Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 34 matches
- 2019
- Ahmed Abusnaina, Aminollah Khormali, DaeHun Nyang, Murat Yuksel, Aziz Mohaisen:
Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks. DSC 2019: 1-8 - Ahmad Alagil, Yao Liu:
Randomized Positioning DSSS with Message Shuffling for Anti-Jamming Wireless Communications. DSC 2019: 1-8 - Sultan Alasmari, Weichao Wang, Tuanfa Qin, Yu Wang:
Proof of Encryption: Enforcement of Security Service Level Agreement for Encryption Outsourcing. DSC 2019: 1-8 - Nasser Alsalami, Bingsheng Zhang:
Utilizing Public Blockchains for Censorship-Circumvention and IoT Communication. DSC 2019: 1-7 - Nasser Alsalami, Bingsheng Zhang:
SoK: A Systematic Study of Anonymity in Cryptocurrencies. DSC 2019: 1-9 - Samiran Bag, Feng Hao:
E2E Verifiable Electronic Voting System for Shareholders. DSC 2019: 1-8 - Xuhua Bao, Xiaokun Zhang, Jingqiang Lin, Dawei Chu, Qiongxiao Wang, Fengjun Li:
Towards the Trust-Enhancements of Single Sign-On Services. DSC 2019: 1-8 - Baicheng Chen, Kun Woo Cho, Chenhan Xu, Feng Lin, Zhanpeng Jin, Wenyao Xu:
Exploiting Mallows Distance to Quantify EEG Distribution for Personal Identification. DSC 2019: 1-8 - Guoxing Chen, Mengyuan Li, Fengwei Zhang, Yinqian Zhang:
Defeating Speculative-Execution Attacks on SGX with HyperRace. DSC 2019: 1-8 - Jinchun Choi, Ahmed Abusnaina, Afsah Anwar, An Wang, Songqing Chen, DaeHun Nyang, Aziz Mohaisen:
Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets. DSC 2019: 1-8 - Isabelle Choi, Qiyang Song, Kun Sun:
Federated-Cloud Based Deep Neural Networks with Privacy Preserving Image Filtering Techniques. DSC 2019: 1-8 - Tieming Geng, Hatim Alsuwat, Chin-Tser Huang, Csilla Farkas:
Securing Relational Database Storage with Attribute Association Aware Shuffling. DSC 2019: 1-8 - Tao Jiang, Xu Yuan:
Traceable Private Set Intersection in Cloud Computing. DSC 2019: 1-7 - Huy Quoc Le, Willy Susilo, Thanh Xuan Khuc, Minh Kim Bui, Dung Hoang Duong:
A Blind Signature from Module Latices. DSC 2019: 1-8 - Jiasheng Li, Zijian Zhang, Meng Li:
BanFEL: A Blockchain Based Smart Contract for Fair and Efficient Lottery Scheme. DSC 2019: 1-8 - Chun-Han Lin, Shan-Hsin Lee, Hsiu-Chuan Huang, Chi-Wei Wang, Chia-Wei Hsu, Shiuh-Pyng Shieh:
DT-Track: Using DNS-Timing Side Channel for Mobile User Tracking. DSC 2019: 1-8 - Xiuming Liu, Edith Cheuk-Han Ngai:
Gaussian Process Learning for Distributed Sensor Networks under False Data Injection Attacks. DSC 2019: 1-6 - Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Multi-Level Proactive Security Auditing for Clouds. DSC 2019: 1-8 - Majid Salehi, Danny Hughes, Bruno Crispo:
MicroGuard: Securing Bare-Metal Microcontrollers against Code-Reuse Attacks. DSC 2019: 1-8 - Jianfei Sun, Hu Xiong, Robert H. Deng, Yinghui Zhang, Ximeng Liu, Mingsheng Cao:
Lightweight Attribute-Based Keyword Search with Policy Protection for Cloud-Assisted IoT. DSC 2019: 1-8 - Le Tong, Jia Yu, Hanlin Zhang:
Secure Outsourcing Algorithm for Bilinear Pairings without Pre-Computation. DSC 2019: 1-7 - Baole Wei, Min Yu, Kai Chen, Jianguo Jiang:
Deep-BIF: Blind Image Forensics Based on Deep Learning. DSC 2019: 1-6 - Hao Wu, Zheng Qin, Xuejin Tian, Edward Sun, Fengyuan Xu, Sheng Zhong:
Broken Relationship of Mobile User Intentions and Permission Control of Shared System Resources. DSC 2019: 1-8 - Yongdong Wu, Jian Weng, Bo Qiu, Zhuo Wei, Fan Qian, Robert H. Deng:
Random Delay Attack and Its Applications on Load Frequency Control of Power Systems. DSC 2019: 1-8 - Mingli Wu, Tsz Hon Yuen:
Securely Perturb Big Data by using Inner Product. DSC 2019: 1-8 - Ya Xiao, Qingying Hao, Danfeng Daphne Yao:
Neural Cryptanalysis: Metrics, Methodology, and Applications in CPS Ciphers. DSC 2019: 1-8 - Shengmin Xu, Jiaming Yuan, Yingjiu Li, Ximeng Liu, Yinghui Zhang:
Super Payment Channel for Decentralized Cryptocurrencies. DSC 2019: 1-8 - Ziqi Yang:
Fidelity: Towards Measuring the Trustworthiness of Neural Network Classification. DSC 2019: 1-8 - Jing Yao, Helei Cui, Xiaolin Gui:
Secure Boolean Queries over Encrypted Data from Indistinguishability Obfuscation. DSC 2019: 1-8 - Xingliang Yuan, Chengjun Cai, Qian Wang, Qi Li:
Towards a Ledger-Assisted Architecture for Secure Query Processing over Distributed IoT Data. DSC 2019: 1-8
skipping 4 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 15:22 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint