![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 59 matches
- 2015
- Mehmud Abliz, Taieb F. Znati:
Defeating DDoS using Productive Puzzles. ICISSP 2015: 114-123 - Rafael Accorsi:
A Posteriori Process Security Control. ICISSP 2015: IS-5 - Mina Sheikh Alishahi, Mohamed Mejri, Nadia Tawbi
:
Clustering Spam Emails into Campaigns. ICISSP 2015: 90-97 - Bushra Anjum, Manish Rajangam, Harry G. Perros, Wenjuan Fan:
Filtering Unfair Users - A Hidden Markov Model Approach. ICISSP 2015: 147-154 - Arathi Arakala, Hao Hao, Stephen A. Davis, Kathy J. Horadam:
The Palm Vein Graph - Feature Extraction and Matching. ICISSP 2015: 295-303 - Arathi Arakala, Hao Hao, Stephen A. Davis, Kathy J. Horadam:
The Palm Vein Graph for Biometric Authentication. ICISSP (Revised Selected Papers) 2015: 199-218 - Gregor Bonney, Hans Höfken, Benedikt Paffen, Marko Schuba:
ICS/SCADA Security - Analysis of a Beckhoff CX5020 PLC. ICISSP 2015: 137-142 - Carsten Büttner, Sorin A. Huss:
A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks. ICISSP 2015: 259-269 - Carsten Büttner, Sorin A. Huss:
An Efficient Anonymous Authenticated Key Agreement Protocol for Vehicular Ad-Hoc Networks Based on Ring Signatures and the Elliptic Curve Integrated Encryption Scheme. ICISSP (Revised Selected Papers) 2015: 139-159 - Nicolas T. Courtois, Pinar Emirdag, Zhouyixing Wang:
On Detection of Bitcoin Mining Redirection Attacks. ICISSP 2015: 98-105 - Philippe Desfray:
Model Repositories at the Enterprises and Systems Scale - The Modelio Constellation Solution. ICISSP 2015: IS-17 - Mélanie Favre, Sylvaine Picard, Julien Bringer, Hervé Chabanne:
Balancing is the Key - Performing Finger Vein Template Protection using Fuzzy Commitment. ICISSP 2015: 304-311 - Bryan Ford:
Hiding in a Panopticon - Grand Challenges in Internet Anonymity. ICISSP 2015: IS-9 - Steven Furnell:
From Passwords to Biometrics - In Pursuit of a Panacea. ICISSP 2015: IS-7 - Steven M. Furnell
:
From Passwords to Biometrics: In Pursuit of a Panacea. ICISSP (Revised Selected Papers) 2015: 3-15 - Al Amin Hossain, Weining Zhang:
Privacy and Security Concern of Online Social Networks from User Perspective. ICISSP 2015: 246-253 - Andrea Huszti
, Zita Kovács:
Bilinear Pairing-based Hybrid Mixnet with Anonymity Revocation. ICISSP 2015: 238-245 - Masaki Inamura:
Expansions of CHAP - Modificationless on Its Structures of Packet and Data Exchange. ICISSP 2015: 213-220 - Stuart Jacobs:
Optimizing Cryptographically based Security in Wireless Networks. ICISSP 2015: 39-45 - Bolam Kang, Sung Cheol Goh, Myungsun Kim:
Private Web Search with Constant Round Efficiency. ICISSP 2015: 205-212 - Taegyu Kim, Woomin Hwang, Chulmin Kim, Dong-Jae Shin, Ki-Woong Park, Kyu Ho Park:
Malfinder: Accelerated Malware Classification System through Filtering on Manycore System. ICISSP 2015: 17-26 - Taegyu Kim, Ki-Woong Park:
MalCore: Toward a Practical Malware Identification System Enhanced with Manycore Technology. ICISSP (Revised Selected Papers) 2015: 31-48 - Fabian Knirsch, Dominik Engel, Christian Neureiter, Marc Frîncu, Viktor K. Prasanna:
Model-driven Privacy Assessment in the Smart Grid. ICISSP 2015: 173-181 - Fabian Knirsch, Dominik Engel, Christian Neureiter, Marc Frîncu, Viktor K. Prasanna:
Privacy Assessment of Data Flow Graphs for an Advanced Recommender System in the Smart Grid. ICISSP (Revised Selected Papers) 2015: 89-106 - Ansgar R. Koene, Elvira Perez, Christopher James Carter
, Ramona Statache, Svenja Adolphs, Claire O'Malley, Tom Rodden, Derek McAuley:
Research Ethics and Public Trust, Preconditions for Continued Growth of Internet Mediated Research - Public Confidence in Internet Mediate Research. ICISSP 2015: 163-168 - Sriram Krishnamachari, Mehrdad Nojoumian, Kemal Akkaya:
Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security. ICISSP 2015: 106-113 - Michael Kunz, Ludwig Fuchs, Michael Netter, Günther Pernul:
Analyzing Quality Criteria in Role-based Identity and Access Management. ICISSP 2015: 64-72 - Michael Kunz, Ludwig Fuchs, Michael Netter, Günther Pernul:
How to Discover High-Quality Roles? A Survey and Dependency Analysis of Quality Criteria in Role Mining. ICISSP (Revised Selected Papers) 2015: 49-67 - Wei-Han Lee, Ruby B. Lee:
Multi-sensor Authentication to Improve Smartphone Security. ICISSP 2015: 270-280 - Wei-Han Lee, Ruby B. Lee:
Implicit Authentication for Smartphone Security. ICISSP (Revised Selected Papers) 2015: 160-176
skipping 29 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-30 17:31 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint