Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 286 matches
- 2024
- Lothar Fritsch, Ismail Hassan, Ebenezer Paintsil:
Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings. Lecture Notes in Computer Science 14324, Springer 2024, ISBN 978-3-031-47747-8 [contents] - 2023
- Lars Berg, Kirsi Helkala, André Årnes:
Legal Considerations on Gray Zone Operations - From a Norwegian Perspective. NordSec 2023: 162-181 - Joakim Brorsson, Martin Gunnarsson:
DIPSAUCE: Efficient Private Stream Aggregation Without Trusted Parties. NordSec 2023: 204-222 - Paul Cotan, George Teseleanu:
Small Private Key Attack Against a Family of RSA-Like Cryptosystems. NordSec 2023: 57-72 - Tianxiang Dai, Li Duan, Yufan Jiang, Yong Li, Fei Mei, Yulian Sun:
Force: Highly Efficient Four-Party Privacy-Preserving Machine Learning on GPU. NordSec 2023: 330-349 - Philipp Eichhammer, Hans P. Reiser:
A Self-forming Community Approach for Intrusion Detection in Heterogeneous Networks. NordSec 2023: 263-280 - Mordechai Guri:
RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM. NordSec 2023: 144-161 - Amirreza Hamidi, Hossein Ghodosi:
Fair Distributed Oblivious Polynomial Evaluation via Bitcoin Deposits: Compute-as-a-Service. NordSec 2023: 73-86 - Thorsten Jenke, Elmar Padilla, Lilli Bruckschen:
Towards Generic Malware Unpacking: A Comprehensive Study on the Unpacking Behavior of Malicious Run-Time Packers. NordSec 2023: 245-262 - Tanveer Khan, Khoa Nguyen, Antonis Michalas:
A More Secure Split: Enhancing the Security of Privacy-Preserving Split Learning. NordSec 2023: 307-329 - Karianne Kjønås, Gaute Wangen:
Cybersecurity Challenges and Smart Technology Adoption in Norwegian Livestock Farming. NordSec 2023: 107-125 - Samantha Klier, Harald Baier:
To Possess or Not to Possess - WhatsApp for Android Revisited with a Focus on Stickers. NordSec 2023: 281-303 - Mario Lins, René Mayrhofer, Michael Roland, Alastair R. Beresford:
Mobile App Distribution Transparency (MADT): Design and Evaluation of a System to Mitigate Necessary Trust in Mobile App Distribution Systems. NordSec 2023: 185-203 - Philippe Mangeard, Xiufen Yu, Mohammad Mannan, Amr M. Youssef:
No Place to Hide: Privacy Exposure in Anti-stalkerware Apps and Support Websites. NordSec 2023: 18-36 - Jonas Palm, Meiko Jensen:
Analysis of a Consent Management Specification and Prototype Under the GDPR. NordSec 2023: 3-17 - Rajendra Patil, Viktoria Fodor, Mathias Ekstedt:
Mean Value Analysis of Critical Attack Paths with Multiple Parameters. NordSec 2023: 126-143 - Marc Roßberger, Dogan Kesdogan:
Smart Noise Detection for Statistical Disclosure Attacks. NordSec 2023: 87-103 - Vera Schmitt, Daniel Sivizaca Conde, Premtim Sahitaj, Sebastian Möller:
What is Your Information Worth? A Systematic Analysis of the Endowment Effect of Different Data Types. NordSec 2023: 223-242 - Esko Vuorinen, Panu Puhtila, Sampsa Rauti, Ville Leppänen:
From Whistle to Echo: Data Leaks in Web-Based Whistleblowing Channels. NordSec 2023: 37-53 - 2022
- Mina Alishahi, Daan Gast, Sam Vermeiren:
Local Differential Privacy for Private Construction of Classification Algorithms. NordSec 2022: 58-79 - Xavier Arnal, Abraham Cano, Tamara Finogina, Javier Herranz:
How to Avoid Repetitions in Lattice-Based Deniable Zero-Knowledge Proofs. NordSec 2022: 253-269 - Alexander Bjerre, Andreas Philip Westh, Emil Villefrance, A S. M. Farhan Al Haque, Jonas Bukrinski Andersen, Lucas K. Helgogaard, Marios Anagnostopoulos:
A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries. NordSec 2022: 176-193 - Bernhards Blumbergs, Eriks Dobelis, Peteris Paikens, Krisjanis Nesenbergs, Kirils Solovjovs, Artis Rusins:
WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices. NordSec 2022: 311-325 - Matthew Cole, Aravind Prakash:
Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage. NordSec 2022: 215-233 - Mohamed Taoufiq Damir, Valtteri Niemi:
Location Privacy, 5G AKA, and Enhancements. NordSec 2022: 40-57 - Daniel Fraunholz, Dominik Brunke, Simon Beidenhauser, Sebastian Berger, Hartmut Koenig, Daniel Reti:
IMSI Probing: Possibilities and Limitations. NordSec 2022: 80-97 - Sarah Abdelwahab Gaballah, Lamya Abdullah, Minh Tung Tran, Ephraim Zimmer, Max Mühlhäuser:
On the Effectiveness of Intersection Attacks in Anonymous Microblogging. NordSec 2022: 3-19 - Mordechai Guri:
GPU-FAN: Leaking Sensitive Data from Air-Gapped Machines via Covert Noise from GPU Fans. NordSec 2022: 194-211 - Carsten Hesselmann, Delphine Reinhardt, Jan Gertheiss, Jörg P. Müller:
Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement of User Awareness. NordSec 2022: 20-39 - David Lantz, Felipe Boeira, Mikael Asplund:
Towards Self-monitoring Enclaves: Side-Channel Detection Using Performance Counters. NordSec 2022: 120-138
skipping 256 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 10:50 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint