Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 28 matches
- 2017
- Aidin Ameri, Daryl Johnson:
Covert Channel over Network Time Protocol. ICCSP 2017: 62-65 - Wenying Bao, Wenbin Yao, Ming Zong, Dongbin Wang:
Cross-site Scripting Attacks on Android Hybrid Applications. ICCSP 2017: 56-61 - B. Chandrasekar, Bharath Ramesh, Vishalakshi Prabhu, S. Sajeev, Pratik K. Mohanty, G. Shobha:
Development of Intelligent Digital Certificate Fuzzer Tool. ICCSP 2017: 126-130 - Jianwei Ding, Zhouguo Chen, Yue Zhao, Hong Su, Yubin Guo, Enbo Sun:
MGeT: Malware Gene-Based Malware Dynamic Analyses. ICCSP 2017: 96-101 - Qi Gao, Zhi Li, Shuqin Chen:
A Video Dual Watermarking Algorithm Against Geometric Attack Based on Integer Wavelet and SIFT. ICCSP 2017: 33-37 - Hongmu Han, Ruixuan Li:
A Practical Compartmentation Approach for the Android App Coexistence. ICCSP 2017: 49-55 - Huawei Huang, Yunyun Qu, Lunzhi Deng:
Zero-Knowledge Identification Scheme Based on Symmetry Ergodic Matrices Exponentiation Problem. ICCSP 2017: 71-75 - Mubashir Hussain, Hui Guo:
Packet Leak Detection on Hardware-Trojan Infected NoCs for MPSoC Systems. ICCSP 2017: 85-90 - Zhiqiang Jian, Long Chen:
A Defense Method against Docker Escape Attack. ICCSP 2017: 142-146 - Mikhail M. Kucherov, N. A. Bogulskaya:
Logical Language of Certificate-Based Access Control in Security Models. ICCSP 2017: 131-135 - Fenghua Li, Jingyang Yu, Lingcui Zhang, Zhe Sun, Mengfan Lv:
A Privacy-Preserving Method for Photo Sharing in Instant Message Systems. ICCSP 2017: 38-43 - Jing Liu, Yingxu Lai, Shixuan Zhang:
FL-GUARD: A Detection and Defense System for DDoS Attack in SDN. ICCSP 2017: 107-111 - Danni Liu, Lijuan Wang, Can Wang, Pengyuan Huo:
A Nonrepudiable Threshold Proxy Signature Scheme against Forgery Attack. ICCSP 2017: 76-80 - Yongfeng Niu, Yanfeng Qi:
Ternary Linear Codes with Few Weights from Functions with Two Variables. ICCSP 2017: 22-27 - A. P. Pljonkin:
Features of the Photon Pulse Detection Algorithm in the Quantum Key Distribution System. ICCSP 2017: 81-84 - Sergey Polikarpov, Dmitry Petrov, Alexey Kozhevnikov:
On A Class Pseudo-Dynamic Substitutions PD-Sbox, With A Perfect Averaged Distribution of Differentials in Static Mode of Work. ICCSP 2017: 17-21 - Xin Sun, Xindai Lu, Hua Dai:
A Matrix Decomposition based Webshell Detection Method. ICCSP 2017: 66-70 - Kavitha P. Thomas, A. Prasad Vinod, Neethu Robinson:
Online Biometric Authentication Using Subject-Specific Band Power features of EEG. ICCSP 2017: 136-141 - Hong Wang, Jie Guan:
On Equivalence with Output Sequence of Grain Model. ICCSP 2017: 7-11 - Xingang Wang, Kuo Guo, Zhigang Gai:
A Semi-Formal Multi-Policy Secure Model for Semantic Spatial Trajectories. ICCSP 2017: 119-125 - Xuyang Wang, Aiqun Hu, Hao Fang:
Feasibility Analysis of Lattice-based Proxy Re-Encryption. ICCSP 2017: 12-16 - Xiaoshuai Xin, Cancheng Liu, Bin Wang:
Real-Time Intrusion Detection Method Based on Bidirectional Access of Modbus/TCP Protocol. ICCSP 2017: 102-106 - Xidong Zhang, Weiming Tong, Zhongwei Li:
Security Communication for AMI on Basis of ECC and ESP. ICCSP 2017: 44-48 - Shiyi Zhang, Yongjuan Wang, Yang Gao, Tao Wang:
On the Construction of the 4 x 4 Lightest Circulant MDS Matrices. ICCSP 2017: 1-6 - Hao Zhang, Tao Zhang, Huajin Chen:
Variance Analysis of Pixel-Value Differencing Steganography. ICCSP 2017: 28-32 - Zhiyuan Zhao, Lei Sun:
Attribute-based Access Control with Dynamic Trust in a Hybrid Cloud Computing Environment. ICCSP 2017: 112-118 - Bowei Zou, Mingqiu Gao, Xiaochuan Cui:
Research on Information Security Framework of Intelligent Connected Vehicle. ICCSP 2017: 91-95 - Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, ICCSP 2017, Wuhan, China, March 17 - 19, 2017. ACM 2017, ISBN 978-1-4503-4867-6 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-24 03:56 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint