default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 27 matches
- 2013
- Yousra Aafer, Wenliang Du, Heng Yin:
DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android. SecureComm 2013: 86-103 - Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, Al-Sakib Khan Pathan:
Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform. SecureComm 2013: 405-417 - Niels Avonds, Raoul Strackx, Pieter Agten, Frank Piessens:
Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least Privilege. SecureComm 2013: 252-269 - Silvio Cesare, Yang Xiang, Jun Zhang:
Clonewise - Detecting Package-Level Clones Using Machine Learning. SecureComm 2013: 197-215 - Belal Chowdhury, Morshed U. Chowdhury, Jemal H. Abawajy:
Securing a Web-Based Anti-counterfeit RFID System. SecureComm 2013: 342-355 - Xiang Cui, Binxing Fang, Jinqiao Shi, Chaoge Liu:
Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets. SecureComm 2013: 53-68 - Hui Cui, Yi Mu, Man Ho Au:
Public-Key Encryption Resilient to Linear Related-Key Attacks. SecureComm 2013: 182-196 - Ibrahim F. Elashry, Yi Mu, Willy Susilo:
Generic Mediated Encryption. SecureComm 2013: 154-168 - Ryan Farley, Xinyuan Wang:
Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation. SecureComm 2013: 104-121 - Jin B. Hong, Dong Seong Kim:
Scalable Security Model Generation and Analysis Using k-importance Measures. SecureComm 2013: 270-287 - Jun Jiang, Meining Nie, Purui Su, Dengguo Feng:
VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing. SecureComm 2013: 122-139 - Mohammed Kaosar, Quazi Mamun, Md. Rafiqul Islam, Xun Yi:
(k - n) Oblivious Transfer Using Fully Homomorphic Encryption System. SecureComm 2013: 380-392 - Eirini D. Karapistoli, Anastasios A. Economides:
Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor Networks. SecureComm 2013: 1-18 - Miao Li, Liangsheng He, Tongjie Yang, Neng Gao, Zongbin Liu, Qinglong Zhang:
An Efficient Reconfigurable II-ONB Modular Multiplier. SecureComm 2013: 169-181 - Quazi Mamun, Md. Rafiqul Islam, Mohammed Kaosar:
Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs. SecureComm 2013: 367-379 - Md. Anwar Hossain Masud, Md. Rafiqul Islam, Jemal H. Abawajy:
Security Concerns and Remedy in a Cloud Based E-learning System. SecureComm 2013: 356-366 - Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li, Lynn Margaret Batten:
Contrasting Permission Patterns between Clean and Malicious Android Applications. SecureComm 2013: 69-85 - Mehari Msgna, Konstantinos Markantonakis, Keith Mayes:
The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems. SecureComm 2013: 288-304 - Yuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai:
Detection of Android API Call Using Logging Mechanism within Android Framework. SecureComm 2013: 393-404 - Aude Plateaux, Patrick Lacharme, Vincent Coquet, Sylvain Vernois, Kumar Murty, Christophe Rosenberger:
An e-payment Architecture Ensuring a High Level of Privacy Protection. SecureComm 2013: 305-322 - Xin Ruan, Chuan Yue, Haining Wang:
Unveiling Privacy Setting Breaches in Online Social Networks. SecureComm 2013: 323-341 - Vijay Varadharajan, Udaya Kiran Tupakula:
Integrated Security Architecture for Virtual Machines. SecureComm 2013: 140-153 - Fei Wang, Liusheng Huang, Zhili Chen, Haibo Miao, Wei Yang:
A Novel Web Tunnel Detection Method Based on Protocol Behaviors. SecureComm 2013: 234-251 - Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang, Dengguo Feng:
Automatic Polymorphic Exploit Generation for Software Vulnerabilities. SecureComm 2013: 216-233 - Mengjun Xie, Liang Hao, Kenji Yoshigoe, Jiang Bian:
CamTalk: A Bidirectional Light Communications Framework for Secure Communications on Smartphones. SecureComm 2013: 35-52 - Ting Zhou, Yaping Lin, Wei Zhang, Sheng Xiao, Jinguo Li:
Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks. SecureComm 2013: 19-34 - Tanveer A. Zia, Albert Y. Zomaya, Vijay Varadharajan, Zhuoqing Morley Mao:
Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 127, Springer 2013, ISBN 978-3-319-04282-4 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-04 03:00 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint