Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 37 matches
- 2012
- B. S. Adiga, P. Balamuralidhar, M. A. Rajan, Ravishankara Shastry, V. L. Shivraj:
An identity based encryption using elliptic curve cryptography for secure M2M communication. SECURIT 2012: 68-74 - Renu Aggarwal, Manik Lal Das:
RFID security in the context of "internet of things". SECURIT 2012: 51-56 - Shaik Shakeel Ahamad, V. N. Sastry, Siba K. Udgata:
A secure and optimized mobile payment framework with formal verification. SECURIT 2012: 27-35 - Abdullah Mohammed Almuhaideb, Bala Srinivasan, Phu Dung Le, Campbell Wilson, Vishv Malhotra:
Analysis of mobile authentication protocols by SVO logic. SECURIT 2012: 126-134 - D. Bapat Ameya, Alwyn Roshan Pais:
Restraining add-on's behavior in private browsing. SECURIT 2012: 194-199 - Usha Banerjee, K. V. Arya, Geetika Gupta, Sakshi Sharma:
Performance evaluation of an ant colony based routing algorithm in the presence of a misbehaving node. SECURIT 2012: 227-233 - Simon Burton, Jürgen Likkei, Priyamvadha Vembar, Marko Wolf:
Automotive functional safety = safety + security. SECURIT 2012: 150-159 - James Clarke, Rodrigo Roman Castro, Abhishek Sharma, Javier López, Neeraj Suri:
Trust & security RTD in the internet of things: opportunities for international cooperation. SECURIT 2012: 172-178 - Dhruwajita Devi, Sukumar Nandi:
Detection of packed malware. SECURIT 2012: 22-26 - Dhiren, Maulik, Hardik Joshi, Bhadresh K. Patel:
Towards application classification with vulnerability signatures for IDS/IPS. SECURIT 2012: 216-221 - Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur, P. Vinod:
Behavioural detection with API call-grams to identify malicious PE files. SECURIT 2012: 85-91 - Xavier N. Fernando, Kuganeswaran Thambu:
Cross-layer coding improves quality and security in wireless video sensor networks. SECURIT 2012: 92-95 - Annie George, Prabaharan Poornachandran, M. Ramachandra Kaimal:
adsvm: pre-processor plug-in using support vector machine algorithm for Snort. SECURIT 2012: 179-184 - Susmita Horrow, Anjali Sardana:
Identity management framework for cloud based internet of things. SECURIT 2012: 200-203 - Garima Jain, Yatin Mehandiratta:
Chronicle security against covert crawling. SECURIT 2012: 42-50 - N. Kaleeswari, K. Baskaran:
Reducing the energy consumption in wireless sensor networks using delay aware dynamic routing protocol. SECURIT 2012: 239-245 - Kamalanathan Kandasamy, Krishnashree Achuthan:
Re-architecture of database software stack with planner module for query optimization in a cloud environment. SECURIT 2012: 165-171 - Lee W. Lerner, Mohammed M. Farag, Cameron D. Patterson:
Run-time prediction and preemption of configuration attacks on embedded process controllers. SECURIT 2012: 135-144 - M. Marfa, Subu Surendran, Sabu M. Thampi, T. Radhakrishnan:
Cache based approach for improving location based query processing in mobile environment. SECURIT 2012: 234-238 - Senthil Kumar Mathi, M. L. Valarmathi, G. Ramprasath:
A secure and efficient registration for IP mobility. SECURIT 2012: 210-215 - V. Natarajan, Shina Sheen, R. Anitha:
Detection of StegoBot: a covert social network botnet. SECURIT 2012: 36-41 - Hiran V. Nath, K. Gangadharan, M. Sethumadhavan:
Reconciliation engine and metric for network vulnerability assessment. SECURIT 2012: 9-21 - Smita Naval, Vijay Laxmi, Manoj Singh Gaur, P. Vinod:
SPADE: Signature based PAcker DEtection. SECURIT 2012: 96-101 - Chinmaya Kumar Patanaik, Ferdous A. Barbhuiya, Sukumar Nandi:
Obfuscated malware detection using API call dependency. SECURIT 2012: 185-193 - Jayaraj Poroor, Bharat Jayaraman:
Formal analysis of event-driven cyber physical systems. SECURIT 2012: 1-8 - Digambar Powar, G. Geethakumari:
Digital evidence detection in virtual environment for cloud computing. SECURIT 2012: 102-106 - I. Praveen, M. Sethumadhavan:
A more efficient and faster pairing computation with cryptographic security. SECURIT 2012: 145-149 - G. K. Ragesh, K. Baskaran:
CRYPE: towards cryptographically enforced and privacy enhanced WBANs. SECURIT 2012: 204-209 - V. Rajalakshmi, G. S. Anandha Mala:
Integer partitioning based encryption for privacy preservation in data mining. SECURIT 2012: 246-251 - B. Dinesh Reddy, V. Valli Kumari, K. V. S. V. N. Raju:
Randomized symmetric block encryption. SECURIT 2012: 222-226
skipping 7 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-28 02:21 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint