Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 30 matches
- 2010
- Steve Barker, Valerio Genovese:
A Logic of Privacy. DBSec 2010: 17-32 - Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Per K. Enge, Christof Paar:
Secure Location Verification - A Security Analysis of GPS Signal Authentication. DBSec 2010: 366-373 - Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner:
Efficient Inference Control for Open Relational Queries. DBSec 2010: 162-176 - Marina Blanton, Mehrdad Aliasgari:
Secure Outsourcing of DNA Searching via Finite Automata. DBSec 2010: 49-64 - Angela Bonifati, Ruilin Liu, Wendy Hui Wang:
Distributed and Secure Access Control in P2P Databases. DBSec 2010: 113-129 - Tyrone Cadenhead, Murat Kantarcioglu, Bhavani Thuraisingham:
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control. DBSec 2010: 209-224 - Ramaswamy Chandramouli:
Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach. DBSec 2010: 343-349 - Yu Chen, Hyun Sung Kim, Jian-bin Hu, Zhong Chen:
When ABE Meets RSS. DBSec 2010: 319-326 - Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
Evaluating the Risk of Adopting RBAC Roles. DBSec 2010: 303-310 - Jason Crampton, Rosli Daud, Keith M. Martin:
Constructing Key Assignment Schemes from Chain Partitions. DBSec 2010: 130-145 - Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
On the Identification of Property Based Generalizations in Microdata Anonymization. DBSec 2010: 81-96 - Siv Hilde Houmb, Sudip Chakraborty, Indrakshi Ray, Indrajit Ray:
Using Trust-Based Information Aggregation for Predicting Security Level of Systems. DBSec 2010: 241-256 - JeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altunay:
Mining Likely Properties of Access Control Policies via Association Rule Mining. DBSec 2010: 193-208 - Karthick Jayaraman, Grzegorz Lewandowski, Paul G. Talaga, Steve J. Chapin:
Enforcing Request Integrity in Web Applications. DBSec 2010: 225-240 - Aarthi Nagarajan, Vijay Varadharajan:
Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms. DBSec 2010: 257-272 - Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci:
fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality. DBSec 2010: 146-161 - Bernardo Palazzi, Maurizio Pizzonia, Stefano Pucacco:
Query Racing: Fast Completeness Certification of Query Results. DBSec 2010: 177-192 - Kun Peng, Feng Bao:
A Secure RFID Ticket System for Public Transport. DBSec 2010: 350-357 - Hasan Qunoo, Mark Ryan:
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems. DBSec 2010: 295-302 - Enrico Scalavino, Vaibhav Gowadia, Emil C. Lupu:
A Labelling System for Derived Data Control. DBSec 2010: 65-80 - Amril Syalim, Takashi Nishide, Kouichi Sakurai:
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance. DBSec 2010: 311-318 - Ahlem Bouchahda-Ben Tekaya, Nhan Le Thanh, Adel Bouhoula, Faten Labbene Ayachi:
An Access Control Model for Web Databases. DBSec 2010: 287-294 - Suratose Tritilanunt:
Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols. DBSec 2010: 358-365 - Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Haibing Lu:
Role Mining in the Presence of Noise. DBSec 2010: 97-112 - Kristof Verslype, Pieter Verhaeghe, Jorn Lapon, Vincent Naessens, Bart De Decker:
PriMan : A Privacy-Preserving Identity Framework. DBSec 2010: 327-334 - Alex Hai Wang:
Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach. DBSec 2010: 335-342 - Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi:
Generalizing PIR for Practical Private Retrieval of Public Data. DBSec 2010: 1-16 - Zutao Zhu, Wenliang Du:
Understanding Privacy Risk of Publishing Decision Trees. DBSec 2010: 33-48 - Jan Zibuschka, Matthias Herbert, Heiko Rossnagel:
Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms. DBSec 2010: 273-286 - Sara Foresti, Sushil Jajodia:
Data and Applications Security and Privacy XXIV, 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings. Lecture Notes in Computer Science 6166, Springer 2010, ISBN 978-3-642-13738-9 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-05 22:31 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint