Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 37 matches
- 2016
- Johannes Bauer, Ralf C. Staudemeyer, Henrich C. Pöhls, Alexandros G. Fragkiadakis:
ECDSA on Things: IoT Integrity Protection in Practise. ICICS 2016: 3-17 - Robert Buhren, Julian Vetter, Jan Nordholz:
The Threat of Virtualization: Hypervisor-Based Rootkits on the ARM Architecture. ICICS 2016: 376-391 - Wei Cheng, Yongbin Zhou, Laurent Sauvage:
Differential Fault Analysis on Midori. ICICS 2016: 307-317 - M. W. David, C. R. Yerkes, M. E. Simmons, W. Franceschini:
Towards Trustworthy Smart Cyber-Physical Systems. ICICS 2016: 392-399 - Sumit Kumar Debnath, Ratna Dutta:
How to Meet Big Data When Private Set Intersection Realizes Constant Communication Complexity. ICICS 2016: 445-454 - Hoang Giang Do, Wee Keong Ng:
Private Boolean Query Processing on Encrypted Data. ICICS 2016: 321-332 - Chuntao Dong, Qingni Shen, Lijing Cheng, Yahui Yang, Zhonghai Wu:
SECapacity: A Secure Capacity Scheduler in YARN. ICICS 2016: 184-194 - Martin Draschl, Jutta Hämmerle-Uhl, Andreas Uhl:
Assessment of Efficient Fingerprint Image Protection Principles Using Different Types of AFIS. ICICS 2016: 241-253 - Wei Fan, Zhujun Zhang, Tingting Wang, Bo Hu, Sihan Qing, Degang Sun:
Research on Security Algorithm of Virtual Machine Live Migration for KVM Virtualization System. ICICS 2016: 54-70 - Christoph Frädrich, Henrich C. Pöhls, Wolfgang Popp, Noëlle Rakotondravony, Kai Samelin:
Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoT. ICICS 2016: 197-213 - Thanh Nghia Ho, Wee Keong Ng:
Application of Stylometry to DarkWeb Forum User Identification. ICICS 2016: 173-183 - Thomas Hütter, Mario Preishuber, Jutta Hämmerle-Uhl, Andreas Uhl:
Weaknesses in Security Considerations Related to Chaos-Based Image Encryption. ICICS 2016: 278-291 - Kwok-Yan Lam, Chi-Hung Chi:
Identity in the Internet-of-Things (IoT): New Challenges and Opportunities. ICICS 2016: 18-26 - Peeter Laud, Alisa Pankova:
Optimizing Secure Computation Programs with Private Conditionals. ICICS 2016: 418-430 - Lei Lei, Quanwei Cai, Bo Chen, Jingqiang Lin:
Towards Efficient Re-encryption for Secure Client-Side Deduplication in Public Clouds. ICICS 2016: 71-84 - Paul Tak Shing Liu:
Medical Record System Using Blockchain, Big Data and Tokenization. ICICS 2016: 254-261 - Yang Luo, Tian Puyang, Wu Luo, Qingni Shen, Anbang Ruan, Zhonghai Wu:
MultiPol: Towards a Multi-policy Authorization Framework for RESTful Interfaces in the Cloud. ICICS 2016: 214-226 - Kewei Lv, Si-Wei Ren, Wenjie Qin:
The Security of Individual Bit for XTR. ICICS 2016: 87-98 - Duohe Ma, Cheng Lei, Liming Wang, Hongqi Zhang, Zhen Xu, Meng Li:
A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks. ICICS 2016: 39-53 - Yuan Ma, Qinglong Zhang, Zongbin Liu, Chenyang Tu, Jingqiang Lin:
Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields. ICICS 2016: 292-306 - Viktor Monarev, Ilja Duplischev, Andrey Pestunov:
Compression-Based Integral Prior Classification for Improving Steganalysis. ICICS 2016: 134-144 - Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai:
Group Verification Based Multiple-Differential Collision Attack. ICICS 2016: 145-156 - Wenlun Pan, Zhenzhen Bao, Dongdai Lin, Feng Liu:
The Linear Complexity and 2-Error Linear Complexity Distribution of 2n 2 n -Periodic Binary Sequences with Fixed Hamming Weight. ICICS 2016: 107-123 - Peizhi Shao, Jiuming Lu, Raymond K. Wong, Wenzhuo Yang:
A Transparent Learning Approach for Attack Prediction Based on User Behavior Analysis. ICICS 2016: 159-172 - Bo Song, Yiming Zhao:
Provably Secure Identity-Based Identification and Signature Schemes with Parallel-PVR. ICICS 2016: 227-238 - Da-Zhi Sun, Xiao-Hong Li:
Vulnerability and Enhancement on Bluetooth Pairing and Link Key Generation Scheme for Security Modes 2 and 3. ICICS 2016: 403-417 - B. S. Vidyalakshmi, Raymond K. Wong:
Is it Good or Bad? Disclosure of Medical Ailments on Twitter. ICICS 2016: 262-277 - Xin Wang, Neng Gao, Lingchen Zhang, Zongbin Liu, Lei Wang:
Novel MITM Attacks on Security Protocols in SDN: A Feasibility Study. ICICS 2016: 455-465 - Wenwen Wang, Kewei Lv, Jianing Liu:
The Variant of Remote Set Problem on Lattices. ICICS 2016: 124-133 - Weijin Wang, Yu Qin, Bo Yang, Yingjun Zhang, Dengguo Feng:
Automated Security Proof of Cryptographic Support Commands in TPM 2.0. ICICS 2016: 431-441
skipping 7 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-23 12:40 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint