Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 48 matches
- 2001
- Ross J. Anderson:
Why Information Security is Hard-An Economic Perspective. ACSAC 2001: 358-365 - Paul Ashley, Heather M. Hinton, Mark Vandenwauver:
Wired versus Wireless Security: The Internet, WAP and iMode for E-Commerce. ACSAC 2001: 296-306 - Matt Bishop, Anup K. Ghosh, James A. Whittaker:
How Useful is Software Fault Injection for Evaluating the Security of COTS Products? ACSAC 2001: 339-340 - Bernd Blobel:
Trustworthiness in Distributed Electronic Healthcare Records-Basis for Shared Care. ACSAC 2001: 433-441 - Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati:
A Component-Based Architecture for Secure Data Publication. ACSAC 2001: 309-318 - Tim Buchheim, Michael Erlinger, Benjamin S. Feinstein, Gregory A. Matthews, Roy Pollock, Joseph Betser, Andy Walther:
Implementing the Intrusion Detection Exchange Protocol. ACSAC 2001: 32-41 - Germano Caronni, Christoph L. Schuba:
Enabling Hierarchical and Bulk-Distribution for Watermarked Content. ACSAC 2001: 277-285 - Ramaswamy Chandramouli:
A Framework for Multiple Authorization Types in a Healthcare Application System. ACSAC 2001: 137-148 - Frédéric Cuppens:
Managing Alerts in a Multi-Intrusion Detection Environmen. ACSAC 2001: 22-31 - John E. Dobson, Brian Randell:
Building Reliable Secure Computing Systems out of Unreliable Insecure Components. ACSAC 2001: 164-173 - Wenliang Du, Mikhail J. Atallah:
Privacy-Preserving Cooperative Statistical Analysis. ACSAC 2001: 102-110 - Anna Entrichel, James Bergman, Jason Willis, Herb Little:
Computing Without Wires (Or Even a Net): The Pitfalls, Potentials, and Practicality of Wireless Networking. ACSAC 2001: 463-464 - Pete Epstein, Ravi S. Sandhu:
Engineering of Role/Permission Assignments. ACSAC 2001: 127-136 - Benjamin S. Feinstein, Gregory A. Matthews, Stuart Staniford, Andy Walther:
Experiences Implementing a Common Format for IDS Alerts. ACSAC 2001: 113 - D. W. Gresty, Qi Shi, Madjid Merabti:
Requirements for a General Framework for Response to Distributed Denial-of-Service. ACSAC 2001: 422-429 - Ron Gula, Gene Kim, Chris Klaus, Paul Proctor:
Security Vendor CTOs: Perspectives, Opinions, and Lessons Learned. ACSAC 2001: 343 - James M. Hayes:
Restricting Access with Certificate Attributes in Multiple Root Environments-A Recipe for Certificate Masquerading. ACSAC 2001: 386-390 - Peter Herrmann:
Information Flow Analysis of Component-Structured Applications. ACSAC 2001: 45-54 - Yih Huang, David Rine, Xunhua Wang:
A JCA-Based Implementation Framework for Threshold Cryptography. ACSAC 2001: 85-91 - Wayne A. Jansen:
Determining Privileges of Mobile Agents. ACSAC 2001: 149-158 - Shan Jiang, Sean W. Smith, Kazuhiro Minami:
Securing Web Servers against Insider Attack . ACSAC 2001: 265-276 - Anita Jones, Song Li:
Temporal Signatures for Intrusion Detection. ACSAC 2001: 252-261 - Anita K. Jones, Yu Lin:
Application Intrusion Detection using Language Library Calls. ACSAC 2001: 442-449 - Klaus Julisch:
Mining Alarm Clusters to Improve Alarm Handling Efficiency. ACSAC 2001: 12-21 - Günter Karjoth:
The Authorization Service of Tivoli Policy Director. ACSAC 2001: 319-328 - Carl E. Landwehr, Constance L. Heitmeyer, John D. McLean:
A Security Model for Military Message Systems: Retrospective. ACSAC 2001: 174-190 - Ulrich Lang, Dieter Gollmann, Rudolf Schreiner:
Verifiable Identifiers in Middleware Security. ACSAC 2001: 450-459 - Albert Levi, Çetin Kaya Koç:
CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59. ACSAC 2001: 286-295 - Ulf Lindqvist, Phillip A. Porras:
eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris. ACSAC 2001: 240-251 - Peng Liu:
DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications. ACSAC 2001: 219-229
skipping 18 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-25 13:33 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint