Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 64 matches
- 2014
- Hassane Aissaoui-Mehrez, Pascal Urien, Guy Pujolle:
Framework Implementation Based on Grid of Smartcards to Authenticate Users and Virtual Machines. SECRYPT 2014: 285-290 - Lamine M. Aouad, Alejandro Mosquera, Slawomir Grzonkowski, Dylan Morss:
SMS Spam - A Holistic View. SECRYPT 2014: 221-228 - Frederik Armknecht, Vasily Mikhalev:
Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream Ciphers. SECRYPT 2014: 379-386 - Benjamin Aziz, Philippe Massonet, Christophe Ponsard:
A Formal Model for Forensic Storage Media Preparation Tools. SECRYPT 2014: 165-170 - Saikrishna Badrinarayanan, C. Pandu Rangan:
Pairing-free Single Round Certificateless and Identity Based Authenticated Key Exchange Protocols. SECRYPT 2014: 67-78 - Alessandro Barenghi, Gerardo Pelosi:
On the Security of Partially Masked Software Implementations. SECRYPT 2014: 492-499 - Maherzia Belaazi, Hanen Boussi Rahmouni, Adel Bouhoula:
Towards a Legislation Driven Framework for Access Control and Privacy Protection in Public Cloud. SECRYPT 2014: 463-468 - Sebastian Bittl:
Efficient Construction of Infinite Length Hash Chains with Perfect Forward Secrecy Using Two Independent Hash Functions. SECRYPT 2014: 213-220 - Ivona Brandic:
Democratization in Science and Technology through Cloud Computing. SECRYPT 2014: IS-7 - Francesco Buccafurri, Gianluca Lax:
A Novel Pseudo Random Number Generator Based on L'Ecuyer's Scheme. SECRYPT 2014: 321-328 - Ufuk Celikkan, Can Gelis:
NFC Based Mobile Single Sign-On Solution as a Chrome Extension. SECRYPT 2014: 337-343 - Jinyong Chang, Rui Xue:
KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited. SECRYPT 2014: 299-306 - Juan Camilo Corena, Anirban Basu, Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake:
A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques. SECRYPT 2014: 307-314 - Jean-François Couchot, Pierre-Cyrille Héam, Christophe Guyeux, Qianxue Wang, Jacques M. Bahi:
Pseudorandom Number Generators with Balanced Gray Codes. SECRYPT 2014: 469-475 - Damien Couroussé, Bruno Robisson, Jean-Louis Lanet, Thierno Barry, Hassan Noura, Philippe Jaillon, Philippe Lalevée:
COGITO: Code Polymorphism to Secure Devices. SECRYPT 2014: 451-456 - Nicolas T. Courtois, Pinar Emirdag, Daniel A. Nagy:
Could Bitcoin Transactions Be 100x Faster?. SECRYPT 2014: 426-431 - Nicolas T. Courtois, Theodosis Mourouzis, Guangyan Song, Pouyan Sepehrdad, Petr Susil:
Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon. SECRYPT 2014: 399-404 - Jordi Cucurull, Sandra Guasch, Alex Escala, Guillermo Navarro-Arribas, Víctor Acín:
QR Steganography - A Threat to New Generation Electronic Voting Systems. SECRYPT 2014: 484-491 - Mai Dahshan, Sherif Elkassas:
Framework for Securing Data in Cloud Storage Services. SECRYPT 2014: 267-274 - Rabiî Dariti, El Mamoun Souidi:
A Steganographic Protocol Based on Linear Error-Block Codes. SECRYPT 2014: 178-183 - Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini:
FORCE - Fully Off-line secuRe CrEdits for Mobile Micro Payments. SECRYPT 2014: 125-136 - Sandra Diaz-Santiago, Lil María Rodríguez-Henríquez, Debrup Chakraborty:
A Cryptographic Study of Tokenization Systems. SECRYPT 2014: 393-398 - Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini, Peter Y. A. Ryan:
Formal Analysis of Electronic Exams. SECRYPT 2014: 101-112 - Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
Privacy Preserving Delegated Word Search in the Cloud. SECRYPT 2014: 137-150 - Yehia Elrakaiby, Jun Pang:
Dynamic Analysis of Usage Control Policies. SECRYPT 2014: 88-100 - Adriana-Cristina Enache, Valentin Sgarciu:
Enhanced Intrusion Detection System Based on Bat Algorithm-support Vector Machine. SECRYPT 2014: 184-189 - Alberto Ferrante, Igor Kaitovic, Jelena Milosevic:
Modeling Requirements for Security-enhanced Design of Embedded Systems. SECRYPT 2014: 315-320 - Nirnay Ghosh, Triparna Mondal, Debangshu Chatterjee, Soumya K. Ghosh:
Verifying Conformance of Security Implementation with Organizational Access Policies in Community Cloud - A Formal Approach. SECRYPT 2014: 329-336 - Seymour E. Goodman:
A Need-based Assessment for Building a National Cyber Security Workforce. SECRYPT 2014: IS-5 - Vandana Guleria, Ratna Dutta:
Adaptive Oblivious Transfer with Hidden Access Policy Realizing Disjunction. SECRYPT 2014: 43-54
skipping 34 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-24 09:56 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint