default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2010
- Nabil Ajam, Nora Cuppens-Boulahia, Frédéric Cuppens:
Privacy Administration in Distributed Service Infrastructure. SecureComm 2010: 53-70 - Omar I. Al-Bataineh, Ron van der Meyden:
Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast. SecureComm 2010: 429-447 - Guangdong Bai, Liang Gu, Tao Feng, Yao Guo, Xiangqun Chen:
Context-Aware Usage Control for Android. SecureComm 2010: 326-343 - Ee-Chien Chang, Liming Lu, Yongzheng Wu, Roland H. C. Yap, Jie Yu:
Enhancing Host Security Using External Environment Sensors. SecureComm 2010: 362-379 - Jihyuk Choi, Jerry T. Chiang, Dongho Kim, Yih-Chun Hu:
Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks. SecureComm 2010: 235-252 - Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS. SecureComm 2010: 71-88 - Toby Ehrenkranz, Jun Li, Patrick D. McDaniel:
Realizing a Source Authentic Internet. SecureComm 2010: 217-234 - Michael C. Grace, Zhi Wang, Deepa Srinivasan, Jinku Li, Xuxian Jiang, Zhenkai Liang, Siarhei Liakh:
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization. SecureComm 2010: 162-180 - Jinguang Han, Yi Mu, Willy Susilo, Jun Yan:
A Generic Construction of Dynamic Single Sign-on with Strong Security. SecureComm 2010: 181-198 - Mihaela Ion, Giovanni Russello, Bruno Crispo:
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks. SecureComm 2010: 272-289 - Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem A. Beyah:
Attacking Beacon-Enabled 802.15.4 Networks. SecureComm 2010: 253-271 - Andrew J. Kalafut, Minaxi Gupta, Pairoj Rattadilok, Pragneshkumar Patel:
Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly. SecureComm 2010: 448-465 - Dongho Kim, Yih-Chun Hu:
A Study on False Channel Condition Reporting Attacks in Wireless Networks. SecureComm 2010: 107-124 - Deguang Kong, Yoon-chan Jhi, Tao Gong, Sencun Zhu, Peng Liu, Hongsheng Xi:
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection. SecureComm 2010: 1-19 - Ralf Küsters, Henning Schnoor, Tomasz Truderung:
A Formal Definition of Online Abuse-Freeness. SecureComm 2010: 484-497 - Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou:
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings. SecureComm 2010: 89-106 - Jingqiang Lin, Peng Liu, Jiwu Jing, Qiongxiao Wang:
Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes. SecureComm 2010: 307-325 - Luciana Marconi, Mauro Conti, Roberto Di Pietro:
CED2: Communication Efficient Disjointness Decision. SecureComm 2010: 290-306 - Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu, Ravi S. Sandhu:
Analyzing and Exploiting Network Behaviors of Malware. SecureComm 2010: 20-34 - Youngsang Shin, Steven A. Myers, Minaxi Gupta:
Saving Energy on WiFi with Required IPsec. SecureComm 2010: 144-161 - Sooel Son, Vitaly Shmatikov:
The Hitchhiker's Guide to DNS Cache Poisoning. SecureComm 2010: 466-483 - Raoul Strackx, Frank Piessens, Bart Preneel:
Efficient Isolation of Trusted Subsystems in Embedded Systems. SecureComm 2010: 344-361 - Smitha Sundareswaran, Anna Cinzia Squicciarini:
DeCore: Detecting Content Repurposing Attacks on Clients' Systems. SecureComm 2010: 199-216 - Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia J. Perlman:
FADE: Secure Overlay Cloud Storage with File Assured Deletion. SecureComm 2010: 380-397 - Patrick Traynor:
Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services. SecureComm 2010: 125-143 - Sean Whalen, Matt Bishop, James P. Crutchfield:
Hidden Markov Models for Automated Protocol Learning. SecureComm 2010: 415-428 - Aram Yegenian, Tassos Dimitriou:
Inexpensive Email Addresses An Email Spam-Combating System. SecureComm 2010: 35-52 - Sami Zhioua:
A New Information Leakage Measure for Anonymity Protocols. SecureComm 2010: 398-414 - Sushil Jajodia, Jianying Zhou:
Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 50, Springer 2010, ISBN 978-3-642-16160-5 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-21 00:10 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint