Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/dbsec/dbsec2014.bht:"
@inproceedings{DBLP:conf/dbsec/AshokM14, author = {Vikas G. Ashok and Ravi Mukkamala}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation Using Bloom Filters}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {382--389}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_26}, doi = {10.1007/978-3-662-43936-4\_26}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/AshokM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BaroutiAAD14, author = {Samira Barouti and Feras Aljumah and Dima Alhadidi and Mourad Debbabi}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {82--97}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_6}, doi = {10.1007/978-3-662-43936-4\_6}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BaroutiAAD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BkakriaCCG14, author = {Anis Bkakria and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and David Gross{-}Amblard}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Specification and Deployment of Integrated Security Policies for Outsourced Data}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {17--32}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_2}, doi = {10.1007/978-3-662-43936-4\_2}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BkakriaCCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ChengPS14, author = {Yuan Cheng and Jaehong Park and Ravi S. Sandhu}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Attribute-Aware Relationship-Based Access Control for Online Social Networks}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {292--306}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_19}, doi = {10.1007/978-3-662-43936-4\_19}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/ChengPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/CostanteHPEP14, author = {Elisa Costante and Jerry den Hartog and Milan Petkovic and Sandro Etalle and Mykola Pechenizkiy}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Hunting the Unknown - White-Box Database Leakage Detection}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {243--259}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_16}, doi = {10.1007/978-3-662-43936-4\_16}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/CostanteHPEP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/CrescenzoCMP14, author = {Giovanni Di Crescenzo and Debra L. Cook and Allen McIntosh and Euthimios Panagos}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {339--355}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_22}, doi = {10.1007/978-3-662-43936-4\_22}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/CrescenzoCMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/CrescenzoS14, author = {Giovanni Di Crescenzo and David Shallcross}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {On Minimizing the Size of Encrypted Databases}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {364--372}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_24}, doi = {10.1007/978-3-662-43936-4\_24}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/CrescenzoS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/DavidsonGT14, author = {Michal Davidson and Ehud Gudes and Tamir Tassa}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Efficient and Enhanced Solutions for Content Sharing in {DRM} Systems}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {373--381}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_25}, doi = {10.1007/978-3-662-43936-4\_25}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/DavidsonGT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/DerlerHS14, author = {David Derler and Christian Hanser and Daniel Slamanig}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {49--65}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_4}, doi = {10.1007/978-3-662-43936-4\_4}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/DerlerHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/HanHA14, author = {Wonkyu Han and Hongxin Hu and Gail{-}Joon Ahn}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {{LPM:} Layered Policy Management for Software-Defined Networks}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {356--363}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_23}, doi = {10.1007/978-3-662-43936-4\_23}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/HanHA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/HongVLW14, author = {Yuan Hong and Jaideep Vaidya and Haibing Lu and Lingyu Wang}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {179--194}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_12}, doi = {10.1007/978-3-662-43936-4\_12}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/HongVLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/HuangZE14, author = {Chu Huang and Sencun Zhu and Robert F. Erbacher}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Toward Software Diversity in Heterogeneous Networked Systems}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {114--129}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_8}, doi = {10.1007/978-3-662-43936-4\_8}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/HuangZE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/KhanZHH14, author = {Rasib Khan and Shams Zawoad and Md Munirul Haque and Ragib Hasan}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {'Who, When, and Where?' Location Proof Assertion for Mobile Devices}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {146--162}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_10}, doi = {10.1007/978-3-662-43936-4\_10}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/KhanZHH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/LeKJ14, author = {Meixing Le and Krishna Kant and Sushil Jajodia}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Consistent Query Plan Generation in Secure Cooperative Data Access}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {227--242}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_15}, doi = {10.1007/978-3-662-43936-4\_15}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/LeKJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/LuHYFD14, author = {Haibing Lu and Yuan Hong and Yanjiang Yang and Yi Fang and Lian Duan}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Dynamic Workflow Adjustment with Security Constraints}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {211--226}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_14}, doi = {10.1007/978-3-662-43936-4\_14}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/LuHYFD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MehreganF14, author = {Pooya Mehregan and Philip W. L. Fong}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Design Patterns for Multiple Stakeholders in Social Computing}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {163--178}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_11}, doi = {10.1007/978-3-662-43936-4\_11}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/MehreganF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MoatazCCRR14, author = {Tarik Moataz and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Indrajit Ray and Indrakshi Ray}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {{ELITE:} zEro Links Identity managemenT systEm}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {195--210}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_13}, doi = {10.1007/978-3-662-43936-4\_13}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/MoatazCCRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MoatazJRCCR14, author = {Tarik Moataz and Benjamin Justus and Indrakshi Ray and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Indrajit Ray}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {66--81}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_5}, doi = {10.1007/978-3-662-43936-4\_5}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/MoatazJRCCR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/RaniseT14, author = {Silvio Ranise and Anh Tuan Truong}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Incremental Analysis of Evolving Administrative Role Based Access Control Policies}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {260--275}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_17}, doi = {10.1007/978-3-662-43936-4\_17}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/RaniseT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/SanamradBKV14, author = {Tahmineh Sanamrad and Lucas Braun and Donald Kossmann and Ramarathnam Venkatesan}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Randomly Partitioned Encryption for Cloud Databases}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {307--323}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_20}, doi = {10.1007/978-3-662-43936-4\_20}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/SanamradBKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/SolomonSX14, author = {Michael G. Solomon and Vaidy S. Sunderam and Li Xiong}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Towards Secure Cloud Database with Fine-Grained Access Control}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {324--338}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_21}, doi = {10.1007/978-3-662-43936-4\_21}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/SolomonSX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/VavilisPZ14, author = {Sokratis Vavilis and Milan Petkovic and Nicola Zannone}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Data Leakage Quantification}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {98--113}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_7}, doi = {10.1007/978-3-662-43936-4\_7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/VavilisPZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/VimercatiFJPS14, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Optimizing Integrity Checks for Join Queries in the Cloud}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {33--48}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_3}, doi = {10.1007/978-3-662-43936-4\_3}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/VimercatiFJPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/WeiY14, author = {Wei Wei and Ting Yu}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Integrity Assurance for Outsourced Databases without {DBMS} Modification}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {1--16}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_1}, doi = {10.1007/978-3-662-43936-4\_1}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/WeiY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/XuS14, author = {Zhongyuan Xu and Scott D. Stoller}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Mining Attribute-Based Access Control Policies from Logs}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {276--291}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_18}, doi = {10.1007/978-3-662-43936-4\_18}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/XuS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ZhauniarovichGCSM14, author = {Yury Zhauniarovich and Olga Gadyatskaya and Bruno Crispo and Francesco La Spina and Ermanno Moser}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {FSquaDRA: Fast Detection of Repackaged Applications}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {130--145}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_9}, doi = {10.1007/978-3-662-43936-4\_9}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ZhauniarovichGCSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2014, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4}, doi = {10.1007/978-3-662-43936-4}, isbn = {978-3-662-43935-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.