default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 30 matches
- 2019
- Meng Li, Liehuang Zhu, Xiaodong Lin:
CoRide: A Privacy-Preserving Collaborative-Ride Hailing Service Using Blockchain-Assisted Vehicular Fog Computing. SecureComm (2) 2019: 408-422 - Ali Al-Hashimi, Pratham Oza, Ryan M. Gerdes, Thidapat Chantem:
The Disbanding Attack: Exploiting Human-in-the-Loop Control in Vehicular Platooning. SecureComm (2) 2019: 163-183 - Marwan Ali Albahar, Xing Gao, Gaby G. Dagher, Daiping Liu, Fengwei Zhang, Jidong Xiao:
A Study of the Multiple Sign-in Feature in Web Applications. SecureComm (2) 2019: 440-453 - Raquel Alvarez, Jake Levenson, Ryan Sheatsley, Patrick D. McDaniel:
Application Transiency: Towards a Fair Trade of Personal Information for Application Services. SecureComm (2) 2019: 47-66 - Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles A. Kamhoua:
Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework. SecureComm (2) 2019: 205-223 - Alexandros Bakas, Antonis Michalas:
Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX. SecureComm (2) 2019: 472-486 - Yurong Chen, Tian Lan, Guru Venkataramani:
CustomPro: Network Protocol Customization Through Cross-Host Feature Analysis. SecureComm (2) 2019: 67-85 - Kun Du, Hao Yang, Zhou Li, Hai-Xin Duan, Shuang Hao, Baojun Liu, Yuxiao Ye, Mingxuan Liu, XiaoDong Su, Guang Liu, Zhifeng Geng, Zaifeng Zhang, Jinjin Liang:
TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams. SecureComm (2) 2019: 3-25 - Edona Fasllija, Hasan Ferit Eniser, Bernd Prünster:
Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency Logs. SecureComm (2) 2019: 320-334 - Jing Ge, An Wang, Liehuang Zhu, Xin Liu, Ning Shang, Guoshuang Zhang:
Power Analysis and Protection on SPECK and Its Application in IoT. SecureComm (2) 2019: 350-362 - Kai He, Liu Yang, Jue Hong, Jinghua Jiang, Jieming Wu, Xu Dong, Zhuxun Liang:
PrivC - A Framework for Efficient Secure Two-Party Computation. SecureComm (2) 2019: 394-407 - Jing Hou, Li Sun, Tao Shu, Husheng Li:
Target Information Trading - An Economic Perspective of Security. SecureComm (2) 2019: 126-145 - Keke Hu, Xiaohui Zhang, Yongming Wang:
Secrecy on a Gaussian Relay-Eavesdropper Channel with a Trusted Relay. SecureComm (2) 2019: 108-125 - Ryan Karl, Timothy Burchfield, Jonathan Takeshita, Taeho Jung:
Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks. SecureComm (2) 2019: 425-439 - Yunsen Lei, Craig A. Shue:
Detecting Root-Level Endpoint Sensor Compromises with Correlated Activity. SecureComm (2) 2019: 273-286 - Tian Liu, Tao Shu:
Adversarial False Data Injection Attack Against Nonlinear AC State Estimation with ANN in Smart Grid. SecureComm (2) 2019: 365-379 - Yu Liu, Matthew R. Squires, Curtis R. Taylor, Robert J. Walls, Craig A. Shue:
Account Lockouts: Characterizing and Preventing Account Denial-of-Service Attacks. SecureComm (2) 2019: 26-46 - Masoud Narouei, Hassan Takabi:
A Nature-Inspired Framework for Optimal Mining of Attribute-Based Access Control Policies. SecureComm (2) 2019: 489-506 - Ralph Palutke, Andreas Neubaum, Johannes Götzfried:
SEVGuard: Protecting User Mode Applications Using Secure Encrypted Virtualization. SecureComm (2) 2019: 224-242 - Montida Pattaranantakul, Qipeng Song, Yanmei Tian, Licheng Wang, Zonghua Zhang, Ahmed Meddahi:
Footprints: Ensuring Trusted Service Function Chaining in the World of SDN and NFV. SecureComm (2) 2019: 287-301 - Robert Podschwadt, Hassan Takabi:
On Effectiveness of Adversarial Examples and Defenses for Malware Classification. SecureComm (2) 2019: 380-393 - Yuzhe Richard Tang, Kai Li, Ju Chen:
Authenticated LSM Trees with Minimal Trust. SecureComm (2) 2019: 454-471 - Abhishek Tiwari, Sascha Groß, Christian Hammer:
IIFA: Modular Inter-app Intent Information Flow Analysis of Android Applications. SecureComm (2) 2019: 335-349 - Sharif Ullah, Sachin Shetty, Anup Nayak, Amin Hassanzadeh, Kamrul Hasan:
Cyber Threat Analysis Based on Characterizing Adversarial Behavior for Energy Delivery System. SecureComm (2) 2019: 146-160 - Xuetao Wei, Can Lu, Fatma Rana Ozcan, Ting Chen, Boyang Wang, Di Wu, Qiang Tang:
A Behavior-Aware Profiling of Smart Contracts. SecureComm (2) 2019: 245-258 - Xinying Wu, Yuan Ma, Jing Yang, Tianyu Chen, Jingqiang Lin:
On the Security of TRNGs Based on Multiple Ring Oscillators. SecureComm (2) 2019: 89-107 - Shengmin Xu, Yinghui Zhang, Yingjiu Li, Ximeng Liu, Guomin Yang:
Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy. SecureComm (2) 2019: 184-204 - Hongfa Xue, Yurong Chen, Guru Venkataramani, Tian Lan:
Hecate: Automated Customization of Program and Communication Features to Reduce Attack Surfaces. SecureComm (2) 2019: 305-319 - Feng Zhu, Peisong Shen, Chi Chen:
A Performance-Optimization Method for Reusable Fuzzy Extractor Based on Block Error Distribution of Iris Trait. SecureComm (2) 2019: 259-272 - Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, Aziz Mohaisen:
Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 305, Springer 2019, ISBN 978-3-030-37230-9 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-28 20:10 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint