Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 142 matches
- 2023
- Guilherme A. Thomaz, Matheus B. Guerra, Matteo Sammarco, Marcin Detyniecki, Miguel Elias M. Campista:
Tamper-proof access control for IoT clouds using enclaves. Ad Hoc Networks 147: 103191 (2023) - Mahbubur Rahman, Abusayeed Saifullah:
Transparent and Tamper-Proof Event Ordering in the Internet of Things Platforms. IEEE Internet Things J. 10(6, March 15): 5335-5348 (2023) - MingQuan Fan:
Blind Dual Image Watermarking for Copyright Protection, Tamper Proofing and Self-Recovery. Multim. Tools Appl. 82(29): 45503-45518 (2023) - Aditi Sharma, Parmeet Kaur:
Tamper-proof multitenant data storage using blockchain. Peer Peer Netw. Appl. 16(1): 431-449 (2023) - Mamunur Akand, Reihaneh Safavi-Naini, Marc Kneppers, Matthieu Giraud, Pascal Lafourcade:
Privacy-Preserving Proof-of-Location With Security Against Geo-Tampering. IEEE Trans. Dependable Secur. Comput. 20(1): 131-146 (2023) - Junwei Yu, Yuheng Guo, Yepeng Ding, Hiroyuki Sato:
VeriAnon: an Anonymous, Verifiable, and Tamper-proof Commenting System Based on Ring Signature and Clustering Merkle Tree for Decentralized Trading. ASSE 2023: 132-140 - Irtaza Shahid, Nirupam Roy:
"Is this my president speaking?" Tamper-proofing Speech in Live Recordings. MobiSys 2023: 219-232 - 2022
- Nikhil Rangarajan, Johann Knechtel, Dinesh Rajasekharan, Ozgur Sinanoglu:
SuperVAULT: Superparamagnetic Volatile Auxiliary Tamper-Proof Storage. IEEE Embed. Syst. Lett. 14(2): 103-106 (2022) - Fei Ye, Yunzhi Zheng, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
TamForen: A tamper-proof cloud forensic framework. Trans. Emerg. Telecommun. Technol. 33(4) (2022) - Fabian Honecker, Julian Dreyer, Ralf Tönjes:
Comparison of Distributed Tamper-Proof Storage Methods for Public Key Infrastructures. Future Internet 14(11): 336 (2022) - Collins Sey, Hang Lei, Weizhong Qian, Xiaoyu Li, Linda Delali Fiasam, Seth Larweh Kodjiku, Isaac Adjei Mensah, Isaac Osei Agyemang:
VBlock: A Blockchain-Based Tamper-Proofing Data Protection Model for Internet of Vehicle Networks. Sensors 22(20): 8083 (2022) - Pranitha Sanda, Digambar Pawar, V. Radha:
Blockchain-based tamper-proof and transparent investigation model for cloud VMs. J. Supercomput. 78(16): 17891-17919 (2022) - Adil Ahmad, Sangho Lee, Marcus Peinado:
HARDLOG: Practical Tamper-Proof System Auditing Using a Novel Audit Device. SP 2022: 1791-1807 - Mahbubur Rahman, Abusayeed Saifullah:
Transparent and Tamper-Proof Event Ordering in the Internet of Things Platforms. CoRR abs/2208.05865 (2022) - 2021
- Jie Lian, Siqian Wang, Yanmiao Xie:
TDRB: An Efficient Tamper-Proof Detection Middleware for Relational Database Based on Blockchain Technology. IEEE Access 9: 66707-66722 (2021) - Ji Sun Shin, Minjae Jo, Jung Yeon Hwang, Jaehwan Lee:
A Verifier-Based Password-Authenticated Key Exchange Using Tamper-Proof Hardware. Comput. J. 64(8): 1293-1302 (2021) - Louis M. Shekhtman, Erez Waisbard:
EngraveChain: A Blockchain-Based Tamper-Proof Distributed Log System. Future Internet 13(6): 143 (2021) - Tristan Corrick, Vimal Kumar:
Design and Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System. UbiSec 2021: 189-202 - 2020
- Nikhil Rangarajan, Satwik Patnaik, Johann Knechtel, Ozgur Sinanoglu, Shaloo Rakheja:
SMART: A Secure Magnetoelectric AntifeRromagnet-Based Tamper-Proof Non-Volatile Memory. IEEE Access 8: 76130-76142 (2020) - Jiachen Yang, Jiabao Wen, Bin Jiang, Huihui Wang:
Blockchain-Based Sharing and Tamper-Proof Framework of Big Data Networking. IEEE Netw. 34(4): 62-67 (2020) - Tu Bui, Daniel Cooper, John P. Collomosse, Mark Bell, Alex Green, John Sheridan, Jez Higgins, Arindra Das, Jared Robert Keller, Olivier Thereaux:
Tamper-Proofing Video With Hierarchical Attention Autoencoder Hashing on Blockchain. IEEE Trans. Multim. 22(11): 2858-2872 (2020) - Liza Ahmad, Salam Ismail Rasheed Khanji, Farkhund Iqbal, Faouzi Kamoun:
Blockchain-based chain of custody: towards real-time tamper-proof evidence management. ARES 2020: 48:1-48:8 - Alexander D. Wissner-Gross, Jared C. Willard, Noah Weston:
Tamper-Proofing Imagery from Distributed Sensors Using Learned Blockchain Consensus. AIPR 2020: 1-4 - Naiwang Guo, Yi Wu, Hongshan Yang:
A new database tamper-proof operation log system based on consensus mechanism. EITCE 2020: 1172-1177 - Adnan Iftekhar, Xiaohui Cui, Mir Hassan, Wasif Afzal:
Application of Blockchain and Internet of Things to Ensure Tamper-Proof Data Availability for Food Safety. CoRR abs/2006.01307 (2020) - 2019
- Hwai-Tsu Hu, Tung-Tsun Lee:
Hybrid Blind Audio Watermarking for Proprietary Protection, Tamper Proofing, and Self-Recovery. IEEE Access 7: 180395-180408 (2019) - Sheng Cao, Gexiang Zhang, Pengfei Liu, Xiaosong Zhang, Ferrante Neri:
Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain. Inf. Sci. 485: 427-440 (2019) - Shifeng Sun, Dawu Gu, Man Ho Au, Shuai Han, Yu Yu, Joseph K. Liu:
Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System. ACNS 2019: 486-506 - Rajesh Kumar Shrivastava, Kevin Jude Concessao, Chittaranjan Hota:
Code Tamper-Proofing using Dynamic Canaries. APCC 2019: 238-243 - Uttkarsh Goel, Ron Ruhl, Pavol Zavarsky:
Using Healthcare Authority and Patient Blockchains to Develop a Tamper-Proof Record Tracking System. BigDataSecurity/HPSC/IDS 2019: 25-30
skipping 112 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-26 23:39 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint