Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 47 matches
- 2017
- Yuan Liu, Zheng Zhao, Guibing Guo, Xingwei Wang, Zhenhua Tan, Shuang Wang:
An Identity Management System Based on Blockchain. PST 2017: 44-56 - Ruba AlOmari, Miguel Vargas Martin, Shane MacDonald, Christopher Bellman, Ramiro Liscano, Amit Maraj:
What Your Brain Says About Your Password: Using Brain-Computer Interfaces to Predict Password Memorability. PST 2017: 127-136 - Riham AlTawy, Muhammad ElSheikh, Amr M. Youssef, Guang Gong:
Lelantos: A Blockchain-Based Anonymous Physical Delivery System. PST 2017: 15-24 - Nuttapong Attrapadung, Goichiro Hanaoka, Shinsaku Kiyomoto, Tomoaki Mimoto, Jacob C. N. Schuldt:
A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions. PST 2017: 215-224 - Daniel Augot, Hervé Chabanne, Olivier Clémot, William George:
Transforming Face-to-Face Identity Proofing into Anonymous Digital Identity Using the Bitcoin Blockchain. PST 2017: 25-34 - Andrew Bedford:
Information-Flow Control with Fading Labels. PST 2017: 388-390 - Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet:
Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper). PST 2017: 253-258 - Sébastien Canard, Sergiu Carpov, Donald Nokam Kuate, Renaud Sirdey:
Running Compression Algorithms in the Encrypted Domain: A Case-Study on the Homomorphic Execution of RLE. PST 2017: 283-292 - Sébastien Canard, Baptiste Olivier, Tony Quertier:
Differentially Private Instance-Based Noise Mechanisms in Practice. PST 2017: 105-114 - Mario Parreño Centeno, Aad van Moorsel, Stefano Castruccio:
Smartphone Continuous Authentication Using Deep Learning Autoencoders. PST 2017: 147-158 - Rebecca Cooper, Hala Assal, Sonia Chiasson:
Cross-National Privacy Concerns on Data Collection by Government Agencies (Short Paper). PST 2017: 191-196 - Andrew Cortese, Amirreza Masoumzadeh:
Modeling Exposure in Online Social Networks. PST 2017: 327-336 - Petr Dzurenda, Sara Ricci, Jan Hajny, Lukas Malina:
Performance Analysis and Comparison of Different Elliptic Curves on Smart Cards. PST 2017: 365-374 - Ali ElShakankiry, Thomas R. Dean:
Context Sensitive and Secure Parser Generation for Deep Packet Inspection of Binary Protocols. PST 2017: 77-86 - Khaoula Es-Salhi, David Espes, Nora Cuppens:
A New Segmentation Method for Integrated ICS (Short Paper). PST 2017: 87-94 - Lydia Garms, Keith M. Martin, Siaw-Lynn Ng:
Reputation Schemes for Pervasive Social Networks with Anonymity (Short Paper). PST 2017: 311-316 - Shadan Ghaffaripour, Fadi Younis, Hoi Ting Poon, Ali Miri:
An Analysis of the Security of Compressed Sensing Using an Artificial Neural Network. PST 2017: 385-387 - Meiqi He, Jun Zhang, Gongxian Zeng, Siu-Ming Yiu:
A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings in Cloud Database. PST 2017: 293-302 - Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka:
Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes. PST 2017: 115-126 - Abhinav Jangda, Mohit Mishra:
RandHeap: Heap Randomization for Mitigating Heap Spray Attacks in Virtual Machines. PST 2017: 169-180 - Zeinab Joudaki, Julie Thorpe, Miguel Vargas Martin:
System-Assigned Passwords You Can't Write Down, But Don't Need To. PST 2017: 137-146 - Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura:
Conditionally Secure Multiparty Computation using Secret Sharing Scheme for n < 2k-1 (Short Paper). PST 2017: 225-232 - Ju-Sung Kang, Hojoong Park, Yongjin Yeom:
On the Additional Chi-Square Tests for the IID Assumption of NIST SP 800-90B. PST 2017: 375-384 - Thomas P. Keenan:
Alice in Blockchains: Surprising Security Pitfalls in PoW and PoS Blockchain Systems. PST 2017: 400-402 - David W. Kravitz:
Transaction Immutability and Reputation Traceability: Blockchain as a Platform for Access Controlled IoT and Human Interactivity. PST 2017: 3-14 - Arash Habibi Lashkari, Andi Fitriah Abdul Kadir, Hugo Gonzalez, Kenneth Fon Mbah, Ali A. Ghorbani:
Towards a Network-Based Framework for Android Malware Detection and Characterization. PST 2017: 233-234 - Marc-André Laverdière, Ettore Merlo:
Classification and Distribution of RBAC Privilege Protection Changes in Wordpress Evolution (Short Paper). PST 2017: 349-354 - Hyunsung Lee, Seong Hoon Jeong, Huy Kang Kim:
OTIDS: A Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame. PST 2017: 57-66 - Damien Ligier, Sergiu Carpov, Caroline Fontaine, Renaud Sirdey:
Information Leakage Analysis of Inner-Product Functional Encryption Based Data Classification. PST 2017: 303-310 - Jeremy Martin, Dane Brown, Kris Merrion, Lamont Brown, Travis Mayberry:
How Much Privacy Does $3, 165 Buy You? PST 2017: 197-204
skipping 17 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-23 08:14 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint