Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 243 matches
- 2024
- Chaitanyateja Thotadi, Monith Debbala, Subba Rao, Ajay Eeralla, Basker Palaniswamy, Srijanee Mookherji, Vanga Odelu, Alavalapati Goutham Reddy:
E-Brightpass: A Secure way to access social networks on smartphones. Cyber Secur. Appl. 2: 100021 (2024) - 2023
- Wei Wang, Weiping Zhao, Dingcheng Yang, An Li, Yapeng Wang, Lin Xiao:
Secure two-way transmission via untrusted UAV Relay: Joint path design and slot-pairing strategy. Comput. Networks 237: 110090 (2023) - Bimo Sunarfri Hantono, Syukron Abu Ishaq Alfarozi, Azkario Rizky Pratama, Ahmad Ataka Awwalur Rizqi, I Wayan Mustika, Mardhani Riasetiawan, Anna Maria Sri Asih:
Enhancing Counterfeit Detection with Multi-Features on Secure 2D Grayscale Codes. Comput. 12(9): 183 (2023) - Yumeng Su, Hongyuan Gao, Shibo Zhang:
Secure massive MIMO system with two-way relay cooperative transmission in 6G networks. EURASIP J. Wirel. Commun. Netw. 2023(1): 73 (2023) - Xin Song, Jiahui Zhu, Runfeng Zhang, Mingjv Peng, Siyang Xu:
Adaptive secure transmission for two-way energy harvesting relay networks with two-sided eavesdropping. Trans. Emerg. Telecommun. Technol. 34(2) (2023) - Siyang Xu, Xin Song, Suyuan Li, Jing Cao, Jiahui Zhu, Zhigang Xie:
Cooperative encryption over backscatter: Secure green communication for two-way energy harvesting relay networks. ICT Express 9(3): 427-432 (2023) - Quanzhong Li, Hualiang Luo, Liang Yang:
Joint Optimization of Secure Over-the-Air Computation and Reliable Multicasting Assisted by a MIMO Untrusted Two-Way Relay. IEEE Internet Things J. 10(19): 17500-17514 (2023) - Nur Shahirah Binti Azahari, Nur Ziadah Harun, Sofia Najwa Ramli, Zuriati Ahmad Zukarnain:
Secured shared authentication key with two-way clock synchronization over multiparty quantum communication. Quantum Inf. Process. 22(11): 410 (2023) - Yiwen Zhang, Ruixia Cheng:
Joint trajectory and power design for UAV-enabled cooperative jamming in two-way secure communication. Telecommun. Syst. 82(4): 487-498 (2023) - Yang Li, Jinlong Hu, Yan Pan, Wei Huang, Li Ma, Jie Yang, Shuai Zhang, Yujie Luo, Chuang Zhou, Chenlin Zhang, Heng Wang, Yun Shao, Yichen Zhang, Xing Chen, Ziyang Chen, Song Yu, Hong Guo, Bingjie Xu:
Secure Two-Way Fiber-Optic Time Transfer Against Sub-ns Asymmetric Delay Attack With Clock Model-Based Detection and Mitigation Scheme. IEEE Trans. Instrum. Meas. 72: 1-14 (2023) - Junshan Luo, Fanggang Wang, Shilian Wang:
Secure Two-Way Transmission via Autonomous Reconfigurable Intelligent Surface. IEEE Wirel. Commun. Lett. 12(2): 262-266 (2023) - Aleksandra Pawlicka, Damian Puchalski, Marek Pawlicki, Rafal Kozik, Michal Choras:
How to secure the IoT-based surveillance systems in an ELEGANT way. CSR 2023: 636-640 - Gengyan Li, Xiaohan Qi, Zhihua Yang:
Anti-Eavesdropping in UAV Secure Communications: Joint Trajectory and Power Allocation Optimization with Two-Way Training. WCSP 2023: 755-760 - Khashayar Barooti, Giulio Malavolta, Michael Walter:
A Simple Construction of Quantum Public-Key Encryption from Quantum-Secure One-Way Functions. CoRR abs/2303.01143 (2023) - Khashayar Barooti, Giulio Malavolta, Michael Walter:
A Simple Construction of Quantum Public-Key Encryption from Quantum-Secure One-Way Functions. IACR Cryptol. ePrint Arch. 2023: 306 (2023) - Ripon Patgiri, Dolendro Singh Laiphrakpam, Dalton Meitei Thounaojam:
VORSHA: A Variable-sized, One-way and Randomized Secure Hash Algorithm. IACR Cryptol. ePrint Arch. 2023: 110 (2023) - 2022
- Howard D. Grimes, Gabriela F. Ciocarlie, Bo Yu, Duminda Wijesekera, Gregory E. Shannon, Wayne Austad, Charles Fracchia, Dongyan Xu, Thomas R. Kurfess, Lisa Strama, Michael Mylrea, Bill Reid:
PURE Biomanufacturing: Secure, Pandemic-Adaptive Biomanufacturing. IEEE Secur. Priv. 20(6): 53-65 (2022) - D. N. V. S. L. S. Indira, R. Abinaya, Suresh Babu Chandanapalli, Ramesh Vatambeti:
Secured personal health records using pattern-based verification and two-way polynomial protocol in cloud infrastructure. Int. J. Ad Hoc Ubiquitous Comput. 40(1/2/3): 139-147 (2022) - Priya Vedhanayagam:
Developing an optimal MapReduce function for wireless sensor networks in a secure way. Int. J. Comput. Aided Eng. Technol. 16(2): 257-265 (2022) - Abhishek Jana, Bipin Paudel, Md. Kamruzzaman Sarker, Monireh Ebrahimi, Pascal Hitzler, George T. Amariucai:
Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication. Proc. Priv. Enhancing Technol. 2022(4): 86-104 (2022) - Yifeng Jin, Xunan Li, Guo-Cheng Lv, Meihui Zhao, Ye Jin:
Joint Resource Allocation in Secure OFDM Two-Way Untrusted Relay System. Sensors 22(6): 2398 (2022) - Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng:
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing. IEEE Trans. Dependable Secur. Comput. 19(2): 1064-1077 (2022) - Xudong Li, Rugui Yao, Ye Fan, Peng Wang, Nan Qi, Nikolaos I. Miridakis, Theodoros A. Tsiftsis:
Secure Spectrum-Energy Efficiency Tradeoff Based on Stackelberg Game in a Two-Way Relay Cognitive Satellite Terrestrial Network. IEEE Wirel. Commun. Lett. 11(8): 1679-1683 (2022) - Ripon Patgiri:
OSHA: A General-purpose and Next Generation One-way Secure Hash Algorithm. ICIS 2022: 25-33 - Andreas Andreou, Constandinos X. Mavromoustakis, Jordi Mongay Batalla, Evangelos K. Markakis, George Mastorakis, Evangelos Pallis:
Secure Two-Way Communications Between UAVs and Control Center in IoV 5G Communication. CAMAD 2022: 184-189 - Mark Burgin, Rao Mikkilineni:
General Theory of Information Paves the Way to a Secure, Service-Oriented Internet Connecting People, Things, and Businesses. IIAI-AAI 2022: 144-149 - Tim Allison, Wayne Burke, Dustin Graf, Chris Mattmann, Anastasija Mensikova, Mike Milano, Philip Southam, Ryan Stonebraker:
Research Report: Progress on Building a File Observatory for Secure Parser Development. SP (Workshops) 2022: 168-175 - Farzam Toudeh-Fallah, Marco Pistoia, Yasushi Kawakura, Navid Moazzami, David H. Kramer, Robert I. Woodward, Greg Sysak, Benny John, Omar Amer, Antigoni O. Polychroniadou, Jeffrey Lyon, Suresh Shetty, Tulasi D. Movva, Sudhir Upadhyay, Monik Raj Behera, Joseph A. Dolphin, Paul A. Haigh, James F. Dynes, Andrew J. Shields:
Paving the Way towards 800 Gbps Quantum-Secured Optical Channel Deployment in Mission-Critical Environments. CoRR abs/2202.07764 (2022) - John Best, Wayne Hineman, Steven Hetzler, Guerney Hunt, Charanjit S. Jutla:
Secure Storage with Deduplication. IACR Cryptol. ePrint Arch. 2022: 553 (2022) - 2021
- Matteo Busi:
Secure Compilation All the Way Down. University of Pisa, Italy, 2021
skipping 213 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-23 18:21 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint