Zhonghai Wu, Dandan Wang, Min Long:
Securing data services: a security architecture design for private storage cloud based on HDFS. Int. J. Grid Util. Comput. 4(4): 242-254 (2013) - Guangye Sui, Mohamed Mejri:
FASER (Formal and Automatic Security Enforcement by Rewriting) by BPA algebra with test. Int. J. Grid Util. Comput. 4(2/3): 204-211 (2013) - Zhonghong Sun:
Fairness in the presence of semi-rational parties in rational two-party secure computation. Int. J. Grid Util. Comput. 4(2/3): 103-109 (2013) - Changji Wang, Wentao Li:
An efficient attribute-based signature scheme with claim-predicate mechanism. Int. J. Grid Util. Comput. 4(2/3): 151-159 (2013) - Peng Xiao, Ning Han:
Improving user QoS by relaxing resource reservation policy in high-performance grid environments. Int. J. Grid Util. Comput. 4(4): 255-264 (2013) - Peng Xiao, Dongbo Liu, Xilong Qu:
Resource co-allocation framework based on hybrid gaming model in grid environments. Int. J. Grid Util. Comput. 4(1): 60-69 (2013) - Fei Yan, Xiaofeng Chen, Yinghui Zhang:
Efficient online/offline signcryption without key exposure. Int. J. Grid Util. Comput. 4(1): 85-93 (2013) - Jinfeng Yang, Rong Cheng, Wenming Liu, Yong Xiao, Fangguo Zhang:
Cryptoanalysis and improvement of smart prepayment meter protocol in standard Q/GDW 365. Int. J. Grid Util. Comput. 4(1): 40-46 (2013) - Zhiqiang Yao, Jinbo Xiong, Jianfeng Ma, Qi Li, Ximeng Liu:
Access control requirements for structured document in cloud computing. Int. J. Grid Util. Comput. 4(2/3): 95-102 (2013) - Xinfeng Ye, Bakh Khoussainov:
Fine-grained access control for cloud computing. Int. J. Grid Util. Comput. 4(2/3): 160-168 (2013) - Jinson Zhang, Mao Lin Huang, Doan Hoang:
Visual analytics for intrusion detection in spam emails. Int. J. Grid Util. Comput. 4(2/3): 178-186 (2013) - Yuanyuan Zhang, Marine Minier:
How network coding system constrains packet pollution attacks in wireless sensor networks. Int. J. Grid Util. Comput. 4(2/3): 197-203 (2013) - Jie Zhang, Futai Zhang:
Linear threshold verifiable secret sharing in bilinear groups. Int. J. Grid Util. Comput. 4(2/3): 212-218 (2013) - Xudong Zhu, Hui Li, Fenghua Li:
Privacy-preserving logistic regression outsourcing in cloud computing. Int. J. Grid Util. Comput. 4(2/3): 144-150 (2013)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-21 19:08 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint