Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 47 matches
- 2007
- Rose-Mharie Åhlfeldt, Paolo Spagnoletti, Guttorm Sindre:
Improving the Information Security Model by using TFI. SEC 2007: 73-84 - Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati:
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy. SEC 2007: 313-324 - Alapan Arnab, Andrew Hutchison:
Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions. SEC 2007: 277-288 - William J. Caelli:
Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM. SEC 2007: 433-442 - Luiz Fernando Rust C. Carmo, Breno G. de Oliveira, Augusto C. Braga:
Trust Evaluation for Web Applications based on Behavioral Analysis. SEC 2007: 61-72 - Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing. SEC 2007: 385-396 - Yuri Demchenko, Leon Gommans, Cees de Laat:
Extending Role Based Access Control Model for Distributed Multidomain Applications. SEC 2007: 301-312 - Liesje Demuynck, Bart De Decker, Wouter Joosen:
A Credential-Based System for the Anonymous Delegation of Rights. SEC 2007: 169-180 - Ronald C. Dodge, Corey Bertram, Daniel Ragsdale:
Remote Virtual Information Assurance Network. SEC 2007: 485-490 - Christian J. Eibl, Basie von Solms, Sigrid E. Schubert:
Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content. SEC 2007: 181-192 - Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Edgar R. Weippl:
Ontological Mapping of Common Criteria's Security Assurance Requirements. SEC 2007: 85-95 - Stephen Flowerday, Gideon Ranga:
Identification Now and in the Future: Social Grant Distribution Process in South Africa. SEC 2007: 457-459 - Steven Furnell, Dimitris Katsabas, Paul Dowland, Fraser Reid:
A Practical Usability Evaluation of Security Features in End-User Applications. SEC 2007: 205-216 - Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia:
Management of Exceptions on Access Control Policies. SEC 2007: 97-108 - Talania Grobler, Buks Louwrens:
Digital Forensic Readiness as a Component of Information Security Best Practice. SEC 2007: 13-24 - John Haggerty, Mark John Taylor:
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints. SEC 2007: 1-12 - Almut Herzog, Nahid Shahmehri:
Usability and Security of Personal Firewalls. SEC 2007: 37-48 - Natsuko Hikage, Yuko Murayama, Carl Hauser:
Exploratory survey on an Evaluation Model for a Sense of Security. SEC 2007: 121-132 - Adolf Hohl, Alf Zugenmaier:
Safeguarding Personal Data using Rights Management in Distributed Applications. SEC 2007: 449-456 - Håvard D. Johansen, Dag Johansen, Robbert van Renesse:
FirePatch: Secure and Time-Critical Dissemination of Software Patches. SEC 2007: 373-384 - Sevasti Karatzouni, Nathan L. Clarke:
Keystroke Analysis for Thumb-based Keyboards on Mobile Devices. SEC 2007: 253-263 - Jan Paul Kolter, Rolf Schillinger, Günther Pernul:
Building a Distributed Semantic-aware Security Architecture. SEC 2007: 397-408 - Eleni Kosta, Martin Meints, Marit Hansen, Mark Gasson:
An analysis of security and privacy issues relating to RFID enabled ePassports. SEC 2007: 467-472 - Evangelos Kotsovinos, Ingo Friese, Martin Kurze, Jörg Heuer:
A Role-Based Architecture for Seamless Identity Management and Effective Task Separation. SEC 2007: 289-300 - Nicolai Kuntze, Andreas U. Schmidt:
Trusted Ticket Systems and Applications. SEC 2007: 49-60 - Nicolai Kuntze, Andreas U. Schmidt, Christian Hett:
Non-Repudiation in Internet Telephony. SEC 2007: 361-372 - Zhuowei Li, Amitabha Das, Jianying Zhou:
Evaluating the Effects of Model Generalization on Intrusion Detection Performance. SEC 2007: 421-432 - Tieyan Li, Guilin Wang:
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols. SEC 2007: 109-120 - Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang:
Crafting Web Counters into Covert Channels. SEC 2007: 337-348 - Christer Magnusson, Josef Molvidsson, Sven Zetterqvist:
Value creation and Return On Security Investments (ROSI). SEC 2007: 25-35
skipping 17 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-11 10:36 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint