![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 83 matches
- 2012
- Mohamad M. Abuzaid, Marianne A. Azer
:
Janitor, Certificate and Jury (JCJ) Trust Scheme for Wireless Ad-hoc Networks. ARES 2012: 383-387 - Ali Fawzi Najm Al-Shammari
, Adolfo Villafiorita
, Komminist Weldemariam:
Understanding the Development Trends of Electronic Voting Systems. ARES 2012: 186-195 - Ali Fawzi Najm Al-Shammari
, Adolfo Villafiorita
, Komminist Weldemariam:
Towards an Open Standard Vote Verification Framework in Electronic Voting Systems. ARES 2012: 437-444 - Aleem Khalid Alvi, Mohammad Zulkernine:
A Comparative Study of Software Security Pattern Classifications. ARES 2012: 582-589 - Juhani Anttila, Kari Jussila
, Jorma Kajava, Ilkka Kamaja:
Integrating ISO/IEC 27001 and other Managerial Discipline Standards with Processes of Management in Organizations. ARES 2012: 425-436 - Itziar Arrieta-Salinas, José Enrique Armendáriz-Iñigo
, Joan Navarro
:
Classic Replication Techniques on the Cloud. ARES 2012: 268-273 - Muhammad Asim, Tanya Ignatenko, Milan Petkovic, Daniel Trivellato, Nicola Zannone
:
Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption. ARES 2012: 212-217 - Marianne Azer
, Ahmed Shaker, Sherif Nagy, Ahmed Raafat, Mohamad M. Abuzaid:
Organizational Risk Assessment Based on Attacks Repetition. ARES 2012: 286-290 - Anne Baumgrass, Mark Strembeck:
An Approach to Bridge the Gap between Role Mining and Role Engineering via Migration Guides. ARES 2012: 113-122 - Kristian Beckers:
Comparing Privacy Requirements Engineering Approaches. ARES 2012: 574-581 - Kristian Beckers, Stephan Faßbender:
Peer-to-Peer Driven Software Engineering Considering Security, Reliability, and Performance. ARES 2012: 485-494 - Kristian Beckers, Stephan Faßbender, Maritta Heisel, Holger Schmidt:
Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation. ARES 2012: 242-248 - Kristian Beckers, Stephan Faßbender, Holger Schmidt:
An Integrated Method for Pattern-Based Elicitation of Legal Requirements Applied to a Cloud Computing Example. ARES 2012: 463-472 - Amine Belabed, Esma Aïmeur, Mohammed Amine Chikh:
A Personalized Whitelist Approach for Phishing Webpage Detection. ARES 2012: 249-254 - Karin Bernsmed, Inger Anne Tøndel, Åsmund Ahlmann Nyre:
Design and Implementation of a CBR-based Privacy Agent. ARES 2012: 317-326 - Pascal Berthomé, Thomas Fécherolle, Nicolas Guilloteau, Jean-François Lalande
:
Repackaging Android Applications for Auditing Access to Private Data. ARES 2012: 388-396 - Pascal Berthomé, Karine Heydemann, Xavier Kauffmann-Tourkestansky, Jean-François Lalande
:
High Level Model of Control Flow Attacks for Smart Card Functional Security. ARES 2012: 224-229 - Henk Birkholz, Ingo Sieverdingbeck, Karsten Sohr
, Carsten Bormann
:
IO: An Interconnected Asset Ontology in Support of Risk Management Processes. ARES 2012: 534-541 - Anton Borg
, Niklas Lavesson:
E-mail Classification Using Social Network Information. ARES 2012: 168-173 - David Cadé, Bruno Blanchet:
From Computationally-proved Protocol Specifications to Implementations. ARES 2012: 65-74 - Xihui Chen, Gabriele Lenzini, Sjouke Mauw
, Jun Pang:
A Group Signature Based Electronic Toll Pricing System. ARES 2012: 85-93 - Marijke Coetzee
:
Towards a Holistic Information Security Governance Framework for SOA. ARES 2012: 155-160 - Jean Michel Combes, Ghada Arfaoui
, Maryline Laurent
:
Dynamic DNS Update Security, Based on Cryptographically Generated Addresses and ID-Based Cryptography, in an IPv6 Autoconfiguration Context. ARES 2012: 206-211 - Horia V. Corcalciuc:
A Taxonomy of Time and State Attacks. ARES 2012: 564-573 - Stefan Craß, Tobias Dönz, Gerson Joskowicz, Eva Kühn:
A Coordination-Driven Authorization Framework for Space Containers. ARES 2012: 133-142 - Stefania D'Agostini, Valentina Di Giacomo
, Claudia Pandolfo, Domenico Presenza
:
An Ontology for Run-Time Verification of Security Certificates for SOA. ARES 2012: 525-533 - Baozeng Ding, Yanjun Wu, Yeping He, Shuo Tian, Bei Guan, Guowei Wu:
Return-Oriented Programming Attack on the Xen Hypervisor. ARES 2012: 479-484 - Jean Dubreuil, Guillaume Bouffard
, Jean-Louis Lanet, Julien Cartigny:
Type Classification against Fault Enabled Mutant in Java Based Smart Card. ARES 2012: 551-556 - Noura Al Ebri, Joonsang Baek
, Abdulhadi Shoufan
, Quang Hieu Vu:
Efficient Generic Construction of Forward-Secure Identity-Based Signature. ARES 2012: 55-64 - Mourad Elhadef:
Using Linear Support Vector Machines to Solve the Asymmetric Comparison-Based Fault Diagnosis Problem. ARES 2012: 18-27
skipping 53 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-22 04:46 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint