Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "network confident"
@article{DBLP:journals/bib/KatchborianNetoABNFOBMLDSLC24, author = {Albert Katchborian{-}Neto and Matheus F. Alves and Paula C. P. Bueno and Karen de Jesus Nic{\'{a}}cio and Miller S. Ferreira and Tiago B. Oliveira and Henrique Barbosa and Michael Murgu and Ana C. C. de Paula Ladvocat and Danielle F. Dias and Marisi G. Soares and Jo{\~{a}}o Henrique Ghilardi Lago and Daniela A Chagas{-}Paula}, title = {Integrative open workflow for confident annotation and molecular networking of metabolomics {MSE/DIA} data}, journal = {Briefings Bioinform.}, volume = {25}, number = {2}, year = {2024}, url = {https://doi.org/10.1093/bib/bbae013}, doi = {10.1093/BIB/BBAE013}, timestamp = {Thu, 02 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bib/KatchborianNetoABNFOBMLDSLC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/IlliQAAARMRAA24, author = {Elmehdi Illi and Marwa K. Qaraqe and Saud Althunibat and Abdullah Al{-}Hasanat and Moath Alsafasfeh and Marcus de Ree and Georgios Mantas and Jonathan Rodriguez and Waqas Aman and Saif Al{-}Kuwari}, title = {Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: {A} Paradigm Shift in Securing IoT Networks}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {26}, number = {1}, pages = {347--388}, year = {2024}, url = {https://doi.org/10.1109/COMST.2023.3327327}, doi = {10.1109/COMST.2023.3327327}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comsur/IlliQAAARMRAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgrs/XieZLHS24, author = {Yifan Xie and Jihua Zhu and Shiqi Li and Naiwen Hu and Pengcheng Shi}, title = {{HECPG:} Hyperbolic Embedding and Confident Patch-Guided Network for Point Cloud Matching}, journal = {{IEEE} Trans. Geosci. Remote. Sens.}, volume = {62}, pages = {1--12}, year = {2024}, url = {https://doi.org/10.1109/TGRS.2024.3370591}, doi = {10.1109/TGRS.2024.3370591}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tgrs/XieZLHS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/VermaC24, author = {Praveen Verma and Chandan Chakraborty}, title = {High Impact Local Load Redistribution Attack Without Confidential Network Information}, journal = {{IEEE} Trans. Smart Grid}, volume = {15}, number = {2}, pages = {2383--2386}, year = {2024}, url = {https://doi.org/10.1109/TSG.2023.3343125}, doi = {10.1109/TSG.2023.3343125}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsg/VermaC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-11531, author = {Rongwu Xu and Zhixuan Fang}, title = {Tempo: Confidentiality Preservation in Cloud-Based Neural Network Training}, journal = {CoRR}, volume = {abs/2401.11531}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.11531}, doi = {10.48550/ARXIV.2401.11531}, eprinttype = {arXiv}, eprint = {2401.11531}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-11531.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-12572, author = {Chhavi Yadav and Amrita Roy Chowdhury and Dan Boneh and Kamalika Chaudhuri}, title = {FairProof : Confidential and Certifiable Fairness for Neural Networks}, journal = {CoRR}, volume = {abs/2402.12572}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.12572}, doi = {10.48550/ARXIV.2402.12572}, eprinttype = {arXiv}, eprint = {2402.12572}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-12572.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-03360, author = {Mengyuan Li and Shashvat Srivastava and Mengjia Yan}, title = {Bridge the Future: High-Performance Networks in Confidential VMs without Trusted {I/O} devices}, journal = {CoRR}, volume = {abs/2403.03360}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.03360}, doi = {10.48550/ARXIV.2403.03360}, eprinttype = {arXiv}, eprint = {2403.03360}, timestamp = {Wed, 03 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-03360.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Pleska23, author = {Arijus Pleska}, title = {Privacy-preserving Learning by Averaging in Collaborative Networks. (Calcul des Moyennes dans des R{\'{e}}seaux Collaboratifs pour l'Apprentissage Automatique et Pr{\'{e}}servant la Confidentialit{\'{e}})}, school = {University of Lille, France}, year = {2023}, url = {https://tel.archives-ouvertes.fr/tel-04198205}, timestamp = {Sun, 21 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/hal/Pleska23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AcharFBR23, author = {Sandesh Achar and Nuruzzaman Faruqui and Anusha Bodepudi and Manjunath Reddy}, title = {Confimizer: {A} Novel Algorithm to Optimize Cloud Resource by Confidentiality-Cost Trade-Off Using BiLSTM Network}, journal = {{IEEE} Access}, volume = {11}, pages = {89205--89217}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3305506}, doi = {10.1109/ACCESS.2023.3305506}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AcharFBR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ans/BobakZLO23, author = {Carly A. Bobak and Yifan Zhao and Joshua J. Levy and A. James O'Malley}, title = {{GRANDPA:} GeneRAtive network sampling using degree and property augmentation applied to the analysis of partially confidential healthcare networks}, journal = {Appl. Netw. Sci.}, volume = {8}, number = {1}, pages = {23}, year = {2023}, url = {https://doi.org/10.1007/s41109-023-00548-5}, doi = {10.1007/S41109-023-00548-5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ans/BobakZLO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcm/TagareN23, author = {Trupti Shripad Tagare and Rajashree Narendra}, title = {Confidentiality Enhancement Using Spread Spectrum Modulation Technique for Aggregated Data in Wireless Sensor Networks}, journal = {J. Commun.}, volume = {18}, number = {5}, pages = {294--300}, year = {2023}, url = {https://doi.org/10.12720/jcm.18.5.294-300}, doi = {10.12720/JCM.18.5.294-300}, timestamp = {Wed, 31 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcm/TagareN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/XiaDYLYZT23, author = {Yunzhi Xia and Xianjun Deng and Lingzhi Yi and Shenghao Liu and Laurence T. Yang and Chenlu Zhu and Xiao Tang}, title = {A Trust-Based Reliable Confident Information Coverage Model of Wireless Sensor Networks for Intelligent Transportation}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {7}, pages = {9542--9554}, year = {2023}, url = {https://doi.org/10.1109/TVT.2023.3253131}, doi = {10.1109/TVT.2023.3253131}, timestamp = {Thu, 02 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/XiaDYLYZT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/XiaoDLXFYY23, author = {Ziheng Xiao and Xianjun Deng and Hongwei Lu and Yunzhi Xia and Xiaoxuan Fan and Lingzhi Yi and Laurence T. Yang}, title = {Tensor and Confident Information Coverage Based Reliability Evaluation for Large-Scale Intelligent Transportation Wireless Sensor Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {10}, pages = {13461--13473}, year = {2023}, url = {https://doi.org/10.1109/TVT.2023.3275579}, doi = {10.1109/TVT.2023.3275579}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/XiaoDLXFYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aimlr/LiHWJBY23, author = {Zhaokui Li and Xu Huo and Yan Wang and Zihui Jiang and Ke Bi and Fengyuan Yang}, title = {Dual Confident Learning-based Network for Hyperspectral Image Classification with Noisy Labels}, booktitle = {Asia Conference on Artificial Intelligence, Machine Learning and Robotics, {AIMLR} 2023, Bangkok, Thailand, September 15-17, 2023}, pages = {18:1--18:5}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3625343.3625363}, doi = {10.1145/3625343.3625363}, timestamp = {Sat, 13 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aimlr/LiHWJBY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/HlaingA23, author = {Htet Htet Hlaing and Hitoshi Asaeda}, title = {Ensuring Content Integrity and Confidentiality in Information-Centric Secure Networks}, booktitle = {20th {IEEE} Consumer Communications {\&} Networking Conference, {CCNC} 2023, Las Vegas, NV, USA, January 8-11, 2023}, pages = {810--816}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CCNC51644.2023.10060672}, doi = {10.1109/CCNC51644.2023.10060672}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/HlaingA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/KahateR23, author = {Sandip A. Kahate and Atul D. Raut}, title = {An Enhanced Data Confidentiality in Online Social Networks Using Quantum Key Management with a Blockchain Approach}, booktitle = {14th International Conference on Computing Communication and Networking Technologies, {ICCCNT} 2023, Delhi, India, July 6-8, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCCNT56998.2023.10307914}, doi = {10.1109/ICCCNT56998.2023.10307914}, timestamp = {Thu, 30 Nov 2023 16:40:53 +0100}, biburl = {https://dblp.org/rec/conf/icccnt/KahateR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ofc/SilvaSPPGMV23, author = {Mois{\'{e}}s Felipe Silva and Andrea Sgambelluri and Alessandro Pacini and Francesco Paolucci and Andre Green and David Mascare{\~{n}}as and Luca Valcarenghi}, title = {Confidential Detection of Multiple Failures in Optical Networks: an Experimental Evaluation}, booktitle = {Optical Fiber Communications Conference and Exhibition, {OFC} 2023, San Diego, CA, USA, March 5-9, 2023}, pages = {1--3}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/OFC49934.2023.10116347}, doi = {10.23919/OFC49934.2023.10116347}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ofc/SilvaSPPGMV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/LiMJTZG023, author = {Dingji Li and Zeyu Mi and Chenhui Ji and Yifan Tan and Binyu Zang and Haibing Guan and Haibo Chen}, editor = {Julia Lawall and Dan Williams}, title = {Bifrost: Analysis and Optimization of Network {I/O} Tax in Confidential Virtual Machines}, booktitle = {2023 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2023, Boston, MA, USA, July 10-12, 2023}, pages = {1--15}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/atc23/presentation/li-dingji}, timestamp = {Sat, 15 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/usenix/LiMJTZG023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-19574, author = {Lin Hu and Jiabing Fan and Hong Wen and Jie Tang and Qianbin Chen}, title = {Confidential Signal Cancellation Phenomenon in Interference Alignment Networks: Cause and Cure}, journal = {CoRR}, volume = {abs/2305.19574}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.19574}, doi = {10.48550/ARXIV.2305.19574}, eprinttype = {arXiv}, eprint = {2305.19574}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-19574.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Neto22, author = {Renato Caminha Jua{\c{c}}aba{-}Neto}, title = {Privacy-aware aggregation of IoT streams in multi-owner networks. (Agr{\'{e}}gation de flux de donn{\'{e}}es IoT confidentiels dans des r{\'{e}}seaux multi-propri{\'{e}}taires)}, school = {University of Strasbourg, France}, year = {2022}, url = {https://tel.archives-ouvertes.fr/tel-04012692}, timestamp = {Sun, 26 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/hal/Neto22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BrahimiM22, author = {Mohamed Amine Brahimi and Fatiha Merazka}, title = {Data confidentiality-preserving schemes for random linear network coding-capable networks}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103136}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103136}, doi = {10.1016/J.JISA.2022.103136}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BrahimiM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocnet/SilvaSPPGMV22, author = {Mois{\'{e}}s Felipe Silva and Andrea Sgambelluri and Alessandro Pacini and Francesco Paolucci and Andre Green and David Mascare{\~{n}}as and Luca Valcarenghi}, title = {Confidentiality-preserving machine learning algorithms for soft-failure detection in optical communication networks}, journal = {{JOCN}}, volume = {15}, number = {8}, pages = {C212--C222}, year = {2022}, url = {https://doi.org/10.1364/jocn.481690}, doi = {10.1364/JOCN.481690}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocnet/SilvaSPPGMV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/HehirSN22, author = {Jonathan Hehir and Aleksandra B. Slavkovic and Xiaoyue Niu}, title = {Consistent Spectral Clustering of Network Block Models under Local Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {12}, number = {2}, year = {2022}, url = {https://doi.org/10.29012/jpc.811}, doi = {10.29012/JPC.811}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/HehirSN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/ZhangCZFGFL22, author = {Hui Zhang and Junxin Chen and Leo Yu Zhang and Chong Fu and Raffaele Gravina and Giancarlo Fortino and Zhihan Lv}, title = {Low-Cost and Confidential {ECG} Acquisition Framework Using Compressed Sensing and Chaotic Systems for Wireless Body Area Network}, journal = {{IEEE} J. Biomed. Health Informatics}, volume = {26}, number = {12}, pages = {5783--5792}, year = {2022}, url = {https://doi.org/10.1109/JBHI.2022.3206232}, doi = {10.1109/JBHI.2022.3206232}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/titb/ZhangCZFGFL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/DengTYYXTZ22, author = {Xianjun Deng and Yuan Tian and Lingzhi Yi and Laurence Tianruo Yang and Yunzhi Xia and Xiao Tang and Chenlu Zhu}, title = {Resilient Deployment of Smart Nodes for Improving Confident Information Coverage in 5G IoT}, journal = {{ACM} Trans. Sens. Networks}, volume = {18}, number = {3}, pages = {44:1--44:21}, year = {2022}, url = {https://doi.org/10.1145/3526196}, doi = {10.1145/3526196}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosn/DengTYYXTZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icatech/LemeshkoYMG22, author = {Oleksandr Lemeshko and Oleksandra Yeremenko and Amal Mersni and Juraj Gazda}, title = {Improvement of Confidential Messages Secure Routing over Paths with Intersection in Cyber Resilient Networks}, booktitle = {{XXVIII} International Conference on Information, Communication and Automation Technologies, {ICAT} 2022, Sarajevo, Bosnia and Herzegovina, June 16-18, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAT54566.2022.9811191}, doi = {10.1109/ICAT54566.2022.9811191}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icatech/LemeshkoYMG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/TianXYTTZ22, author = {Wensheng Tian and Ruiyan Xia and Zhichao Yan and Panpan Tang and Yonggang Tu and Lei Zhang}, title = {Enhancing Intellectual Property Protection in Deep Neural Network with Confidential Computing}, booktitle = {{IEEE} Smartworld, Ubiquitous Intelligence {\&} Computing, Scalable Computing {\&} Communications, Digital Twin, Privacy Computing, Metaverse, Autonomous {\&} Trusted Vehicles, SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022, Haikou, China, December 15-18, 2022}, pages = {635--640}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00105}, doi = {10.1109/SMARTWORLD-UIC-ATC-SCALCOM-DIGITALTWIN-PRICOMP-METAVERSE56740.2022.00105}, timestamp = {Fri, 04 Aug 2023 17:34:39 +0200}, biburl = {https://dblp.org/rec/conf/uic/TianXYTTZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-10903, author = {Laurens Sluijterman and Eric Cator and Tom Heskes}, title = {Confident Neural Network Regression with Bootstrapped Deep Ensembles}, journal = {CoRR}, volume = {abs/2202.10903}, year = {2022}, url = {https://arxiv.org/abs/2202.10903}, eprinttype = {arXiv}, eprint = {2202.10903}, timestamp = {Thu, 03 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-10903.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-05546, author = {Stanislav Fort and Ekin Dogus Cubuk and Surya Ganguli and Samuel S. Schoenholz}, title = {What does a deep neural network confidently perceive? The effective dimension of high certainty class manifolds and their low confidence boundaries}, journal = {CoRR}, volume = {abs/2210.05546}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.05546}, doi = {10.48550/ARXIV.2210.05546}, eprinttype = {arXiv}, eprint = {2210.05546}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-05546.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YehWHLC21, author = {Chien{-}Hung Yeh and Bo{-}Yin Wang and Wei{-}Hung Hsu and Wen{-}Piao Lin and Chi{-}Wai Chow}, title = {Symmetry 28 Gbps/{\(\lambda\)} {WDM} Access Network Together With Confidential Connection Between Two Specific Clients}, journal = {{IEEE} Access}, volume = {9}, pages = {122738--122743}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3109424}, doi = {10.1109/ACCESS.2021.3109424}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/YehWHLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MadaniT21, author = {Mahdi Madani and Camel Tanougast}, title = {Optimized and robust implementation of mobile networks confidentiality and integrity functions}, journal = {Comput. Secur.}, volume = {100}, pages = {102093}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102093}, doi = {10.1016/J.COSE.2020.102093}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MadaniT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/RauthanV21, author = {J. S. Rauthan and Kunwar Singh Vaisla}, title = {{VRS-DB:} preserve confidentiality of users' data using encryption approach}, journal = {Digit. Commun. Networks}, volume = {7}, number = {1}, pages = {62--71}, year = {2021}, url = {https://doi.org/10.1016/j.dcan.2019.08.001}, doi = {10.1016/J.DCAN.2019.08.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcan/RauthanV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/FengCDYT21, author = {Jie Feng and Hongbin Chen and Xianjun Deng and Laurence Tianruo Yang and Fangqing Tan}, title = {Confident Information Coverage Hole Prediction and Repairing for Healthcare Big Data Collection in Large-Scale Hybrid Wireless Sensor Networks}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {23}, pages = {16801--16813}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3045024}, doi = {10.1109/JIOT.2020.3045024}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/FengCDYT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/IqbalUAWAZK21, author = {Jawaid Iqbal and Arif Iqbal Umar and Noor Ul Amin and Abdul Waheed and Saleem Abdullah and Mahdi Zareei and Muazzam Ali Khan Khattak}, title = {Efficient network selection using multi fuzzy criteria for confidential data transmission in wireless body sensor networks}, journal = {J. Intell. Fuzzy Syst.}, volume = {41}, number = {1}, pages = {37--55}, year = {2021}, url = {https://doi.org/10.3233/JIFS-191104}, doi = {10.3233/JIFS-191104}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/IqbalUAWAZK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/BaoXZZD21, author = {Ergute Bao and Xiaokui Xiao and Jun Zhao and Dongping Zhang and Bolin Ding}, title = {Synthetic Data Generation with Differential Privacy via Bayesian Networks}, journal = {J. Priv. Confidentiality}, volume = {11}, number = {3}, year = {2021}, url = {https://doi.org/10.29012/jpc.776}, doi = {10.29012/JPC.776}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/BaoXZZD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/YangWHL21, author = {Zhen Yang and Wenyu Wang and Yongfeng Huang and Xing Li}, title = {A Multi-grained Log Auditing Scheme for Cloud Data Confidentiality}, journal = {Mob. Networks Appl.}, volume = {26}, number = {2}, pages = {842--850}, year = {2021}, url = {https://doi.org/10.1007/s11036-019-01328-1}, doi = {10.1007/S11036-019-01328-1}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/YangWHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/osn/SavvaME21, author = {Giannis Savva and Konstantinos Manousakis and Georgios Ellinas}, title = {Confidentiality meets protection in elastic optical networks}, journal = {Opt. Switch. Netw.}, volume = {42}, pages = {100620}, year = {2021}, url = {https://doi.org/10.1016/j.osn.2021.100620}, doi = {10.1016/J.OSN.2021.100620}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/osn/SavvaME21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/HarnXH21, author = {Lein Harn and Zhe Xia and Chingfang Hsu}, title = {Non-interactive secure multi-party arithmetic computations with confidentiality for {P2P} networks}, journal = {Peer-to-Peer Netw. Appl.}, volume = {14}, number = {2}, pages = {722--728}, year = {2021}, url = {https://doi.org/10.1007/s12083-020-01029-7}, doi = {10.1007/S12083-020-01029-7}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ppna/HarnXH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/ZhangXDZ21, author = {Xiaoyu Zhang and Maochao Xu and Gaofeng Da and Peng Zhao}, title = {Ensuring confidentiality and availability of sensitive data over a network system under cyber threats}, journal = {Reliab. Eng. Syst. Saf.}, volume = {214}, pages = {107697}, year = {2021}, url = {https://doi.org/10.1016/j.ress.2021.107697}, doi = {10.1016/J.RESS.2021.107697}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/ZhangXDZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/socnet/JariegoAH21, author = {Isidro Maya Jariego and Deniza Alieva and Daniel Holgado}, title = {Confidentiality, power relations and evaluation of potential harm in the study of the personal and organizational networks of travel agents in Moscow}, journal = {Soc. Networks}, volume = {67}, pages = {55--64}, year = {2021}, url = {https://doi.org/10.1016/j.socnet.2019.10.009}, doi = {10.1016/J.SOCNET.2019.10.009}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/socnet/JariegoAH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/socnet/RudolphY21, author = {Abby E. Rudolph and April M. Young}, title = {Privacy and confidentiality considerations for collecting {HIV} risk network data among men who have sex with men and implications for constructing valid risk networks}, journal = {Soc. Networks}, volume = {67}, pages = {47--54}, year = {2021}, url = {https://doi.org/10.1016/j.socnet.2019.09.002}, doi = {10.1016/J.SOCNET.2019.09.002}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/socnet/RudolphY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/AzeesVKN21, author = {Maria Azees and Pandi Vijayakumar and Marimuthu Karuppiah and Anand Nayyar}, title = {An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks}, journal = {Wirel. Networks}, volume = {27}, number = {3}, pages = {2119--2130}, year = {2021}, url = {https://doi.org/10.1007/s11276-021-02560-y}, doi = {10.1007/S11276-021-02560-Y}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/winet/AzeesVKN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/camad/ReeMRAQAAAOTUTA21, author = {Marcus de Ree and Georgios Mantas and Jonathan Rodriguez and Saud Althunibat and Marwa K. Qaraqe and Abdullah Al{-}Hasanat and Saif M. Al{-}Kuwari and Moath Alsafasfeh and Gabriele Oligeri and Seda Dogan Tusha and Muhammad Usman and Fatima Abu Taha and Samiha Alfalahat and Tasneem Alshamaseen and Malak Qaisi}, title = {Data Confidentiality for IoT Networks: Cryptographic Gaps and Physical-Layer Opportunities}, booktitle = {26th {IEEE} International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, {CAMAD} 2021, Porto, Portugal, October 25-27, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CAMAD52502.2021.9617779}, doi = {10.1109/CAMAD52502.2021.9617779}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/camad/ReeMRAQAAAOTUTA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crowncom/JiNF21, author = {Chenglan Ji and Zhenyu Na and Zilong Feng}, editor = {Huilong Jin and Chungang Liu and Al{-}Sakib Khan Pathan and Zubair Md. Fadlullah and Salimur Choudhury}, title = {Confidential Communications for Mobile {UAV} Relaying Network}, booktitle = {Cognitive Radio Oriented Wireless Networks and Wireless Internet - 16th {EAI} International Conference, {CROWNCOM} 2021, Virtual Event, December 11, 2021, and 14th {EAI} International Conference, WiCON 2021, Virtual Event, November 9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {427}, pages = {240--250}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-98002-3\_18}, doi = {10.1007/978-3-030-98002-3\_18}, timestamp = {Fri, 01 Apr 2022 14:10:55 +0200}, biburl = {https://dblp.org/rec/conf/crowncom/JiNF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/ZhangWZ21, author = {Zhiyi Zhang and Su Yong Won and Lixia Zhang}, title = {Investigating the Design Space for Name Confidentiality in Named Data Networking}, booktitle = {2021 {IEEE} Military Communications Conference, {MILCOM} 2021, San Diego, CA, USA, November 29 - Dec. 2, 2021}, pages = {570--576}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/MILCOM52596.2021.9652892}, doi = {10.1109/MILCOM52596.2021.9652892}, timestamp = {Thu, 15 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcom/ZhangWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/DasSS21, author = {Tapadhir Das and Raj Mani Shukla and Shamik Sengupta}, editor = {Mauro Andreolini and Mirco Marchetti and Dimiter R. Avresky}, title = {The Devil is in the Details: Confident {\&} Explainable Anomaly Detector for Software-Defined Networks}, booktitle = {20th {IEEE} International Symposium on Network Computing and Applications, {NCA} 2021, Boston, MA, USA, November 23-26, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/NCA53618.2021.9685157}, doi = {10.1109/NCA53618.2021.9685157}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nca/DasSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/WangLSY21, author = {Xiao Wang and Hongrui Liu and Chuan Shi and Cheng Yang}, editor = {Marc'Aurelio Ranzato and Alina Beygelzimer and Yann N. Dauphin and Percy Liang and Jennifer Wortman Vaughan}, title = {Be Confident! Towards Trustworthy Graph Neural Networks via Confidence Calibration}, booktitle = {Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, NeurIPS 2021, December 6-14, 2021, virtual}, pages = {23768--23779}, year = {2021}, url = {https://proceedings.neurips.cc/paper/2021/hash/c7a9f13a6c0940277d46706c7ca32601-Abstract.html}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/WangLSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/primelife/SchollerACBR21, author = {R{\'{e}}my Scholler and Ouma{\"{\i}}ma Alaoui{-}Isma{\"{\i}}li and Jean{-}Fran{\c{c}}ois Couchot and Eric Ballot and Denis Renaud}, editor = {Michael Friedewald and Stephan Krenn and Ina Schiering and Stefan Schiffner}, title = {Observing Road Freight Traffic from Mobile Network Signalling Data While Respecting Privacy and Business Confidentiality}, booktitle = {Privacy and Identity Management. Between Data Protection and Security - 16th {IFIP} {WG} 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16-20, 2021, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {644}, pages = {195--205}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-99100-5\_14}, doi = {10.1007/978-3-030-99100-5\_14}, timestamp = {Thu, 31 Mar 2022 15:05:39 +0200}, biburl = {https://dblp.org/rec/conf/primelife/SchollerACBR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/quatic/BarbareschiBFM21, author = {Mario Barbareschi and Salvatore Barone and Alfonso Fezza and Erasmo La Montagna}, editor = {Ana C. R. Paiva and Ana Rosa Cavalli and Paula Ventura Martins and Ricardo P{\'{e}}rez{-}Castillo}, title = {Enforcing Mutual Authentication and Confidentiality in Wireless Sensor Networks Using Physically Unclonable Functions: {A} Case Study}, booktitle = {Quality of Information and Communications Technology - 14th International Conference, {QUATIC} 2021, Algarve, Portugal, September 8-11, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1439}, pages = {297--310}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85347-1\_22}, doi = {10.1007/978-3-030-85347-1\_22}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/quatic/BarbareschiBFM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wf-iot/JoudMBR21, author = {Rapha{\"{e}}l Joud and Pierre{-}Alain Mo{\"{e}}llic and R{\'{e}}mi Bernhard and Jean{-}Baptiste Rigaud}, title = {A Review of Confidentiality Threats Against Embedded Neural Network Models}, booktitle = {7th {IEEE} World Forum on Internet of Things, WF-IoT 2021, New Orleans, LA, USA, June 14 - July 31, 2021}, pages = {610--615}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/WF-IoT51360.2021.9595434}, doi = {10.1109/WF-IOT51360.2021.9595434}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wf-iot/JoudMBR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-10612, author = {Aleksandr Lenin and Peeter Laud}, title = {Content Confidentiality in Named Data Networking}, journal = {CoRR}, volume = {abs/2102.10612}, year = {2021}, url = {https://arxiv.org/abs/2102.10612}, eprinttype = {arXiv}, eprint = {2102.10612}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-10612.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-01401, author = {Rapha{\"{e}}l Joud and Pierre{-}Alain Mo{\"{e}}llic and R{\'{e}}mi Bernhard and Jean{-}Baptiste Rigaud}, title = {A Review of Confidentiality Threats Against Embedded Neural Network Models}, journal = {CoRR}, volume = {abs/2105.01401}, year = {2021}, url = {https://arxiv.org/abs/2105.01401}, eprinttype = {arXiv}, eprint = {2105.01401}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-01401.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-14285, author = {Xiao Wang and Hongrui Liu and Chuan Shi and Cheng Yang}, title = {Be Confident! Towards Trustworthy Graph Neural Networks via Confidence Calibration}, journal = {CoRR}, volume = {abs/2109.14285}, year = {2021}, url = {https://arxiv.org/abs/2109.14285}, eprinttype = {arXiv}, eprint = {2109.14285}, timestamp = {Mon, 27 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-14285.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc9065, author = {Godred Fairhurst and Colin Perkins}, title = {Considerations around Transport Header Confidentiality, Network Operations, and the Evolution of Internet Transport Protocols}, journal = {{RFC}}, volume = {9065}, pages = {1--37}, year = {2021}, url = {https://doi.org/10.17487/RFC9065}, doi = {10.17487/RFC9065}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/rfc/rfc9065.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/Al-MolikiAA20, author = {Yahya M. Al{-}Moliki and Mohammed T. Alresheedi and Yahya Al{-}Harthi}, title = {Improving Availability and Confidentiality via Hyperchaotic Baseband Frequency Hopping Based on Optical {OFDM} in {VLC} Networks}, journal = {{IEEE} Access}, volume = {8}, pages = {125013--125028}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3007429}, doi = {10.1109/ACCESS.2020.3007429}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/Al-MolikiAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BajwaKMSMDA20, author = {Muhammad Naseer Bajwa and Suleman Khurram and Mohsin Munir and Shoaib Ahmed Siddiqui and Muhammad Imran Malik and Andreas Dengel and Sheraz Ahmed}, title = {Confident Classification Using a Hybrid Between Deterministic and Probabilistic Convolutional Neural Networks}, journal = {{IEEE} Access}, volume = {8}, pages = {115476--115485}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3004409}, doi = {10.1109/ACCESS.2020.3004409}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BajwaKMSMDA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/LiuWLWGN20, author = {Zhixin Liu and Sainan Wang and Yang Liu and Yu Wang and Xinping Guan and Dusit Niyato}, title = {Robust Secure Transmission and Power Transfer in Heterogeneous Networks With Confidential Information}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {69}, number = {10}, pages = {11192--11205}, year = {2020}, url = {https://doi.org/10.1109/TVT.2020.3008349}, doi = {10.1109/TVT.2020.3008349}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/LiuWLWGN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ForsterCFPF20, author = {Niklas F{\"{o}}rster and Juan A. Cabrera and Elke Franz and Stefan Pfennig and Frank H. P. Fitzek}, title = {Efficient Confidentiality for Network Coded Distributed Storage}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2020, Virtual Event, Taiwan, December 7-11, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/GLOBECOM42002.2020.9347955}, doi = {10.1109/GLOBECOM42002.2020.9347955}, timestamp = {Thu, 20 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/ForsterCFPF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NisslmuellerF0D20, author = {Utz Nisslmueller and Klaus{-}Tycho Foerster and Stefan Schmid and Christian Decker}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Toward Active and Passive Confidentiality Attacks on Cryptocurrency Off-chain Networks}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {7--14}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009429200070014}, doi = {10.5220/0009429200070014}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NisslmuellerF0D20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icton/SavvaME20, author = {Giannis Savva and Konstantinos Manousakis and Georgios Ellinas}, title = {Providing Confidentiality in Optical Networks: Metaheuristic Techniques for the Joint Network Coding-Routing and Spectrum Allocation Problem}, booktitle = {22nd International Conference on Transparent Optical Networks, {ICTON} 2020, Bari, Italy, July 19-23, 2020}, pages = {1--4}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICTON51198.2020.9203018}, doi = {10.1109/ICTON51198.2020.9203018}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icton/SavvaME20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ksem/LuJYLLHL20, author = {Yue Lu and Jianguo Jiang and Min Yu and Chao Liu and Chaochao Liu and Weiqing Huang and Zhiqiang Lv}, editor = {Gang Li and Heng Tao Shen and Ye Yuan and Xiaoyang Wang and Huawen Liu and Xiang Zhao}, title = {Depthwise Separable Convolutional Neural Network for Confidential Information Analysis}, booktitle = {Knowledge Science, Engineering and Management - 13th International Conference, {KSEM} 2020, Hangzhou, China, August 28-30, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12275}, pages = {450--461}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55393-7\_40}, doi = {10.1007/978-3-030-55393-7\_40}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ksem/LuJYLLHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/RhimATSF20, author = {Hana Rhim and Ryma Abassi and Karim Tamine and Damien Sauveron and Sihem Guemara El Fatmi}, editor = {Chih{-}Cheng Hung and Tom{\'{a}}s Cern{\'{y}} and Dongwan Shin and Alessio Bechini}, title = {A secure network coding-enabled approach for a confidential cluster-based routing in wireless sensor networks}, booktitle = {{SAC} '20: The 35th {ACM/SIGAPP} Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30 - April 3, 2020}, pages = {2151--2157}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3341105.3373969}, doi = {10.1145/3341105.3373969}, timestamp = {Thu, 02 Apr 2020 17:08:04 +0200}, biburl = {https://dblp.org/rec/conf/sac/RhimATSF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ZimmermannBA20, author = {Till Zimmermann and Jan Bauer and Nils Aschenbruck}, editor = {Delphine Reinhardt and Hanno Langweg and Bernhard C. Witt and Mathias Fischer}, title = {CryptoCAN - Ensuring Confidentiality in Controller Area Networks for Agriculture}, booktitle = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz 2020, G{\"{o}}ttingen}, series = {{LNI}}, volume = {{P-301}}, pages = {79--90}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2020}, url = {https://doi.org/10.18420/sicherheit2020\_06}, doi = {10.18420/SICHERHEIT2020\_06}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/ZimmermannBA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-11844, author = {Do Ngoc Diep}, title = {Statistical Tests and Confidential Intervals as Thresholds for Quantum Neural Networks}, journal = {CoRR}, volume = {abs/2001.11844}, year = {2020}, url = {https://arxiv.org/abs/2001.11844}, eprinttype = {arXiv}, eprint = {2001.11844}, timestamp = {Mon, 03 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-11844.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-00003, author = {Utz Nisslmueller and Klaus{-}Tycho Foerster and Stefan Schmid and Christian Decker}, title = {Toward Active and Passive Confidentiality Attacks On Cryptocurrency Off-Chain Networks}, journal = {CoRR}, volume = {abs/2003.00003}, year = {2020}, url = {https://arxiv.org/abs/2003.00003}, eprinttype = {arXiv}, eprint = {2003.00003}, timestamp = {Wed, 12 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-00003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Hussain19, author = {Mohibi Hussain}, title = {Availability, integrity, and confidentiality for content centric network internet architectures}, school = {University of Cambridge, {UK}}, year = {2019}, url = {https://doi.org/10.17863/CAM.65956}, doi = {10.17863/CAM.65956}, timestamp = {Mon, 22 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Hussain19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Harrane19, author = {Ibrahim El Khalil Harrane}, title = {Energy and privacy aware estimation over adaptive networks. (Estimation distribu{\'{e}}e respectueuse de la consommation d'{\'{e}}nergie et de la confidentialit{\'{e}} sur les r{\'{e}}seaux adaptatifs)}, school = {University of C{\^{o}}te d'Azur, Nice, France}, year = {2019}, url = {https://tel.archives-ouvertes.fr/tel-02529305}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Harrane19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/FengC19, author = {Jie Feng and Hongbin Chen}, title = {Repairing Confident Information Coverage Holes for Big Data Collection in Large-Scale Heterogeneous Wireless Sensor Networks}, journal = {{IEEE} Access}, volume = {7}, pages = {155347--155360}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2949136}, doi = {10.1109/ACCESS.2019.2949136}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/FengC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/BuIK19, author = {Lake Bu and Mihailo Isakov and Michel A. Kinsy}, title = {A secure and robust scheme for sharing confidential information in IoT systems}, journal = {Ad Hoc Networks}, volume = {92}, year = {2019}, url = {https://doi.org/10.1016/j.adhoc.2018.09.007}, doi = {10.1016/J.ADHOC.2018.09.007}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/BuIK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/HurrahPSAM19, author = {Nasir N. Hurrah and Shabir A. Parah and Javaid A. Sheikh and Fadi Al{-}Turjman and Khan Muhammad}, title = {Secure data transmission framework for confidentiality in IoTs}, journal = {Ad Hoc Networks}, volume = {95}, year = {2019}, url = {https://doi.org/10.1016/j.adhoc.2019.101989}, doi = {10.1016/J.ADHOC.2019.101989}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/HurrahPSAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcmse/Cai19, author = {Zhongmin Cai}, title = {Security and confidentiality of network communication using chaotic encryption technology}, journal = {J. Comput. Methods Sci. Eng.}, volume = {19}, number = {4}, pages = {1083--1092}, year = {2019}, url = {https://doi.org/10.3233/JCM-193840}, doi = {10.3233/JCM-193840}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcmse/Cai19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiuK19, author = {Charles Z. Liu and Manolya Kavakli}, title = {A data-aware confidential tunnel for wireless sensor media networks}, journal = {Multim. Tools Appl.}, volume = {78}, number = {19}, pages = {26941--26963}, year = {2019}, url = {https://doi.org/10.1007/s11042-017-4395-5}, doi = {10.1007/S11042-017-4395-5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LiuK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShabbirSRA19, author = {Aysha Shabbir and Maryam Shabbir and Muhammad Rizwan and Fahad Ahmad}, title = {Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2509898:1--2509898:16}, year = {2019}, url = {https://doi.org/10.1155/2019/2509898}, doi = {10.1155/2019/2509898}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShabbirSRA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/JiangYZJDWLL19, author = {Yalan Jiang and Lingzhi Yi and Lu Zhu and Zhenkun Jin and Xianjun Deng and Minghua Wang and Yong Liu and Xiangyang Li}, title = {A Novel Strategy for Barrier Confident Information Coverage in Sensor Networks}, booktitle = {2019 {IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2019, Fukuoka, Japan, August 5-8, 2019}, pages = {228--231}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00049}, doi = {10.1109/DASC/PICOM/CBDCOM/CYBERSCITECH.2019.00049}, timestamp = {Sun, 10 Nov 2019 16:47:28 +0100}, biburl = {https://dblp.org/rec/conf/dasc/JiangYZJDWLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/GomezWMD19, author = {Laurent Gomez and Marcus Wilhelm and Jos{\'{e}} M{\'{a}}rquez and Patrick Duverger}, editor = {Mohammad S. Obaidat and Pierangela Samarati}, title = {Security for Distributed Deep Neural Networks: Towards Data Confidentiality {\&} Intellectual Property Protection}, booktitle = {Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague, Czech Republic, July 26-28, 2019}, pages = {439--447}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007922404390447}, doi = {10.5220/0007922404390447}, timestamp = {Tue, 06 Jun 2023 14:58:02 +0200}, biburl = {https://dblp.org/rec/conf/icete/GomezWMD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iddm/DronyukFLK19, author = {Ivanna Dronyuk and Olga Fedevych and Danylo Lizanets and Natalia Kryvinska}, editor = {Nataliya Shakhovska and Ivan Izonin and Sergio Montenegro and Yannick Est{\`{e}}ve and Jaime Campos and Natalia Kryvinska}, title = {An Overview of Ateb-Theory Mathematical Apparatus for Data Confidentiality in Medical Computer Networks}, booktitle = {Proceedings of the 2nd International Workshop on Informatics {\&} Data-Driven Medicine {(IDDM} 2019), Lviv, Ukraine, November 11-13, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2488}, pages = {175--184}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2488/paper15.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:42 +0100}, biburl = {https://dblp.org/rec/conf/iddm/DronyukFLK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/ZhuWJDYLW19, author = {Lihua Zhu and Minghua Wang and Kaiwu Jiang and Xianjun Deng and Lingzhi Yi and Xiangbai Liao and Chao Wang}, title = {Robot-Assisted Sensor Relocation for Confident Information Coverage in Wireless Sensor and Robot Networks}, booktitle = {2019 {IEEE} Intl Conf on Parallel {\&} Distributed Processing with Applications, Big Data {\&} Cloud Computing, Sustainable Computing {\&} Communications, Social Computing {\&} Networking, ISPA/BDCloud/SocialCom/SustainCom 2019, Xiamen, China, December 16-18, 2019}, pages = {256--262}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISPA-BDCloud-SustainCom-SocialCom48970.2019.00046}, doi = {10.1109/ISPA-BDCLOUD-SUSTAINCOM-SOCIALCOM48970.2019.00046}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispa/ZhuWJDYLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/miccai/ZhangLMWA19, author = {Min Zhang and Kevin H. Leung and Zili Ma and Jin Wen and Gopal Avinash}, editor = {Hayit Greenspan and Ryutaro Tanno and Marius Erdt and Tal Arbel and Christian F. Baumgartner and Adrian V. Dalca and Carole H. Sudre and William M. Wells III and Klaus Drechsler and Marius George Linguraru and Cristina Oyarzun Laura and Raj Shekhar and Stefan Wesarg and Miguel {\'{A}}ngel Gonz{\'{a}}lez Ballester}, title = {A Generalized Approach to Determine Confident Samples for Deep Neural Networks on Unseen Data}, booktitle = {Uncertainty for Safe Utilization of Machine Learning in Medical Imaging and Clinical Image-Based Procedures - First International Workshop, {UNSURE} 2019, and 8th International Workshop, {CLIP} 2019, Held in Conjunction with {MICCAI} 2019, Shenzhen, China, October 17, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11840}, pages = {65--74}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32689-0\_7}, doi = {10.1007/978-3-030-32689-0\_7}, timestamp = {Wed, 16 Oct 2019 11:16:06 +0200}, biburl = {https://dblp.org/rec/conf/miccai/ZhangLMWA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-06292, author = {Sercan {\"{O}}mer Arik and Tomas Pfister}, title = {Attention-Based Prototypical Learning Towards Interpretable, Confident and Robust Deep Neural Networks}, journal = {CoRR}, volume = {abs/1902.06292}, year = {2019}, url = {http://arxiv.org/abs/1902.06292}, eprinttype = {arXiv}, eprint = {1902.06292}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-06292.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-04246, author = {Laurent Gomez and Marcus Wilhelm and Jos{\'{e}} M{\'{a}}rquez and Patrick Duverger}, title = {Security for Distributed Deep Neural Networks Towards Data Confidentiality {\&} Intellectual Property Protection}, journal = {CoRR}, volume = {abs/1907.04246}, year = {2019}, url = {http://arxiv.org/abs/1907.04246}, eprinttype = {arXiv}, eprint = {1907.04246}, timestamp = {Wed, 17 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-04246.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-00991, author = {Sayed Ashraf Mamun}, title = {Sensor Networks in Healthcare: Ensuring Confidentiality and User Anonymity in {WBAN}}, journal = {CoRR}, volume = {abs/1910.00991}, year = {2019}, url = {http://arxiv.org/abs/1910.00991}, eprinttype = {arXiv}, eprint = {1910.00991}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-00991.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/DengTYY18, author = {Xianjun Deng and Zujun Tang and Lingzhi Yi and Laurence T. Yang}, title = {Healing Multimodal Confident Information Coverage Holes in NB-IoT-Enabled Networks}, journal = {{IEEE} Internet Things J.}, volume = {5}, number = {3}, pages = {1463--1473}, year = {2018}, url = {https://doi.org/10.1109/JIOT.2017.2783258}, doi = {10.1109/JIOT.2017.2783258}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/DengTYY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/YiDZDY18, author = {Lingzhi Yi and Xianjun Deng and Zenghui Zou and Dexin Ding and Laurence T. Yang}, title = {Confident information coverage hole detection in sensor networks for uranium tailing monitoring}, journal = {J. Parallel Distributed Comput.}, volume = {118}, number = {Part}, pages = {57--66}, year = {2018}, url = {https://doi.org/10.1016/j.jpdc.2017.03.005}, doi = {10.1016/J.JPDC.2017.03.005}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpdc/YiDZDY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/CuiSZXL18, author = {Jie Cui and Lili Shao and Hong Zhong and Yan Xu and Lu Liu}, title = {Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks}, journal = {Peer-to-Peer Netw. Appl.}, volume = {11}, number = {5}, pages = {1022--1037}, year = {2018}, url = {https://doi.org/10.1007/s12083-017-0581-5}, doi = {10.1007/S12083-017-0581-5}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/CuiSZXL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SunZQHM18, author = {Jiameng Sun and Binrui Zhu and Jing Qin and Jiankun Hu and Jixin Ma}, title = {Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {5275132:1--5275132:15}, year = {2018}, url = {https://doi.org/10.1155/2018/5275132}, doi = {10.1155/2018/5275132}, timestamp = {Mon, 12 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SunZQHM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tie/XiaoLY18, author = {Kejiang Xiao and Jian Li and Chunhua Yang}, title = {Exploiting Correlation for Confident Sensing in Fusion-Based Wireless Sensor Networks}, journal = {{IEEE} Trans. Ind. Electron.}, volume = {65}, number = {6}, pages = {4962--4972}, year = {2018}, url = {https://doi.org/10.1109/TIE.2017.2756591}, doi = {10.1109/TIE.2017.2756591}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tie/XiaoLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/DengTYLW18, author = {Xianjun Deng and Zujun Tang and Laurence Tianruo Yang and Man Lin and Bang Wang}, title = {Confident Information Coverage Hole Healing in Hybrid Industrial Wireless Sensor Networks}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {14}, number = {5}, pages = {2220--2229}, year = {2018}, url = {https://doi.org/10.1109/TII.2017.2764038}, doi = {10.1109/TII.2017.2764038}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/DengTYLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/ZhaoHSL18, author = {Xiaozhao Zhao and Yuexian Hou and Dawei Song and Wenjie Li}, title = {A Confident Information First Principle for Parameter Reduction and Model Selection of Boltzmann Machines}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {29}, number = {5}, pages = {1608--1621}, year = {2018}, url = {https://doi.org/10.1109/TNNLS.2017.2664100}, doi = {10.1109/TNNLS.2017.2664100}, timestamp = {Mon, 09 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnn/ZhaoHSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/XiaoAPD18, author = {Wei Xiao and Yong Ai and Dun Pu and Zhicheng Dong}, title = {The Design and Simulation of Neural Network Encoder in Confidential Communication Field}, journal = {Wirel. Pers. Commun.}, volume = {102}, number = {4}, pages = {3769--3779}, year = {2018}, url = {https://doi.org/10.1007/s11277-018-5408-z}, doi = {10.1007/S11277-018-5408-Z}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/XiaoAPD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BorgsCSZ18, author = {Christian Borgs and Jennifer T. Chayes and Adam D. Smith and Ilias Zadik}, editor = {Mikkel Thorup}, title = {Revealing Network Structure, Confidentially: Improved Rates for Node-Private Graphon Estimation}, booktitle = {59th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS} 2018, Paris, France, October 7-9, 2018}, pages = {533--543}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/FOCS.2018.00057}, doi = {10.1109/FOCS.2018.00057}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BorgsCSZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/GomezIMD18, author = {Laurent Gomez and Alberto Ibarrondo and Jos{\'{e}} M{\'{a}}rquez and Patrick Duverger}, editor = {Pierangela Samarati and Mohammad S. Obaidat}, title = {Intellectual Property Protection for Distributed Neural Networks - Towards Confidentiality of Data, Model, and Inference}, booktitle = {Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal, July 26-28, 2018}, pages = {313--320}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006854703130320}, doi = {10.5220/0006854703130320}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/GomezIMD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/PuskaNS18, author = {Alisson Puska and Michele Nogueira and Aldri Santos}, title = {Confidentiality-Aware Decision on Handoffs under Uncertainty on Heterogeneous Wireless Networks}, booktitle = {2018 {IEEE} Symposium on Computers and Communications, {ISCC} 2018, Natal, Brazil, June 25-28, 2018}, pages = {884--889}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISCC.2018.8538677}, doi = {10.1109/ISCC.2018.8538677}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/PuskaNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwbis/RompasP18, author = {Patrice Samuel Rompas and Riza Satria Perdana}, title = {Securing Confidential Documents in Local Network Using an Email Filtering Technique}, booktitle = {2018 International Workshop on Big Data and Information Security, {IWBIS} 2018, Jakarta, Indonesia, May 12-13, 2018}, pages = {137--141}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IWBIS.2018.8471696}, doi = {10.1109/IWBIS.2018.8471696}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/iwbis/RompasP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/miccai/WangZTSFY18, author = {Yan Wang and Yuyin Zhou and Peng Tang and Wei Shen and Elliot K. Fishman and Alan L. Yuille}, editor = {Alejandro F. Frangi and Julia A. Schnabel and Christos Davatzikos and Carlos Alberola{-}L{\'{o}}pez and Gabor Fichtinger}, title = {Training Multi-organ Segmentation Networks with Sample Selection by Relaxed Upper Confident Bound}, booktitle = {Medical Image Computing and Computer Assisted Intervention - {MICCAI} 2018 - 21st International Conference, Granada, Spain, September 16-20, 2018, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11073}, pages = {434--442}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00937-3\_50}, doi = {10.1007/978-3-030-00937-3\_50}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/miccai/WangZTSFY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-02595, author = {Yan Wang and Yuyin Zhou and Peng Tang and Wei Shen and Elliot K. Fishman and Alan L. Yuille}, title = {Training Multi-organ Segmentation Networks with Sample Selection by Relaxed Upper Confident Bound}, journal = {CoRR}, volume = {abs/1804.02595}, year = {2018}, url = {http://arxiv.org/abs/1804.02595}, eprinttype = {arXiv}, eprint = {1804.02595}, timestamp = {Wed, 19 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-02595.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-02183, author = {Christian Borgs and Jennifer T. Chayes and Adam D. Smith and Ilias Zadik}, title = {Revealing Network Structure, Confidentially: Improved Rates for Node-Private Graphon Estimation}, journal = {CoRR}, volume = {abs/1810.02183}, year = {2018}, url = {http://arxiv.org/abs/1810.02183}, eprinttype = {arXiv}, eprint = {1810.02183}, timestamp = {Thu, 01 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-02183.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ErmisBAC17, author = {Orhan Ermis and Serif Bahtiyar and Emin Anarim and M. Ufuk {\c{C}}aglayan}, title = {A key agreement protocol with partial backward confidentiality}, journal = {Comput. Networks}, volume = {129}, pages = {159--177}, year = {2017}, url = {https://doi.org/10.1016/j.comnet.2017.09.008}, doi = {10.1016/J.COMNET.2017.09.008}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ErmisBAC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/ZhangHWS17, author = {Shengnan Zhang and Yuexian Hou and Benyou Wang and Dawei Song}, title = {Regularizing Neural Networks via Retaining Confident Connections}, journal = {Entropy}, volume = {19}, number = {7}, pages = {313}, year = {2017}, url = {https://doi.org/10.3390/e19070313}, doi = {10.3390/E19070313}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/ZhangHWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/VorakulpipatSRS17, author = {Chalee Vorakulpipat and Soontorn Sirapaisan and Ekkachan Rattanalerdnusorn and Visut Savangsuk}, title = {A Policy-Based Framework for Preserving Confidentiality in {BYOD} Environments: {A} Review of Information Security Perspectives}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {2057260:1--2057260:11}, year = {2017}, url = {https://doi.org/10.1155/2017/2057260}, doi = {10.1155/2017/2057260}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/VorakulpipatSRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/LeguayPQS17, author = {Jeremie Leguay and Georgios S. Paschos and Elizabeth A. Quaglia and Ben Smyth}, title = {CryptoCache: Network caching with confidentiality}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2017, Paris, France, May 21-25, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICC.2017.7996866}, doi = {10.1109/ICC.2017.7996866}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/LeguayPQS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/PfennigF17, author = {Stefan Pfennig and Elke Franz}, title = {Security aspects of confidential network coding}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2017, Paris, France, May 21-25, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICC.2017.7996934}, doi = {10.1109/ICC.2017.7996934}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/PfennigF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/PereyraTCKH17, author = {Gabriel Pereyra and George Tucker and Jan Chorowski and Lukasz Kaiser and Geoffrey E. Hinton}, title = {Regularizing Neural Networks by Penalizing Confident Output Distributions}, booktitle = {5th International Conference on Learning Representations, {ICLR} 2017, Toulon, France, April 24-26, 2017, Workshop Track Proceedings}, publisher = {OpenReview.net}, year = {2017}, url = {https://openreview.net/forum?id=HyhbYrGYe}, timestamp = {Thu, 04 Apr 2019 13:20:08 +0200}, biburl = {https://dblp.org/rec/conf/iclr/PereyraTCKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwsm/YangRN17, author = {Jiasen Yang and Bruno Ribeiro and Jennifer Neville}, title = {Should We Be Confident in Peer Effects Estimated From Social Network Crawls?}, booktitle = {Proceedings of the Eleventh International Conference on Web and Social Media, {ICWSM} 2017, Montr{\'{e}}al, Qu{\'{e}}bec, Canada, May 15-18, 2017}, pages = {708--711}, publisher = {{AAAI} Press}, year = {2017}, url = {https://aaai.org/ocs/index.php/ICWSM/ICWSM17/paper/view/15696}, timestamp = {Wed, 28 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icwsm/YangRN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sbesc/SilvaZ17, author = {Marcos Roberto Silva and C{\'{e}}sar Albenes Zeferino}, title = {Confidentiality and Authenticity in a Platform Based on Network-on-Chip}, booktitle = {{VII} Brazilian Symposium on Computing Systems Engineering, {SBESC} 2017, Curitiba, PR, Brazil, November 6-10, 2017}, pages = {225--230}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SBESC.2017.38}, doi = {10.1109/SBESC.2017.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sbesc/SilvaZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/DaiWDY17, author = {Lu Dai and Bang Wang and Xianjun Deng and Laurence T. Yang}, title = {An improved immune algorithm for node relocation to maximize confident information coverage in a hybrid sensor network}, booktitle = {2017 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing, Advanced {\&} Trusted Computed, Scalable Computing {\&} Communications, Cloud {\&} Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017, San Francisco, CA, USA, August 4-8, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/UIC-ATC.2017.8397492}, doi = {10.1109/UIC-ATC.2017.8397492}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/uic/DaiWDY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PereyraTCKH17, author = {Gabriel Pereyra and George Tucker and Jan Chorowski and Lukasz Kaiser and Geoffrey E. Hinton}, title = {Regularizing Neural Networks by Penalizing Confident Output Distributions}, journal = {CoRR}, volume = {abs/1701.06548}, year = {2017}, url = {http://arxiv.org/abs/1701.06548}, eprinttype = {arXiv}, eprint = {1701.06548}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PereyraTCKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Kasten16, author = {Andreas Kasten}, title = {Secure semantic web data management: confidentiality, integrity, and compliant availability in open and distributed networks}, school = {University of Koblenz and Landau, Germany}, year = {2016}, url = {https://kola.opus.hbz-nrw.de/frontdoor/index/index/docId/1393}, urn = {urn:nbn:de:kola-13939}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Kasten16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/OthmanBTY16, author = {Soufiene Ben Othman and Abdullah Ali Bahattab and Abdelbasset Trad and Habib Youssef}, title = {Lightweight and confidential data aggregation in healthcare wireless sensor networks}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {27}, number = {4}, pages = {576--588}, year = {2016}, url = {https://doi.org/10.1002/ett.2993}, doi = {10.1002/ETT.2993}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ett/OthmanBTY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpsa/MedhaneS16, author = {Darshan Vishwasrao Medhane and Arun Kumar Sangaiah}, title = {Source node position confidentiality aspects in wireless networks: an extended review}, journal = {Int. J. High Perform. Syst. Archit.}, volume = {6}, number = {2}, pages = {61--81}, year = {2016}, url = {https://doi.org/10.1504/IJHPSA.2016.078785}, doi = {10.1504/IJHPSA.2016.078785}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijhpsa/MedhaneS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BagciRRV16, author = {Ibrahim Ethem Bagci and Shahid Raza and Utz Roedig and Thiemo Voigt}, title = {Fusion: coalesced confidential storage and communication framework for the IoT}, journal = {Secur. Commun. Networks}, volume = {9}, number = {15}, pages = {2656--2673}, year = {2016}, url = {https://doi.org/10.1002/sec.1260}, doi = {10.1002/SEC.1260}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BagciRRV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/ZhuW16, author = {Jiajun Zhu and Bang Wang}, title = {The Optimal Placement Pattern for Confident Information Coverage in Wireless Sensor Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {15}, number = {4}, pages = {1022--1032}, year = {2016}, url = {https://doi.org/10.1109/TMC.2015.2444397}, doi = {10.1109/TMC.2015.2444397}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/ZhuW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/SarikayaKE16, author = {Yunus Sarikaya and Can Emre Koksal and {\"{O}}zg{\"{u}}r Er{\c{c}}etin}, title = {Dynamic Network Control for Confidential Multi-Hop Communications}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {24}, number = {2}, pages = {1181--1195}, year = {2016}, url = {https://doi.org/10.1109/TNET.2015.2414945}, doi = {10.1109/TNET.2015.2414945}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/SarikayaKE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/WangZYM16, author = {Bang Wang and Jiajun Zhu and Laurence T. Yang and Yijun Mo}, title = {Sensor Density for Confident Information Coverage in Randomly Deployed Sensor Networks}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {15}, number = {5}, pages = {3238--3250}, year = {2016}, url = {https://doi.org/10.1109/TWC.2016.2518689}, doi = {10.1109/TWC.2016.2518689}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/WangZYM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cmcsn/MengHSCH16, author = {S. H. Meng and A. C. Huang and Tien{-}Wen Sung and C. C. Chen and J. F. Huang}, title = {Enhancing Internet Networks Confidentiality Based on Composite Coding and Channels Coding Schemes of Signatures Reconfiguration}, booktitle = {Third International Conference on Computing Measurement Control and Sensor Network, {CMCSN} 2016, Matsue, Japan, May 20-22, 2016}, pages = {64--67}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CMCSN.2016.52}, doi = {10.1109/CMCSN.2016.52}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cmcsn/MengHSCH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dihu/Vugt16, author = {Ingeborg van Vugt}, editor = {Maciej Eder and Jan Rybicki}, title = {Exploring Networks Of Confidentiality And Secrecy In Early Modern Transconfessional Correspondences}, booktitle = {11th Annual International Conference of the Alliance of Digital Humanities Organizations, {DH} 2016, Krakow, Poland, July 11-16, 2016, Conference Abstracts}, pages = {699--701}, publisher = {Alliance of Digital Humanities Organizations {(ADHO)}}, year = {2016}, url = {http://dh2016.adho.org/abstracts/53}, timestamp = {Fri, 10 Jul 2020 11:43:01 +0200}, biburl = {https://dblp.org/rec/conf/dihu/Vugt16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gpc/XiongW16, author = {Zehui Xiong and Bang Wang}, editor = {Xinyi Huang and Yang Xiang and Kuan{-}Ching Li}, title = {Minimizing Confident Information Coverage Breach in Rechargeable Wireless Sensor Networks with Uneven Recharging Rates}, booktitle = {Green, Pervasive, and Cloud Computing - 11th International Conference, {GPC} 2016, Xi'an, China, May 6-8, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9663}, pages = {213--228}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39077-2\_14}, doi = {10.1007/978-3-319-39077-2\_14}, timestamp = {Thu, 24 Feb 2022 11:50:56 +0100}, biburl = {https://dblp.org/rec/conf/gpc/XiongW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ithings/TangDYW16, author = {Zujun Tang and Xianjun Deng and Lingzhi Yi and Bang Wang}, editor = {Xingang Liu and Tie Qiu and Bin Guo and Kaixuan Lu and Zhaolong Ning and Mianxiong Dong and Yayong Li}, title = {An Energy Efficient Confident Information Coverage Hole Healing Algorithm in Hybrid Sensor Networks}, booktitle = {2016 {IEEE} International Conference on Internet of Things (iThings) and {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData), Chengdu, China, December 15-18, 2016}, pages = {705--710}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2016.151}, doi = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA.2016.151}, timestamp = {Mon, 14 Dec 2020 13:52:12 +0100}, biburl = {https://dblp.org/rec/conf/ithings/TangDYW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ithings/ZouDYTWG16, author = {Zenghui Zou and Xianjun Deng and Lingzhi Yi and Zujun Tang and Minghua Wang and Xueyu Gong}, editor = {Xingang Liu and Tie Qiu and Bin Guo and Kaixuan Lu and Zhaolong Ning and Mianxiong Dong and Yayong Li}, title = {A Novel Confident Information Coverage Hole Detection Algorithm in Sensor Networks}, booktitle = {2016 {IEEE} International Conference on Internet of Things (iThings) and {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData), Chengdu, China, December 15-18, 2016}, pages = {199--204}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2016.57}, doi = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA.2016.57}, timestamp = {Sun, 14 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ithings/ZouDYTWG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Lopez-RamosRSS16, author = {Juan Antonio L{\'{o}}pez{-}Ramos and Joachim Rosenthal and Davide Schipani and Reto Schnyder}, title = {An Application of Group Theory in Confidential Network Communications}, journal = {CoRR}, volume = {abs/1610.09244}, year = {2016}, url = {http://arxiv.org/abs/1610.09244}, eprinttype = {arXiv}, eprint = {1610.09244}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Lopez-RamosRSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Junemann15, author = {Konrad J{\"{u}}nemann}, title = {Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems}, school = {Karlsruhe Institute of Technology}, year = {2015}, url = {https://nbn-resolving.org/urn:nbn:de:0072-450689}, urn = {urn:nbn:de:0072-450689}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Junemann15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/MostefaouiNF15, author = {Ahmed Mostefaoui and Hassan Noura and Zeinab Fawaz}, title = {An integrated multimedia data reduction and content confidentiality approach for limited networked devices}, journal = {Ad Hoc Networks}, volume = {32}, pages = {81--97}, year = {2015}, url = {https://doi.org/10.1016/j.adhoc.2015.01.007}, doi = {10.1016/J.ADHOC.2015.01.007}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/MostefaouiNF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MangiliMP15, author = {Michele Mangili and Fabio Martignon and Stefano Paraboschi}, title = {A cache-aware mechanism to enforce confidentiality, trackability and access policy evolution in Content-Centric Networks}, journal = {Comput. Networks}, volume = {76}, pages = {126--145}, year = {2015}, url = {https://doi.org/10.1016/j.comnet.2014.11.010}, doi = {10.1016/J.COMNET.2014.11.010}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MangiliMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/XieBWLHA15, author = {Mande Xie and Urmila Bhanja and Guiyi Wei and Yun Ling and Mohammad Mehedi Hassan and Atif Alamri}, title = {SecNRCC: a loss-tolerant secure network reprogramming with confidentiality consideration for wireless sensor networks}, journal = {Concurr. Comput. Pract. Exp.}, volume = {27}, number = {10}, pages = {2668--2680}, year = {2015}, url = {https://doi.org/10.1002/cpe.3277}, doi = {10.1002/CPE.3277}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/XieBWLHA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/TakalkarM15, author = {Vedashree Takalkar and Parikshit N. Mahalle}, title = {Confidentiality in Online Social Networks; ATrust-based Approach}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {2-3}, pages = {125--144}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.427}, doi = {10.13052/JCSM2245-1439.427}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/TakalkarM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/DolatabadiNT15, author = {Amir Hossein Kamali Dolatabadi and Esmaeil Najafi and Mohammad Taghi Taghavifard}, title = {A confident supply chain network model using credibility measure under uncertainty condition}, journal = {J. Intell. Fuzzy Syst.}, volume = {28}, number = {5}, pages = {2127--2140}, year = {2015}, url = {https://doi.org/10.3233/IFS-141493}, doi = {10.3233/IFS-141493}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/DolatabadiNT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/YasarMK15, author = {Ansar{-}Ul{-}Haque Yasar and Haroon Malik and Zahoor Ali Khan}, title = {Mobile Sensor Networks Applications and Confidentiality}, journal = {Mob. Inf. Syst.}, volume = {2015}, pages = {893438:1--893438:2}, year = {2015}, url = {https://doi.org/10.1155/2015/893438}, doi = {10.1155/2015/893438}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/YasarMK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/see/BourasGGD15, author = {Ahmed Fouad Bouras and Carole Genty and Vincent Guilbert and Mohamed Dadda}, title = {Organ Procurement and Social Networks: The End of Confidentiality?}, journal = {Sci. Eng. Ethics}, volume = {21}, number = {4}, pages = {837--838}, year = {2015}, url = {https://doi.org/10.1007/s11948-014-9577-1}, doi = {10.1007/S11948-014-9577-1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/see/BourasGGD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/XuZW15, author = {Huping Xu and Jiajun Zhu and Bang Wang}, title = {On the Deployment of a Connected Sensor Network for Confident Information Coverage}, journal = {Sensors}, volume = {15}, number = {5}, pages = {11277--11294}, year = {2015}, url = {https://doi.org/10.3390/s150511277}, doi = {10.3390/S150511277}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/XuZW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/SarikayaEK15, author = {Yunus Sarikaya and {\"{O}}zg{\"{u}}r Er{\c{c}}etin and Can Emre Koksal}, title = {Confidentiality-Preserving Control of Uplink Cellular Wireless Networks Using Hybrid {ARQ}}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {23}, number = {5}, pages = {1457--1470}, year = {2015}, url = {https://doi.org/10.1109/TNET.2014.2331077}, doi = {10.1109/TNET.2014.2331077}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/SarikayaEK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/DengWLY15, author = {Xianjun Deng and Bang Wang and Wenyu Liu and Laurence T. Yang}, title = {Sensor Scheduling for Multi-Modal Confident Information Coverage in Sensor Networks}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {26}, number = {3}, pages = {902--913}, year = {2015}, url = {https://doi.org/10.1109/TPDS.2014.2315193}, doi = {10.1109/TPDS.2014.2315193}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/DengWLY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/HeYZY15, author = {Biao He and Nan (Jonas) Yang and Xiangyun Zhou and Jinhong Yuan}, title = {Base Station Cooperation for Confidential Broadcasting in Multi-Cell Networks}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {14}, number = {10}, pages = {5287--5299}, year = {2015}, url = {https://doi.org/10.1109/TWC.2015.2435745}, doi = {10.1109/TWC.2015.2435745}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/HeYZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/SenGBPR15, author = {Arpan Sen and Shrestha Ghosh and Arinjoy Basak and Harsh Parsuram Puria and Sushmita Ruj}, editor = {Leonard Barolli and Makoto Takizawa and Fatos Xhafa and Tomoya Enokido and Jong Hyuk Park}, title = {Achieving Data Survivability and Confidentiality in Unattended Wireless Sensor Networks}, booktitle = {29th {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2015, Gwangju, South Korea, March 24-27, 2015}, pages = {239--246}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AINA.2015.191}, doi = {10.1109/AINA.2015.191}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/SenGBPR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/ZhuL15, author = {Minghui Zhu and Yang Lu}, title = {On confidentiality preserving monitoring of linear dynamic networks against inference attacks}, booktitle = {American Control Conference, {ACC} 2015, Chicago, IL, USA, July 1-3, 2015}, pages = {359--364}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ACC.2015.7170762}, doi = {10.1109/ACC.2015.7170762}, timestamp = {Fri, 03 Dec 2021 13:03:59 +0100}, biburl = {https://dblp.org/rec/conf/amcc/ZhuL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/Estivill-Castro15, author = {Vladimir Estivill{-}Castro and David F. Nettleton}, editor = {Jian Pei and Fabrizio Silvestri and Jie Tang}, title = {Privacy Tips: Would it be ever possible to empower online social-network users to control the confidentiality of their data?}, booktitle = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France, August 25 - 28, 2015}, pages = {1449--1456}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808797.2809279}, doi = {10.1145/2808797.2809279}, timestamp = {Thu, 11 Mar 2021 17:04:51 +0100}, biburl = {https://dblp.org/rec/conf/asunam/Estivill-Castro15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blackseecom/NowosielskiWLW15, author = {Leszek Nowosielski and Radoslaw Wielemborek and Dariusz Laskowski and Marian Wnuk}, title = {Confidentiality of data in backbone networks based on scalable and dynamic environment technologies}, booktitle = {{IEEE} International Black Sea Conference on Communications and Networking, BlackSeaCom 2015, Constanta, Romania, May 18-21, 2015}, pages = {68--71}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/BlackSeaCom.2015.7185088}, doi = {10.1109/BLACKSEACOM.2015.7185088}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/blackseecom/NowosielskiWLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/depcos/WielemborekLL15, author = {Radoslaw Wielemborek and Dariusz Laskowski and Piotr Lubkowski}, editor = {Wojciech Zamojski and Jacek Mazurkiewicz and Jaroslaw Sugier and Tomasz Walkowiak and Janusz Kacprzyk}, title = {Effectiveness of Providing Data Confidentiality in Backbone Networks Based on Scalable and Dynamic Environment Technologies}, booktitle = {Theory and Engineering of Complex Systems and Dependability - Proceedings of the Tenth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, June 29 - July 3 2015, Brun{\'{o}}w, Poland}, series = {Advances in Intelligent Systems and Computing}, volume = {365}, pages = {523--531}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19216-1\_50}, doi = {10.1007/978-3-319-19216-1\_50}, timestamp = {Sat, 19 Oct 2019 20:27:57 +0200}, biburl = {https://dblp.org/rec/conf/depcos/WielemborekLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/Papazafeiropoulos15, author = {Anastasios K. Papazafeiropoulos and Caijun Zhong}, title = {Confidentiality Analysis in Multicast Stochastic {MIMO} Networks with Imperfect {CSIT}}, booktitle = {2015 {IEEE} Globecom Workshops, San Diego, CA, USA, December 6-10, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/GLOCOMW.2015.7414068}, doi = {10.1109/GLOCOMW.2015.7414068}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/Papazafeiropoulos15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/LiMS15, author = {Teng Li and Jianfeng Ma and Cong Sun}, editor = {Guojun Wang and Albert Y. Zomaya and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Kenli Li}, title = {CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks}, booktitle = {Algorithms and Architectures for Parallel Processing - 15th International Conference, {ICA3PP} 2015, Zhangjiajie, China, November 18-20, 2015. Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9530}, pages = {449--462}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27137-8\_33}, doi = {10.1007/978-3-319-27137-8\_33}, timestamp = {Sat, 06 Aug 2022 22:05:44 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/LiMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/HeYZY15, author = {Biao He and Nan (Jonas) Yang and Xiangyun Zhou and Jinhong Yuan}, title = {Confidential broadcasting via coordinated beamforming in two-cell networks}, booktitle = {2015 {IEEE} International Conference on Communications, {ICC} 2015, London, United Kingdom, June 8-12, 2015}, pages = {7376--7382}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICC.2015.7249505}, doi = {10.1109/ICC.2015.7249505}, timestamp = {Wed, 10 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/HeYZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuwb/PfennigFRSJ15, author = {Stefan Pfennig and Elke Franz and Johannes Richter and Christian Scheunert and Eduard A. Jorswieck}, title = {Confidential Network Coding: Physical Layer vs. Network Layer}, booktitle = {{IEEE} International Conference on Ubiquitous Wireless Broadband, {ICUWB} 2015, Montreal, QC, Canada, October 4-7, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICUWB.2015.7324428}, doi = {10.1109/ICUWB.2015.7324428}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icuwb/PfennigFRSJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/XiongWW15, author = {Zehui Xiong and Bang Wang and Zhongsi Wang}, title = {Priority-Based Greedy Scheduling for Confident Information Coverage in Energy Harvesting Wireless Sensor Networks}, booktitle = {11th International Conference on Mobile Ad-hoc and Sensor Networks, {MSN} 2015, Shenzhen, China, December 16-18, 2015}, pages = {18--22}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MSN.2015.20}, doi = {10.1109/MSN.2015.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/msn/XiongWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Estivill-Castro15, author = {Vladimir Estivill{-}Castro and David F. Nettleton}, title = {Can On-line Social Network Users Trust That What They Designated as Confidential Data Remains So?}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {966--973}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.471}, doi = {10.1109/TRUSTCOM.2015.471}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Estivill-Castro15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vdat/GuhaSC15, author = {Krishnendu Guha and Debasri Saha and Amlan Chakrabarti}, title = {{RTNA:} Securing {SOC} architectures from confidentiality attacks at runtime using {ART1} neural networks}, booktitle = {19th International Symposium on {VLSI} Design and Test, {VDAT} 2015, Ahmedabad, India, June 26-29, 2015}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ISVDAT.2015.7208048}, doi = {10.1109/ISVDAT.2015.7208048}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vdat/GuhaSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NouraC15, author = {Hassan Noura and Damien Courouss{\'{e}}}, title = {{HLDCA-WSN:} Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {928}, year = {2015}, url = {http://eprint.iacr.org/2015/928}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NouraC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/NovalesMS14, author = {Ramon Novales and Neeraj Mittal and Kamil Sara{\c{c}}}, title = {{SKAIT:} {A} parameterized key assignment scheme for confidential communication in resource constrained ad hoc wireless networks}, journal = {Ad Hoc Networks}, volume = {20}, pages = {163--181}, year = {2014}, url = {https://doi.org/10.1016/j.adhoc.2014.04.006}, doi = {10.1016/J.ADHOC.2014.04.006}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/NovalesMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/ZhuYXG14, author = {Liehuang Zhu and Zhen Yang and Jingfeng Xue and Cong Guo}, title = {An Efficient Confidentiality and Integrity Preserving Aggregation Protocol in Wireless Sensor Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {10}, year = {2014}, url = {https://doi.org/10.1155/2014/565480}, doi = {10.1155/2014/565480}, timestamp = {Wed, 11 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdsn/ZhuYXG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/HanHTIJ14, author = {Nguyen Dinh Han and Longzhe Han and Dao Minh Tuan and Hoh Peter In and Minho Jo}, title = {A scheme for data confidentiality in Cloud-assisted Wireless Body Area Networks}, journal = {Inf. Sci.}, volume = {284}, pages = {157--166}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.03.126}, doi = {10.1016/J.INS.2014.03.126}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/HanHTIJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CaragataASA14, author = {Daniel Caragata and Safwan El Assad and Charles A. Shoniregun and Galyna A. Akmayeva}, title = {Confidential initial identification and other improvements for {UMTS} security}, journal = {Secur. Commun. Networks}, volume = {7}, number = {3}, pages = {558--566}, year = {2014}, url = {https://doi.org/10.1002/sec.757}, doi = {10.1002/SEC.757}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CaragataASA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PanHA14, author = {Haijun Pan and Edwin S. H. Hou and Nirwan Ansari}, title = {Enhanced name and vote separated E-voting system: an E-voting system that ensures voter confidentiality and candidate privacy}, journal = {Secur. Commun. Networks}, volume = {7}, number = {12}, pages = {2335--2344}, year = {2014}, url = {https://doi.org/10.1002/sec.944}, doi = {10.1002/SEC.944}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PanHA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/YangGYM14, author = {Nan (Jonas) Yang and Giovanni Geraci and Jinhong Yuan and Robert A. Malaney}, title = {Confidential Broadcasting via Linear Precoding in Non-Homogeneous {MIMO} Multiuser Networks}, journal = {{IEEE} Trans. Commun.}, volume = {62}, number = {7}, pages = {2515--2530}, year = {2014}, url = {https://doi.org/10.1109/TCOMM.2014.2329471}, doi = {10.1109/TCOMM.2014.2329471}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/YangGYM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/HeCZY14, author = {Daojing He and Sammy Chan and Yan Zhang and Haomiao Yang}, title = {Lightweight and Confidential Data Discovery and Dissemination for Wireless Body Area Networks}, journal = {{IEEE} J. Biomed. Health Informatics}, volume = {18}, number = {2}, pages = {440--448}, year = {2014}, url = {https://doi.org/10.1109/JBHI.2013.2293620}, doi = {10.1109/JBHI.2013.2293620}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/titb/HeCZY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/KeallyZXNQ14, author = {Matthew Keally and Gang Zhou and Guoliang Xing and David T. Nguyen and Xin Qi}, title = {A Learning-Based Approach to Confident Event Detection in Heterogeneous Sensor Networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {11}, number = {1}, pages = {10:1--10:28}, year = {2014}, url = {https://doi.org/10.1145/2575788}, doi = {10.1145/2575788}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/KeallyZXNQ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dcai/SanchezD14, author = {Antonio Juan S{\'{a}}nchez and Yves Demazeau}, editor = {Sigeru Omatu and Hugues Bersini and Juan M. Corchado Rodr{\'{\i}}guez and Sara Rodr{\'{\i}}guez and Pawel Pawlewski and Edgardo Bucciarelli}, title = {The Age of Confidentiality: {A} Review of the Security in Social Networks and Internet}, booktitle = {Distributed Computing and Artificial Intelligence, 11th International Conference, {DCAI} 2014, Salamanca, Spain, June 4-6, 2014}, series = {Advances in Intelligent Systems and Computing}, volume = {290}, pages = {407--415}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07593-8\_47}, doi = {10.1007/978-3-319-07593-8\_47}, timestamp = {Tue, 05 Mar 2024 21:11:29 +0100}, biburl = {https://dblp.org/rec/conf/dcai/SanchezD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/ZhuW14, author = {Jiajun Zhu and Bang Wang}, title = {Sensor placement algorithms for confident information coverage in wireless sensor networks}, booktitle = {23rd International Conference on Computer Communication and Networks, {ICCCN} 2014, Shanghai, China, August 4-7, 2014}, pages = {1--7}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICCCN.2014.6911802}, doi = {10.1109/ICCCN.2014.6911802}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icccn/ZhuW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/BruceL14, author = {Bruce Ndibanje and Hoon{-}Jae Lee}, title = {Anonymization algorithm for security and confidentiality of health data set across social network}, booktitle = {International Conference on Information and Communication Technology Convergence, {ICTC} 2014, Busan, South Korea, October 22-24, 2014}, pages = {65--70}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICTC.2014.6983085}, doi = {10.1109/ICTC.2014.6983085}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictc/BruceL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icufn/ZhuW14, author = {Jiajun Zhu and Bang Wang}, title = {Placement patterns for confident information coverage in wireless sensor networks}, booktitle = {Sixth International Conference on Ubiquitous and Future Networks, {ICUFN} 2014, Shanghai, China, July 8-11, 2014}, pages = {93--98}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICUFN.2014.6876757}, doi = {10.1109/ICUFN.2014.6876757}, timestamp = {Thu, 28 Jul 2022 14:35:38 +0200}, biburl = {https://dblp.org/rec/conf/icufn/ZhuW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/Wang14, author = {Huaqun Wang}, editor = {Mario Gerla and Khaled Ben Letaief and George C. Hadjichristofi and Christian Callegari}, title = {Authentic and confidential policy distribution in software defined wireless network}, booktitle = {International Wireless Communications and Mobile Computing Conference, {IWCMC} 2014, Nicosia, Cyprus, August 4-8, 2014}, pages = {1167--1171}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/IWCMC.2014.6906520}, doi = {10.1109/IWCMC.2014.6906520}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/iwcmc/Wang14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/BentstuenC14, author = {Ole Ingar Bentstuen and Per Carl{\'{e}}n}, title = {Traffic flow confidentiality in federated networks}, booktitle = {2014 {IEEE} Military Communications Conference, {MILCOM} 2014, Baltimore, MD, USA, October 6-8, 2014}, pages = {74--81}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/MILCOM.2014.20}, doi = {10.1109/MILCOM.2014.20}, timestamp = {Fri, 16 Sep 2022 20:28:33 +0200}, biburl = {https://dblp.org/rec/conf/milcom/BentstuenC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/SuGYLGBCA14, author = {Lu Su and Yunlong Gao and Fan Ye and Peng Liu and Oktay G{\"{u}}nl{\"{u}}k and Tom Bcrman and Seraphin B. Calo and Tarek F. Abdelzaher}, title = {Robust confidentiality preserving data delivery in federated coalition networks}, booktitle = {2014 {IFIP} Networking Conference, Trondheim, Norway, June 2-4, 2014}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IFIPNetworking.2014.6857084}, doi = {10.1109/IFIPNETWORKING.2014.6857084}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/networking/SuGYLGBCA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigir/ZerrPD14, author = {Sergej Zerr and Odysseas Papapetrou and Elena Demidova}, editor = {Luo Si and Hui Yang}, title = {{HEALTH+Z:} Confidential Provider Selection in Collaborative Healthcare {P2P} Networks}, booktitle = {Proceeding of the 1st International Workshop on Privacy-Preserving {IR:} When Information Retrieval Meets Privacy and Security co-located with 37th Annual International {ACM} {SIGIR} conference, PIR@SIGIR 2014, Gold Coast, Australia, July 11, 2014}, series = {{CEUR} Workshop Proceedings}, volume = {1225}, pages = {1--6}, publisher = {CEUR-WS.org}, year = {2014}, url = {https://ceur-ws.org/Vol-1225/pir2014\_submission\_5.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:17 +0100}, biburl = {https://dblp.org/rec/conf/sigir/ZerrPD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/XiongZCL13, author = {Hu Xiong and Guobin Zhu and Zhong Chen and Fagen Li}, title = {Efficient communication scheme with confidentiality and privacy for vehicular networks}, journal = {Comput. Electr. Eng.}, volume = {39}, number = {6}, pages = {1717--1725}, year = {2013}, url = {https://doi.org/10.1016/j.compeleceng.2012.11.009}, doi = {10.1016/J.COMPELECENG.2012.11.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/XiongZCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TanOZJ13, author = {Hailun Tan and Diethelm Ostry and John Zic and Sanjay K. Jha}, title = {A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks}, journal = {Comput. Secur.}, volume = {32}, pages = {36--55}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2012.09.012}, doi = {10.1016/J.COSE.2012.09.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TanOZJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LvL13, author = {Xixiang Lv and Hui Li}, title = {Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {2}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2010.0314}, doi = {10.1049/IET-IFS.2010.0314}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/LvL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/ZhuYWL13, author = {Liehuang Zhu and Zhen Yang and Mingzhong Wang and Meng Li}, title = {{ID} List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {9}, year = {2013}, url = {https://doi.org/10.1155/2013/241261}, doi = {10.1155/2013/241261}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdsn/ZhuYWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijndc/RayCA13, author = {Biplob Rakshit Ray and Morshed U. Chowdhury and Jemal H. Abawajy}, title = {Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery for {RFID} Tag}, journal = {Int. J. Networked Distributed Comput.}, volume = {1}, number = {2}, pages = {79--88}, year = {2013}, url = {https://doi.org/10.2991/ijndc.2013.1.2.2}, doi = {10.2991/IJNDC.2013.1.2.2}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijndc/RayCA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BkakriaCCFG13, author = {Anis Bkakria and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Jos{\'{e}} M. Fernandez and David Gross{-}Amblard}, title = {Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {2}, pages = {39--62}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.06.31.039}, doi = {10.22667/JOWUA.2013.06.31.039}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BkakriaCCFG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HouSUY13, author = {Shuhui Hou and Ry{\^{o}}ichi Sasaki and Tetsutaro Uehara and Siu{-}Ming Yiu}, title = {Double Encryption for Data Authenticity and Integrity in Privacy- preserving Confidential Forensic Investigation}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {2}, pages = {104--113}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.06.31.104}, doi = {10.22667/JOWUA.2013.06.31.104}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HouSUY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Fienberg13, author = {Stephen E. Fienberg}, title = {Is the Privacy of Network Data an Oxymoron?}, journal = {J. Priv. Confidentiality}, volume = {4}, number = {2}, year = {2013}, url = {https://doi.org/10.29012/jpc.v4i2.619}, doi = {10.29012/JPC.V4I2.619}, timestamp = {Mon, 27 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Fienberg13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/X13, title = {Consumer Data Privacy in a Networked World: {A} Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy}, journal = {J. Priv. Confidentiality}, volume = {4}, number = {2}, year = {2013}, url = {https://doi.org/10.29012/jpc.v4i2.623}, doi = {10.29012/JPC.V4I2.623}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/X13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/GharbaouiPGMC13, author = {Molka Gharbaoui and Francesco Paolucci and Alessio Giorgetti and Barbara Martini and Piero Castoldi}, title = {Effective Statistical Detection of Smart Confidentiality Attacks in Multi-Domain Networks}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {10}, number = {4}, pages = {383--397}, year = {2013}, url = {https://doi.org/10.1109/TNSM.2013.111113.130482}, doi = {10.1109/TNSM.2013.111113.130482}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/GharbaouiPGMC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/WangDLYC13, author = {Bang Wang and Xianjun Deng and Wenyu Liu and Laurence T. Yang and Han{-}Chieh Chao}, title = {Confident information coverage in sensor networks for field reconstruction}, journal = {{IEEE} Wirel. Commun.}, volume = {20}, number = {6}, pages = {74--81}, year = {2013}, url = {https://doi.org/10.1109/MWC.2013.6704477}, doi = {10.1109/MWC.2013.6704477}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/WangDLYC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/DengWLYC13, author = {Xianjun Deng and Bang Wang and Wenyu Liu and Laurence T. Yang and Jiaoyan Chen}, title = {Lifetime Maximization for Multi-modal Confident Information Coverage in Sensor Networks}, booktitle = {10th {IEEE} International Conference on High Performance Computing and Communications {\&} 2013 {IEEE} International Conference on Embedded and Ubiquitous Computing, {HPCC/EUC} 2013, Zhangjiajie, China, November 13-15, 2013}, pages = {1173--1178}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/HPCC.and.EUC.2013.166}, doi = {10.1109/HPCC.AND.EUC.2013.166}, timestamp = {Wed, 08 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpcc/DengWLYC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ClarkePT13, author = {Charles A. Clarke and Eckhard Pfluegel and Dimitris Tsaptsinos}, title = {Enhanced Virtual Private Social Networks: Implementing user content confidentiality}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {306--312}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750212}, doi = {10.1109/ICITST.2013.6750212}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ClarkePT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/GharbaouiPGCM13, author = {Molka Gharbaoui and Francesco Paolucci and Alessio Giorgetti and Piero Castoldi and Barbara Martini}, editor = {Filip De Turck and Yixin Diao and Choong Seon Hong and Deep Medhi and Ramin Sadre}, title = {Guaranteeing confidentiality in multi-domain networks: The {PCE} Anomaly Detector {(PAD)}}, booktitle = {2013 {IFIP/IEEE} International Symposium on Integrated Network Management {(IM} 2013), Ghent, Belgium, May 27-31, 2013}, pages = {485--491}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6573022/}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/im/GharbaouiPGCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/DengWWLM13, author = {Xianjun Deng and Bang Wang and Nuoya Wang and Wenyu Liu and Yijun Mo}, title = {Sensor scheduling for confident information coverage in wireless sensor networks}, booktitle = {2013 {IEEE} Wireless Communications and Networking Conference (WCNC), Shanghai, Shanghai, China, April 7-10, 2013}, pages = {1027--1031}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WCNC.2013.6554705}, doi = {10.1109/WCNC.2013.6554705}, timestamp = {Wed, 08 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcnc/DengWWLM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wiopt/SarikayaEK13, author = {Yunus Sarikaya and {\"{O}}zg{\"{u}}r Er{\c{c}}etin and Can Emre Koksal}, title = {Dynamic network control for confidential multi-hop communications}, booktitle = {11th International Symposium and Workshops on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2013, Tsukuba Science City, Japan, May 13-17, 2013}, pages = {272--279}, publisher = {{IEEE}}, year = {2013}, url = {https://dl.ifip.org/db/conf/wiopt/wiopt2013/SarikayaEK13.pdf}, timestamp = {Thu, 09 Dec 2021 12:24:09 +0100}, biburl = {https://dblp.org/rec/conf/wiopt/SarikayaEK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/PietroG13, author = {Roberto Di Pietro and Stefano Guarino}, title = {Confidentiality and availability issues in Mobile Unattended Wireless Sensor Networks}, booktitle = {{IEEE} 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2013, Madrid, Spain, June 4-7, 2013}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/WoWMoM.2013.6583467}, doi = {10.1109/WOWMOM.2013.6583467}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wowmom/PietroG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1301-1002, author = {Yunus Sarikaya and {\"{O}}zg{\"{u}}r Er{\c{c}}etin and Can Emre Koksal}, title = {Dynamic Network Control for Confidential Multi-hop Communications}, journal = {CoRR}, volume = {abs/1301.1002}, year = {2013}, url = {http://arxiv.org/abs/1301.1002}, eprinttype = {arXiv}, eprint = {1301.1002}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1301-1002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/IonRC12, author = {Mihaela Ion and Giovanni Russello and Bruno Crispo}, title = {Design and implementation of a confidentiality and access control solution for publish/subscribe systems}, journal = {Comput. Networks}, volume = {56}, number = {7}, pages = {2014--2037}, year = {2012}, url = {https://doi.org/10.1016/j.comnet.2012.02.013}, doi = {10.1016/J.COMNET.2012.02.013}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/IonRC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/BistaKSC12, author = {Rabindra Bista and Yong{-}Ki Kim and Myoung{-}Seon Song and Jae{-}Woo Chang}, title = {Improving Data Confidentiality and Integrity for Data Aggregation in Wireless Sensor Networks}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {95-D}, number = {1}, pages = {67--77}, year = {2012}, url = {https://doi.org/10.1587/transinf.E95.D.67}, doi = {10.1587/TRANSINF.E95.D.67}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/BistaKSC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YooPK12, author = {Sang Guun Yoo and Keunyoung Park and Juho Kim}, title = {Confidential information protection system for mobile devices}, journal = {Secur. Commun. Networks}, volume = {5}, number = {12}, pages = {1452--1461}, year = {2012}, url = {https://doi.org/10.1002/sec.516}, doi = {10.1002/SEC.516}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YooPK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/PapadopoulosKP12, author = {Stavros Papadopoulos and Aggelos Kiayias and Dimitris Papadias}, title = {Exact In-Network Aggregation with Integrity and Confidentiality}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {24}, number = {10}, pages = {1760--1773}, year = {2012}, url = {https://doi.org/10.1109/TKDE.2012.64}, doi = {10.1109/TKDE.2012.64}, timestamp = {Tue, 02 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tkde/PapadopoulosKP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/WyrembelskiB12, author = {Rafael F. Wyrembelski and Holger Boche}, title = {Physical Layer Integration of Private, Common, and Confidential Messages in Bidirectional Relay Networks}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {11}, number = {9}, pages = {3170--3179}, year = {2012}, url = {https://doi.org/10.1109/TWC.2012.070912.111293}, doi = {10.1109/TWC.2012.070912.111293}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/WyrembelskiB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bwcca/HuangLCZ12, author = {Jen{-}Fa Huang and Chung{-}Yu Li and Kai{-}Sheng Chen and Tsing Zhang}, title = {Structuring Reconfigurable Composite Signature Codecs to Enhance {OCDMA} Network Confidentiality}, booktitle = {2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications, Victoria, BC, Canada, November 12-14, 2012}, pages = {440--445}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/BWCCA.2012.78}, doi = {10.1109/BWCCA.2012.78}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/bwcca/HuangLCZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/IskanderLM12, author = {Marian Kamal Iskander and Adam J. Lee and Daniel Moss{\'{e}}}, editor = {Calton Pu and James Joshi and Surya Nepal}, title = {Confidentiality-preserving and fault-tolerant in-network aggregation for Collaborative WSNs}, booktitle = {8th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA, USA, October 14-17, 2012}, pages = {107--116}, publisher = {{ICST} / {IEEE}}, year = {2012}, url = {https://doi.org/10.4108/icst.collaboratecom.2012.250523}, doi = {10.4108/ICST.COLLABORATECOM.2012.250523}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/IskanderLM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ht/FahlHMS12, author = {Sascha Fahl and Marian Harbach and Thomas Muders and Matthew Smith}, editor = {Ethan V. Munson and Markus Strohmaier}, title = {TrustSplit: usable confidentiality for social network messaging}, booktitle = {23rd {ACM} Conference on Hypertext and Social Media, {HT} '12, Milwaukee, WI, USA, June 25-28, 2012}, pages = {145--154}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2309996.2310022}, doi = {10.1145/2309996.2310022}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ht/FahlHMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/BagciPRRV12, author = {Ibrahim Ethem Bagci and Mohammad Reza Pourmirza and Shahid Raza and Utz Roedig and Thiemo Voigt}, title = {Codo: confidential data storage for wireless sensor networks}, booktitle = {9th {IEEE} International Conference on Mobile Ad-Hoc and Sensor Systems, {MASS} 2012, Las Vegas, NV, USA, October 8-11, 2012 - Supplement Volume / Workshops}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MASS.2012.6708508}, doi = {10.1109/MASS.2012.6708508}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/BagciPRRV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/KarumanchiSL12, author = {Sushama Karumanchi and Anna Cinzia Squicciarini and Dan Lin}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {445--461}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_34}, doi = {10.1007/978-3-642-34601-9\_34}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/nss/KarumanchiSL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/0001B12, author = {Johannes Braun and Johannes Buchmann}, editor = {Albert Levi and Mohamad Badra and Matteo Cesana and Mona Ghassemian and {\"{O}}zg{\"{u}}r G{\"{u}}rb{\"{u}}z and Nafa{\^{a}} Jabeur and Marek Klonowski and Antonio Ma{\~{n}}a and Susana Sargento and Sherali Zeadally}, title = {Perfect Confidentiality Network: {A} Solution for Information Theoretically Secure Key Agreement}, booktitle = {5th International Conference on New Technologies, Mobility and Security, Istanbul, Turkey, {NTMS} 2012, May 7-10, 2012}, pages = {1--5}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/NTMS.2012.6208676}, doi = {10.1109/NTMS.2012.6208676}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ntms/0001B12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/ChangW12, author = {Yao{-}Tang Chang and Chuen{-}Ching Wang}, editor = {Bernady O. Apduhan and Ching{-}Hsien Hsu and Tadashi Dohi and Kenji Ishida and Laurence Tianruo Yang and Jianhua Ma}, title = {Confidential Enhancement with Multi-code Keying Reconfiguration over Time-Shifted CHPC-based 2D {OCDMA} Networks}, booktitle = {9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, {UIC/ATC} 2012, Fukuoka, Japan, September 4-7, 2012}, pages = {374--381}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/UIC-ATC.2012.65}, doi = {10.1109/UIC-ATC.2012.65}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/uic/ChangW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/HarbachFMS12, author = {Marian Harbach and Sascha Fahl and Thomas Muders and Matthew Smith}, editor = {Alain Mille and Fabien Gandon and Jacques Misselis and Michael Rabinovich and Steffen Staab}, title = {All our messages are belong to us: usable confidentiality in social networks}, booktitle = {Proceedings of the 21st World Wide Web Conference, {WWW} 2012, Lyon, France, April 16-20, 2012 (Companion Volume)}, pages = {519--520}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2187980.2188106}, doi = {10.1145/2187980.2188106}, timestamp = {Fri, 16 Apr 2021 10:04:12 +0200}, biburl = {https://dblp.org/rec/conf/www/HarbachFMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1203-1749, author = {Hamza Aldabbas and Tariq Falah Alwada'n and Helge Janicke and Ali H. Al{-}Bayatti}, title = {Data Confidentiality in Mobile Ad hoc Networks}, journal = {CoRR}, volume = {abs/1203.1749}, year = {2012}, url = {http://arxiv.org/abs/1203.1749}, eprinttype = {arXiv}, eprint = {1203.1749}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1203-1749.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/NovalesM11, author = {Ramon Novales and Neeraj Mittal}, title = {Parameterized key assignment for confidential communication in wireless networks}, journal = {Ad Hoc Networks}, volume = {9}, number = {7}, pages = {1186--1201}, year = {2011}, url = {https://doi.org/10.1016/j.adhoc.2011.01.009}, doi = {10.1016/J.ADHOC.2011.01.009}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/NovalesM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocnet/PaolucciGGCMVC11, author = {Francesco Paolucci and Molka Gharbaoui and Alessio Giorgetti and Filippo Cugini and Barbara Martini and Luca Valcarenghi and Piero Castoldi}, title = {Preserving Confidentiality in PCE-based Multi-domain Networks}, journal = {{JOCN}}, volume = {3}, number = {5}, pages = {465--474}, year = {2011}, url = {https://doi.org/10.1364/jocn.3.000465}, doi = {10.1364/JOCN.3.000465}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jocnet/PaolucciGGCMVC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ShiraishiMF11, author = {Yoshiaki Shiraishi and Masami Mohri and Youji Fukuta}, title = {A Server-Aided Computation Protocol Revisited for Confidentiality of Cloud Service}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {2}, pages = {83--94}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.06.31.083}, doi = {10.22667/JOWUA.2011.06.31.083}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ShiraishiMF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/NirmalaM11, author = {M. B. Nirmala and A. S. Manjunath}, editor = {David B. Johnson and Anurag Kumar}, title = {Confidential Program update with dynamic key computation for clustered wireless sensor networks}, booktitle = {Third International Conference on Communication Systems and Networks, {COMSNETS} 2011, Bangalore, India, January 4-8, 2011}, pages = {1--8}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/COMSNETS.2011.5716430}, doi = {10.1109/COMSNETS.2011.5716430}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/comsnets/NirmalaM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/WyrembelskiB11, author = {Rafael F. Wyrembelski and Holger Boche}, title = {Service integration in multiantenna bidirectional relay networks: Public and confidential messages}, booktitle = {Workshops Proceedings of the Global Communications Conference, {GLOBECOM} 2011, 5-9 December 2011, Houston, Texas, {USA}}, pages = {884--888}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/GLOCOMW.2011.6162583}, doi = {10.1109/GLOCOMW.2011.6162583}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/WyrembelskiB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/SchiavoniRF11, author = {Valerio Schiavoni and Etienne Rivi{\`{e}}re and Pascal Felber}, title = {{WHISPER:} Middleware for Confidential Communication in Large-Scale Networks}, booktitle = {2011 International Conference on Distributed Computing Systems, {ICDCS} 2011, Minneapolis, Minnesota, USA, June 20-24, 2011}, pages = {456--466}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICDCS.2011.15}, doi = {10.1109/ICDCS.2011.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/SchiavoniRF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icseng/BalasubramanianHZ11, author = {Venki Balasubramanian and Doan B. Hoang and Tanveer A. Zia}, editor = {Henry Selvaraj and Dawid Zydek}, title = {Addressing the Confidentiality and Integrity of Assistive Care Loop Framework Using Wireless Sensor Networks}, booktitle = {21st International Conference on Systems Engineering (ICSEng 2011), Las Vegas, NV, USA, Aug. 16-18, 2011}, pages = {416--421}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICSEng.2011.82}, doi = {10.1109/ICSENG.2011.82}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icseng/BalasubramanianHZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/SantosBGBCA11, author = {Carlos Raniery Paula dos Santos and Rafael Santos Bezerra and Lisandro Zambenedetti Granville and Leandro Marcio Bertholdo and Winnie Cheng and Nikos Anerousis}, editor = {Nazim Agoulmine and Claudio Bartolini and Tom Pfeifer and Declan O'Sullivan}, title = {A data confidentiality architecture for developing management mashups}, booktitle = {Proceedings of the 12th {IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2011, Dublin, Ireland, 23-27 May 2011}, pages = {49--56}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INM.2011.5990673}, doi = {10.1109/INM.2011.5990673}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/im/SantosBGBCA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/KeallyZXW11, author = {Matthew Keally and Gang Zhou and Guoliang Xing and Jianxin Wu}, title = {Exploiting sensing diversity for confident sensing in wireless sensor networks}, booktitle = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 10-15 April 2011, Shanghai, China}, pages = {1719--1727}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INFCOM.2011.5934969}, doi = {10.1109/INFCOM.2011.5934969}, timestamp = {Wed, 12 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/KeallyZXW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/GharbaouiPMCC11, author = {Molka Gharbaoui and Francesco Paolucci and Barbara Martini and Filippo Cugini and Piero Castoldi}, title = {Behavior-Based Policies for Preserving Confidentiality in PCE-based Multi-domain {MPLS} Networks}, booktitle = {{POLICY} 2011, {IEEE} International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011}, pages = {81--88}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/POLICY.2011.15}, doi = {10.1109/POLICY.2011.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/GharbaouiPMCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/MajiB11, author = {Amiya Kumar Maji and Saurabh Bagchi}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {v-CAPS: {A} Confidentiality and Anonymity Preserving Routing Protocol for Content-Based Publish-Subscribe Networks}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {281--302}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_16}, doi = {10.1007/978-3-642-31909-9\_16}, timestamp = {Tue, 23 May 2017 01:12:12 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/MajiB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1101-0345, author = {Yuya Dan}, title = {Diffusion of Confidential Information on Networks}, journal = {CoRR}, volume = {abs/1101.0345}, year = {2011}, url = {http://arxiv.org/abs/1101.0345}, eprinttype = {arXiv}, eprint = {1101.0345}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1101-0345.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IonRC11, author = {Mihaela Ion and Giovanni Russello and Bruno Crispo}, title = {Supporting Publication and Subscription Confidentiality in Pub/Sub Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {2011}, url = {http://eprint.iacr.org/2011/025}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IonRC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/OzdemirC10, author = {Suat {\"{O}}zdemir and Hasan Cam}, title = {Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {18}, number = {3}, pages = {736--749}, year = {2010}, url = {https://doi.org/10.1109/TNET.2009.2032910}, doi = {10.1109/TNET.2009.2032910}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/OzdemirC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcst/JiangGS10, author = {Wei Jiang and Wensheng Guo and Nan Sang}, editor = {Ivan Stojmenovic and Gerald E. Farin and Minyi Guo and Hai Jin and Keqiu Li and Liang Hu and Xiaohui Wei and Xiangjiu Che}, title = {Periodic Real-Time Message Scheduling for Confidentiality-Aware Cyber-Physical System in Wireless Networks}, booktitle = {Fifth International Conference on Frontier of Computer Science and Technology, {FCST} 2010, Changchun, Jilin Province, China, August 18-22, 2010}, pages = {355--360}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/FCST.2010.117}, doi = {10.1109/FCST.2010.117}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcst/JiangGS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ZouC10, author = {Chao Zou and Chunxiao Chigan}, title = {Dynamic Spectrum Allocation Based Confidentiality for Cognitive Radio Networks}, booktitle = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM} 2010, 6-10 December 2010, Miami, Florida, {USA}}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/GLOCOM.2010.5684027}, doi = {10.1109/GLOCOM.2010.5684027}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/ZouC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/FrikkenZ10, author = {Keith B. Frikken and Yihua Zhang}, editor = {Mohammad S. Obaidat and George A. Tsihrintzis and Joaquim Filipe}, title = {Sum Aggregation in Sensor Networks While Preserving Confidentiality and Integrity}, booktitle = {e-Business and Telecommunications - 7th International Joint Conference, {ICETE} 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {222}, pages = {172--187}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25206-8\_11}, doi = {10.1007/978-3-642-25206-8\_11}, timestamp = {Sat, 19 Oct 2019 20:35:35 +0200}, biburl = {https://dblp.org/rec/conf/icete/FrikkenZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rtas/KeallyZX10, author = {Matthew Keally and Gang Zhou and Guoliang Xing}, editor = {Marco Caccamo}, title = {Watchdog: Confident Event Detection in Heterogeneous Sensor Networks}, booktitle = {16th {IEEE} Real-Time and Embedded Technology and Applications Symposium, {RTAS} 2010, Stockholm, Sweden, April 12-15, 2010}, pages = {279--288}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/RTAS.2010.15}, doi = {10.1109/RTAS.2010.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rtas/KeallyZX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FrikkenZ10, author = {Keith B. Frikken and Yihua Zhang}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Confidentiality and Integrity for {SUM} Aggregation in Sensor Networks}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {231--240}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 08:40:23 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/FrikkenZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/IonRC10, author = {Mihaela Ion and Giovanni Russello and Bruno Crispo}, editor = {Sushil Jajodia and Jianying Zhou}, title = {Supporting Publication and Subscription Confidentiality in Pub/Sub Networks}, booktitle = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, pages = {272--289}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16161-2\_16}, doi = {10.1007/978-3-642-16161-2\_16}, timestamp = {Sun, 07 Jan 2018 16:52:46 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/IonRC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/de/Pimenidis2009, author = {Kyriakos Alexis Pimenidis}, title = {Holistic confidentiality in open networks}, school = {{RWTH} Aachen University, Germany}, year = {2009}, url = {http://darwin.bth.rwth-aachen.de/opus3/volltexte/2009/2697/}, urn = {urn:nbn:de:hbz:82-opus-26970}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/de/Pimenidis2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/ZhangGHZC09, author = {Yuanyuan Zhang and Dawu Gu and Fangyong Hou and Mengqi Zeng and Tao Cheng}, title = {Architecture Support for Memory Confidentiality and Integrity in Embedded Systems}, journal = {Int. J. Distributed Sens. Networks}, volume = {5}, number = {1}, pages = {96}, year = {2009}, url = {https://doi.org/10.1080/15501320802575161}, doi = {10.1080/15501320802575161}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdsn/ZhangGHZC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitn/ZhengHLT09, author = {Qunwei Zheng and Xiaoyan Hong and Jun Liu and Lei Tang}, title = {Time-Based Confidentiality Enhancement Scheme for Mobile Wireless Networks}, journal = {Int. J. Interdiscip. Telecommun. Netw.}, volume = {1}, number = {1}, pages = {80--94}, year = {2009}, url = {https://doi.org/10.4018/jitn.2009010106}, doi = {10.4018/JITN.2009010106}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitn/ZhengHLT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PietroMM09, author = {Roberto Di Pietro and Pietro Michiardi and Refik Molva}, title = {Confidentiality and integrity for data aggregation in {WSN} using peer monitoring}, journal = {Secur. Commun. Networks}, volume = {2}, number = {2}, pages = {181--194}, year = {2009}, url = {https://doi.org/10.1002/sec.93}, doi = {10.1002/SEC.93}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PietroMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/DefrawyST09, author = {Karim M. El Defrawy and John Solis and Gene Tsudik}, editor = {Sheikh Iqbal Ahamed and Elisa Bertino and Carl K. Chang and Vladimir Getov and Lin Liu and Ming Hua and Rajesh Subramanyan}, title = {Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks}, booktitle = {Proceedings of the 33rd Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 1}, pages = {271--279}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/COMPSAC.2009.43}, doi = {10.1109/COMPSAC.2009.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/DefrawyST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispan/ZengPMM09, author = {Yong Zeng and Qinqi Pei and Jianfeng Ma and Sang{-}Jae Moon}, title = {Multi-path Protocol for High Data Confidentiality and Reliability in Wireless Sensor Networks Using Non-dominated Dynamic Compensation}, booktitle = {The 10th International Symposium on Pervasive Systems, Algorithms, and Networks, {ISPAN} 2009, Kaohsiung, Taiwan, December 14-16, 2009}, pages = {243--248}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/I-SPAN.2009.86}, doi = {10.1109/I-SPAN.2009.86}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispan/ZengPMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/WangLWG09, author = {Xiaoyuan Wang and Xinfeng Li and Zhiguo Wan and Ming Gu}, title = {{CLEAR:} {A} confidential and Lifetime-Aware Routing Protocol for wireless sensor network}, booktitle = {Proceedings of the {IEEE} 20th International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2009, 13-16 September 2009, Tokyo, Japan}, pages = {2265--2269}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/PIMRC.2009.5450077}, doi = {10.1109/PIMRC.2009.5450077}, timestamp = {Fri, 28 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/WangLWG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/NovalesM09, author = {Ramon Novales and Neeraj Mittal}, title = {{TASK:} Template-Based Key Assignment for Confidential Communication in Wireless Networks}, booktitle = {28th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2009), Niagara Falls, New York, USA, September 27-30, 2009}, pages = {209--216}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SRDS.2009.30}, doi = {10.1109/SRDS.2009.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/NovalesM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/TanOZJ09, author = {Hailun Tan and Diethelm Ostry and John Zic and Sanjay K. Jha}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {245--252}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514308}, doi = {10.1145/1514274.1514308}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/TanOZJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0912-0954, author = {Samir B. Patel and Shrikant N. Pradhan}, title = {An approach to secure highly confidential documents of any size in the corporate or institutes having unsecured networks}, journal = {CoRR}, volume = {abs/0912.0954}, year = {2009}, url = {http://arxiv.org/abs/0912.0954}, eprinttype = {arXiv}, eprint = {0912.0954}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0912-0954.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PaiBWMRSM08, author = {Sameer Pai and Sergio A. Bermudez and Stephen B. Wicker and Marci Meingast and Tanya G. Roosta and Shankar Sastry and Deirdre K. Mulligan}, title = {Transactional Confidentiality in Sensor Networks}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {4}, pages = {28--35}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.107}, doi = {10.1109/MSP.2008.107}, timestamp = {Tue, 07 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/PaiBWMRSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/LuoPH08, author = {Jun Luo and Panagiotis Papadimitratos and Jean{-}Pierre Hubaux}, title = {GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries}, booktitle = {Proceedings of the Fifth Annual {IEEE} Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, {SECON} 2008, June 16-20, 2008, Crowne Plaza, San Francisco International Airport, California, {USA}}, pages = {441--450}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/SAHCN.2008.60}, doi = {10.1109/SAHCN.2008.60}, timestamp = {Fri, 17 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secon/LuoPH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0808-2591, author = {Jun Luo and Panos Papadimitratos and Jean{-}Pierre Hubaux}, title = {GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries}, journal = {CoRR}, volume = {abs/0808.2591}, year = {2008}, url = {http://arxiv.org/abs/0808.2591}, eprinttype = {arXiv}, eprint = {0808.2591}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-0808-2591.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/SloaneLS07, author = {Elliot Sloane and Gondy Leroy and Steven D. Sheetz}, editor = {John A. Hoxmeier and Stephen C. Hayne}, title = {An Integrated Social Actor and Service Oriented Architecture {(SOA)} Approach for Improved Electronic Health Record {(EHR)} Privacy and Confidentiality in the {US} National Healthcare Information Network {(NHIN)}}, booktitle = {Reaching New Heights. 13th Americas Conference on Information Systems, {AMCIS} 2007, Keystone, Colorado, USA, August 9-12, 2007}, pages = {366}, publisher = {Association for Information Systems}, year = {2007}, url = {http://aisel.aisnet.org/amcis2007/366}, timestamp = {Thu, 26 Nov 2020 16:35:40 +0100}, biburl = {https://dblp.org/rec/conf/amcis/SloaneLS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecumn/SattarzadehAJ07, author = {Behnam Sattarzadeh and Mahdi Asadpour and Rasool Jalili}, title = {Improved User Identity Confidentiality for {UMTS} Mobile Networks}, booktitle = {Fourth European Conference on Universal Multiservice Networks {(ECUMN} 2007), 14-16 February 2007, Toulouse, France}, pages = {401--409}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ECUMN.2007.27}, doi = {10.1109/ECUMN.2007.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecumn/SattarzadehAJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LuhK07a, author = {William Luh and Deepa Kundur}, title = {Separate Enciphering of Correlated Messages for Confidentiality in Distributed Networks}, booktitle = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM} '07, Washington, DC, USA, 26-30 November 2007}, pages = {1637--1641}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/GLOCOM.2007.315}, doi = {10.1109/GLOCOM.2007.315}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/LuhK07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/RachediBGA07, author = {Abderrezak Rachedi and Abderrahim Benslimane and Lei Guang and Chadi Assi}, title = {A Confident Community to Secure Mobile Ad Hoc Networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007}, pages = {1254--1259}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICC.2007.212}, doi = {10.1109/ICC.2007.212}, timestamp = {Tue, 19 Jun 2018 07:53:33 +0200}, biburl = {https://dblp.org/rec/conf/icc/RachediBGA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/ShaheenOSJ07, author = {Jaleel Shaheen and Diethelm Ostry and Vijay Sivaraman and Sanjay K. Jha}, title = {Confidential and Secure Broadcast in Wireless Sensor Networks}, booktitle = {Proceedings of the {IEEE} 18th International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2007, 3-7 September 2007, Athens, Greece}, pages = {1--5}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/PIMRC.2007.4394560}, doi = {10.1109/PIMRC.2007.4394560}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pimrc/ShaheenOSJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/PietroMM06, author = {Roberto Di Pietro and Luigi V. Mancini and Alessandro Mei}, title = {Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks}, journal = {Wirel. Networks}, volume = {12}, number = {6}, pages = {709--721}, year = {2006}, url = {https://doi.org/10.1007/s11276-006-6530-5}, doi = {10.1007/S11276-006-6530-5}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/PietroMM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnis/WangA06, author = {Bei Wang and Jim Alves{-}Foss}, editor = {Sanguthevar Rajasekaran}, title = {An {MSLS-EMM} for enforcing confidentiality in malicious environments}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, {USA}}, pages = {126--131}, publisher = {{IASTED/ACTA} Press}, year = {2006}, timestamp = {Fri, 26 Jan 2007 13:40:33 +0100}, biburl = {https://dblp.org/rec/conf/cnis/WangA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itrust/SorgeZ06, author = {Christoph Sorge and Martina Zitterbart}, editor = {Ketil St{\o}len and William H. Winsborough and Fabio Martinelli and Fabio Massacci}, title = {A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer Networks}, booktitle = {Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3986}, pages = {367--381}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11755593\_27}, doi = {10.1007/11755593\_27}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/itrust/SorgeZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/WanZDBA05, author = {Zhiguo Wan and Bo Zhu and Robert H. Deng and Feng Bao and Akkihebbal L. Ananda}, title = {DoS-resistant access control protocol with identity confidentiality for wireless networks}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2005, March 13-17, 2005, New Orleans, Louisiana, {USA}}, pages = {1521--1526}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/WCNC.2005.1424740}, doi = {10.1109/WCNC.2005.1424740}, timestamp = {Wed, 14 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/WanZDBA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/join/ChangH04, author = {Chin{-}Chen Chang and Ren{-}Junn Hwang}, title = {A new scheme to protect confidential images}, journal = {J. Interconnect. Networks}, volume = {5}, number = {3}, pages = {221--232}, year = {2004}, url = {https://doi.org/10.1142/S0219265904001131}, doi = {10.1142/S0219265904001131}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/join/ChangH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LouLF04, author = {Wenjing Lou and Wei Liu and Yuguang Fang}, title = {{SPREAD:} Enhancing Data Confidentiality in Mobile Ad Hoc Networks}, booktitle = {Proceedings {IEEE} {INFOCOM} 2004, The 23rd Annual Joint Conference of the {IEEE} Computer and Communications Societies, Hong Kong, China, March 7-11, 2004}, pages = {2404--2413}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/INFCOM.2004.1354662}, doi = {10.1109/INFCOM.2004.1354662}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/LouLF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmns/ReasonM01, author = {Johnathan M. Reason and David G. Messerschmitt}, editor = {Ehab S. Al{-}Shaer and Giovanni Pacifici}, title = {The Impact of Confidentiality on Quality of Service in Heterogeneous Voice over {IP} Networks}, booktitle = {Management of Multimedia on the Internet, 4th {IFIP/IEEE} International Conference on Management of Multimedia Networks and Services, {MMNS} 2001, Chicago, IL, {USA} October 29 - November 1, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2216}, pages = {175--192}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45508-6\_13}, doi = {10.1007/3-540-45508-6\_13}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/mmns/ReasonM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmi/MoehrM98, author = {Jochen R. Moehr and James G. McDaniel}, title = {Adoption of security and confidentiality features in an operational community health information network: the Comox Valley experience - case example}, journal = {Int. J. Medical Informatics}, volume = {49}, number = {1}, pages = {81--87}, year = {1998}, url = {https://doi.org/10.1016/S1386-5056(98)00014-8}, doi = {10.1016/S1386-5056(98)00014-8}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmi/MoehrM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/syben/KoulourisK98, author = {J. Koulouris and A. Koulouris}, editor = {Stephan Fischer and Ralf Steinmetz and Heinrich J. St{\"{u}}ttgen and Harmen R. van As and Roberto Vercelli}, title = {Securing confidentiality in {PON} and {HFC} networks}, booktitle = {Broadband European Networks and Multimedia Services, {SYBEN} 1998, Zurich, Switzerland, May 19-20, 1998}, series = {{SPIE} Proceedings}, volume = {3408}, pages = {148--158}, publisher = {{SPIE}}, year = {1998}, url = {https://doi.org/10.1117/12.321880}, doi = {10.1117/12.321880}, timestamp = {Sat, 07 Sep 2019 11:59:23 +0200}, biburl = {https://dblp.org/rec/conf/syben/KoulourisK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amia/BowenKRB97, author = {J. W. Bowen and J. C. Klimczak and M. Ruiz and M. Barnes}, title = {Design of access control methods for protecting the confidentiality of patient information in networked systems}, booktitle = {{AMIA} 1997, American Medical Informatics Association Annual Symposium, Nashville, TN, USA, October 25-29, 1997}, publisher = {{AMIA}}, year = {1997}, url = {https://knowledge.amia.org/amia-55142-a1997a-1.585351/t-001-1.587519/f-001-1.587520/a-009-1.587989/a-010-1.587986}, timestamp = {Wed, 17 Apr 2024 11:48:58 +0200}, biburl = {https://dblp.org/rec/conf/amia/BowenKRB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.