default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 43 matches
- 2014
- Rachit Adhvaryu, Nikunj Domadiya:
An Improved EMHS Algorithm for Privacy Preserving in Association Rule Mining on Horizontally Partitioned Database. SSCC 2014: 272-280 - L. Jani Anbarasi, Modigari Narendra, G. S. Anandha Mala:
Cheating Prevention Using Genetic Feature Based Key in Secret Sharing Schemes. SSCC 2014: 111-119 - Subhas Barman, Samiran Chattopadhyay, Debasis Samanta:
An Approach to Cryptographic Key Exchange Using Fingerprint. SSCC 2014: 162-172 - Ghanshyam S. Bopche, Babu M. Mehtre:
Attack Graph Generation, Visualization and Analysis: Issues and Challenges. SSCC 2014: 379-390 - Nilesh Chakraborty, Samrat Mondal:
Tag Digit Based Honeypot to Detect Shoulder Surfing Attack. SSCC 2014: 101-110 - Monika Darji, Bhushan H. Trivedi:
Detection of Active Attacks on Wireless IMDs Using Proxy Device and Localization Information. SSCC 2014: 353-362 - Ashok Kumar Das:
Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Networks. SSCC 2014: 1-9 - Suash Deb, Simon Fong, Sabu M. Thampi:
Framework of Lightweight Secure Media Transfer for Mobile Law Enforcement Apps. SSCC 2014: 211-220 - Jignesh C. Doshi, Maxwell Christian, Bhushan H. Trivedi:
SQL FILTER - SQL Injection Prevention and Logging Using Dynamic Network Filter. SSCC 2014: 400-406 - Arti Dwivedi, Ashok Kumar Mittal, Suneet Dwivedi:
Secure Communication Using Four-Wing Hyper-Chaotic Attractor. SSCC 2014: 281-290 - Kandaswamy Gokulnath, V. Rhymend Uthariaraj:
Fair-Trust Evaluation Approach (F-TEA) for Cloud Environment. SSCC 2014: 81-91 - Vijayendra Grampurohit, Vijay Kumar, Sanjay Rawat, Shatrunjay Rawat:
Category Based Malware Detection for Android. SSCC 2014: 239-249 - Ishu Jain, Rahul Johari, R. L. Ujjwal:
CAVEAT: Credit Card Vulnerability Exhibition and Authentication Tool. SSCC 2014: 391-399 - Harmeet Kaur Khanuja, Dattatraya S. Adane:
Forensic Analysis for Monitoring Database Transactions. SSCC 2014: 201-210 - Ravi Kishore Kodali:
A Mathematical Analysis of Elliptic Curve Point Multiplication. SSCC 2014: 192-200 - Abhishek Kolazi, Sudhish N. George, P. P. Deepthi:
PWLCM Based Secure Measurement Matrix Generation for Secure Video Compressive Sensing. SSCC 2014: 182-191 - Jeril Kuriakose, V. Amruth, A. G. Sandesh, V. Abhilash, G. Prasanna Kumar, K. Nithin:
A Review on Mobile Sensor Localization. SSCC 2014: 30-44 - Jitendra Lulla, Varsha Sharma:
Piracy Control Using Secure Disks. SSCC 2014: 417-430 - Richa Mahajan, Rahul Hans:
A Novel Comparison Based Approach for Fault Tolerance in Mobile Agent Systems. SSCC 2014: 221-229 - Satria Mandala, Kommineni Jenni, Md. Asri Ngadi, Maznah Kamat, Yahaya Coulibaly:
Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networks. SSCC 2014: 57-67 - Neenu Manmadhan, Hari Narayanan, Jayaraj Poroor, Krishnashree Achuthan:
Design for Prevention of Intranet Information Leakage via Emails. SSCC 2014: 136-148 - Mohit Miglani, Deepika Kukreja, Sanjay Kumar Dhurandher, B. V. Ramana Reddy:
Power Aware and Secure Dynamic Source Routing Protocol in Mobile Ad Hoc Networks. SSCC 2014: 45-56 - Pitchai MohanaPriya, V. Akilandeswari, G. Akilarasu, S. Mercy Shalinie:
An Integrated Approach of E-RED and ANT Classification Methods for DRDoS Attacks. SSCC 2014: 304-312 - Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks. SSCC 2014: 10-19 - Dileep Kumar Pattipati, Appala Naidu Tentu, V. Ch. Venkaiah:
Ideal and Computationally Perfect Secret Sharing Schemes for Generalized Access Structures. SSCC 2014: 149-161 - Digambar Povar, G. Geethakumari:
A Heuristic Model for Performing Digital Forensics in Cloud Computing Environment. SSCC 2014: 341-352 - Ivy Prathap, R. Anitha:
Watermark Detection in Spatial and Transform Domains Based on Tree Structured Wavelet Transform. SSCC 2014: 230-238 - Kanakkath Praveen, M. Sethumadhavan:
Results on (2, n) Visual Cryptographic Scheme. SSCC 2014: 335-340 - M. Priyadharshini, J. Yowan, R. Baskaran:
Security Enhancement in Web Services by Detecting and Correcting Anomalies in XACML Policies at Design Level. SSCC 2014: 120-135 - Vikash Kumar Rai, Arun Mishra:
Authentication of Trusted Platform Module Using Processor Response. SSCC 2014: 325-334
skipping 13 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-22 10:06 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint