Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 36 matches
- 2012
- Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis:
Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 96, Springer 2012, ISBN 978-3-642-31908-2 [contents] - 2011
- Seyed Ali Ahmadzadeh, Gordon B. Agnew:
Behavioral Mimicry Covert Communication. SecureComm 2011: 134-153 - Saeed Al-Haj, Padmalochan Bera, Ehab Al-Shaer:
Build and Test Your Own Network Configuration. SecureComm 2011: 522-532 - Michael Beye, Thijs Veugen:
Anonymity for Key-Trees with Adaptive Adversaries. SecureComm 2011: 409-425 - Manuel Crotti, Diego Ferri, Francesco Gringoli, Manuel Peli, Luca Salgarelli:
PP2db: A Privacy-Preserving, P2P-Based Scalable Storage System for Mobile Networks. SecureComm 2011: 533-542 - Rinku Dewri:
Location Privacy and Attacker Knowledge: Who Are We Fighting against? SecureComm 2011: 96-115 - Akshay Dua, Nirupama Bulusu, Wu-chang Feng:
Privacy-Preserving Online Mixing of High Integrity Mobile Multi-user Data. SecureComm 2011: 470-479 - Hanjun Gao, Lina Wang, Wei Liu, Yang Peng, Hao Zhang:
Preventing Secret Data Leakage from Foreign Mappings in Virtual Machines. SecureComm 2011: 436-445 - Stephen Mark Glass, Vallipuram Muthukkumarasamy, Marius Portmann, Matthew Robert:
Insecurity in Public-Safety Communications: APCO Project 25. SecureComm 2011: 116-133 - Jin Han, Qiang Yan, Robert H. Deng, Debin Gao:
On Detection of Erratic Arguments. SecureComm 2011: 172-189 - Amir Herzberg, Haya Schulmann:
Unilateral Antidotes to DNS Poisoning. SecureComm 2011: 319-336 - Chowdhury Sayeed Hyder, Brendan Grebur, Li Xiao:
Defense against Spectrum Sensing Data Falsification Attacks in Cognitive Radio Networks. SecureComm 2011: 154-171 - Deguang Kong, Donghai Tian, Peng Liu, Dinghao Wu:
SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits. SecureComm 2011: 190-208 - Vojtech Krmicek, Jan Vykopal:
NetFlow Based Network Protection. SecureComm 2011: 543-546 - Harald Lampesberger, Philipp Winter, Markus Zeilinger, Eckehard Hermann:
An On-Line Learning Statistical Model to Detect Malicious Web Requests. SecureComm 2011: 19-38 - Meixing Le, Zhaohui Wang, Quan Jia, Angelos Stavrou, Anup K. Ghosh, Sushil Jajodia:
Trading Elephants for Ants: Efficient Post-attack Reconstitution. SecureComm 2011: 460-469 - Tieyan Li, Yingjiu Li, Guilin Wang:
Secure and Practical Key Distribution for RFID-Enabled Supply Chains. SecureComm 2011: 356-372 - Amiya Kumar Maji, Saurabh Bagchi:
v-CAPS: A Confidentiality and Anonymity Preserving Routing Protocol for Content-Based Publish-Subscribe Networks. SecureComm 2011: 281-302 - Sarbari Mitra, Ratna Dutta, Sourav Mukhopadhyay:
Towards a Deterministic Hierarchical Key Predistribution for WSN Using Complementary Fano Plane. SecureComm 2011: 373-388 - Gaspar Modelo-Howard, Jevin Sweval, Saurabh Bagchi:
Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems. SecureComm 2011: 39-58 - Wojciech Mostowski, Pim Vullers:
Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards. SecureComm 2011: 243-260 - Viet Pham, Tuomas Aura:
Security Analysis of Leap-of-Faith Protocols. SecureComm 2011: 337-355 - Thomas Plos, Martin Feldhofer:
Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID Tag. SecureComm 2011: 426-435 - Zhiyun Qian, Zhuoqing Morley Mao, Ammar Rayes, David Jaffe:
Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks. SecureComm 2011: 1-18 - Lie Qu, Guilin Wang, Yi Mu:
Optimistic Fair Exchange of Ring Signatures. SecureComm 2011: 227-242 - Cristina Romero-Tris, Jordi Castellà-Roca, Alexandre Viejo:
Multi-party Private Web Search with Untrusted Partners. SecureComm 2011: 261-280 - Hemant Sengar, Xinyuan Wang, Arthur Nichols:
Call Behavioral Analysis to Thwart SPIT Attacks on VoIP Networks. SecureComm 2011: 501-510 - Deepa Srinivasan, Xuxian Jiang:
Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots. SecureComm 2011: 209-226 - Chunyu Tang, David A. Naumann, Susanne Wetzel:
Symbolic Analysis for Security of Roaming Protocols in Mobile Networks - [Extended Abstract]. SecureComm 2011: 480-490 - Shimrit Tzur-David, Kiril Lashchiver, Danny Dolev, Tal Anker:
Delay Fast Packets (DFP): Prevention of DNS Cache Poisoning. SecureComm 2011: 303-318
skipping 6 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-18 00:26 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint