![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
EAI Endorsed Transactions on Security and Safety, Volume 2
Volume 2, Number 3, January 2015
- Raoul Strackx, Pieter Agten, Niels Avonds, Frank Piessens:
Salus: Kernel Support for Secure Process Compartments. e1 - Ibrahim F. Elashry, Yi Mu, Willy Susilo
:
Mediated Encryption: Analysis and Design. e2 - Daouda Ahmat, Damien Magoni
, Tegawendé F. Bissyandé:
End-to-End Key Exchange through Disjoint Paths in P2P Networks. e3 - Xinxin Fan, Kalikinkar Mandal, Guang Gong:
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices. e4 - Leandros A. Maglaras
, Jianmin Jiang:
A novel intrusion detection method based on OCSVM and K-means recursive clustering. e5
Volume 2, Number 4, October 2015
- Kai Chen, Jun Shao:
Preface to special issue on miscellaneous emerging security problems. e1 - Pieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips:
Detection of Botnet Command and Control Traffic by the Multistage Trust Evaluation of Destination Identifiers. e2 - Christopher Kugler, Tilo Müller:
Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits. e3 - Fahad Alarifi, Maribel Fernández:
Towards Privacy-Preserving Web Metering Via User-Centric Hardware. e4 - Yazhe Wang, Mingming Hu, Chen Li:
UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts. e5 - Minghui Zhu, Peng Liu:
Reviewing the book "Principles of Cyber-physical Systems" from a security perspective. e6
Volume 2, Number 5, October 2015
- Marshall Brinn, Nicholas Bastin, Andy C. Bavier, Mark Berman, Jeffrey S. Chase, Robert Ricci
:
Trust as the Foundation of Resource Exchange in GENI. e1 - Jing Zhang, Meili Zhi, Yuting Su, Qingzhong Liu
:
Mobile Watermarking against Geometrical Distortions. e2 - Zhaoyuan Wang, Huanlai Xing
, Tianrui Li
, Yan Yang, Rong Qu
:
An Improved MOEA/D for QoS Oriented Multimedia Multicasting with Network Coding. e3 - Fangwei Li, Xinyu Zhang, Jiang Zhu, Wang Yan:
A improved Network Security Situation Awareness Model. e4 - Fangwei Li, Qing Huang, Jiang Zhu, Zhuxun Peng:
Network Security Risk Assessment Based on Item Response Theory. e5
Volume 2, Number 6, November 2015
- Qingzhong Liu
, Andrew H. Sung
, Lei Chen, Ming Yang, Zhongxue Chen
, Yanxin Liu, Jing Zhang:
A Method to Detect AAC Audio Forgery. e1 - Fangwei Li, Wang Yan, Jiang Zhu, Zhang Xinyue:
A Hierarchical of Security Situation Element Acquisition Mechanism in Wireless Sensor Network. e2 - Xiqing Zhang, Yuan Feng, Feng Hong, Zhongwen Guo:
Redundancy Elimination in DTN via ACK Mechanism. e3 - Chung-Yen Su, Jeng-Ji Huang, Che-Yang Shih, Yu-Tang Chen:
Reversible and Embedded Watermarking of Medical Images for Telemedicine. e4 - Christian T. Zenger, Jan Zimmer, Christof Paar:
Security Analysis of Quantization Schemes for Channel-based Key Extraction. e5
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.