default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 259 matches
- 2011
- Jemal H. Abawajy:
Establishing Trust in Hybrid Cloud Computing Environments. TrustCom 2011: 118-125 - Imad M. Abbadi, Muntaha Alawneh, Andrew P. Martin:
Secure Virtual Layer Management in Clouds. TrustCom 2011: 99-110 - Muhammad Bashir Abdullahi, Guojun Wang, Felix Musau:
A Reliable and Secure Distributed In-network Data Storage Scheme in Wireless Sensor Networks. TrustCom 2011: 548-555 - Mahbub Ahmed, Yang Xiang:
Trust Ticket Deployment: A Notion of a Data Owner's Trust in Cloud Computing. TrustCom 2011: 111-117 - Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Cross-Platform Application Sharing Mechanism. TrustCom 2011: 597-605 - Ahmed Al-Khazzar, Nick Savage:
Biometric Identification Using User Interactions with Virtual Worlds. TrustCom 2011: 517-524 - Muntaha Alawneh, Imad M. Abbadi:
Defining and Analyzing Insiders and Their Threats in Organizations. TrustCom 2011: 785-794 - Rehab Alnemr, Maxim Schnjakin, Christoph Meinel:
Towards Context-Aware Service-Oriented Semantic Reputation Framework. TrustCom 2011: 362-372 - Ankita Arora, Sri Parameswaran, Roshan G. Ragel, Darshana Jayasinghe:
A Hardware/Software Countermeasure and a Testing Framework for Cache Based Side Channel Attacks. TrustCom 2011: 1005-1014 - Mahdi Asadpour, Mohammad Torabi Dashti:
A Privacy-Friendly RFID Protocol Using Reusable Anonymous Tickets. TrustCom 2011: 206-213 - Kenichi Asami, Hayato Hagiwara, Mochimitsu Komori:
Visual Navigation System with Real-Time Image Processing for Patrol Service Robot. TrustCom 2011: 1229-1234 - Hüseyin Aysan, Radu Dobrin, Sasikumar Punnekkat, Rolf Johansson:
Probabilistic Schedulability Guarantees for Dependable Real-Time Systems under Error Bursts. TrustCom 2011: 1154-1163 - Ekain Azketa, Juan P. Uribe, Marga Marcos, Luís Almeida, J. Javier Gutiérrez:
Permutational Genetic Algorithm for the Optimized Assignment of Priorities to Tasks and Messages in Distributed Real-Time Systems. TrustCom 2011: 958-965 - Firas Bader, Andra Radoveneanu, Hani Ragab Hassen:
A New Security Architecture for BitTorrent. TrustCom 2011: 451-455 - Quan Bai, Xing Su, Qing Liu, Andrew Terhorst, Minjie Zhang, Yi Mu:
Case-Based Trust Evaluation from Provenance Information. TrustCom 2011: 336-343 - Helen Balinsky, Liqun Chen, Steven J. Simske:
Publicly Posted Composite Documents in Variably Ordered Workflows. TrustCom 2011: 631-638 - Helen Balinsky, Neil C. A. Moore, Steven J. Simske:
Intelligent Assistant for Context-Aware Policies. TrustCom 2011: 621-630 - Zorana Bankovic, José Manuel Moya, Juan Carlos Vallejo, David Fraga, Pedro Malagón:
Holistic Solution for Confining Insider Attacks in Wireless Sensor Networks Using Reputation Systems Coupled with Clustering Techniques. TrustCom 2011: 61-72 - Fatemeh Barani, Mahdi Abadi:
An ABC-AIS Hybrid Approach to Dynamic Anomaly Detection in AODV-Based MANETs. TrustCom 2011: 714-720 - Fahmi Bargui, Hanêne Ben-Abdallah, Jamel Feki:
A Decision Making Ontology Building Process for Analytical Requirements Elicitation. TrustCom 2011: 1529-1536 - Marc Barisch:
Design and Evaluation of an Architecture for Ubiquitous User Authentication Based on Identity Management Systems. TrustCom 2011: 863-872 - Hakem Beitollahi, Geert Deconinck:
A Cooperative Mechanism to Defense against Distributed Denial of Service Attacks. TrustCom 2011: 11-20 - Giampaolo Bella, Lizzie Coles-Kemp:
Internet Users' Security and Privacy While They Interact with Amazon. TrustCom 2011: 878-883 - Chaitanya Belwal, Albert M. K. Cheng:
Feasibility Interval for the Transactional Event Handlers of P-FRP. TrustCom 2011: 966-973 - Chaitanya Belwal, Albert M. K. Cheng:
A Sufficient Schedulability Test for Real-Time Software Transactional Memory. TrustCom 2011: 1060-1067 - Chaitanya Belwal, Albert M. K. Cheng:
Schedulability Analysis of Transactions in Software Transactional Memory Using Timed Automata. TrustCom 2011: 1091-1098 - Chaitanya Belwal, Albert M. K. Cheng, Walid Taha:
Release Offset Bounds for Response Time Analysis of P-FRP Using Exhaustive Enumeration. TrustCom 2011: 950-957 - Bhume Bhumiratana:
A Model for Automating Persistent Identity Clone in Online Social Network. TrustCom 2011: 681-686 - Muhammad Bilal, Pauline M. L. Chan:
A Game Theoretic Coalitional Bidding Scheme for Efficient Routing in Vehicular Ad Hoc Networks. TrustCom 2011: 1638-1645 - Andreas Bontozoglou, Kun Yang, Ken Guild:
Simulation Tools Enabling Research in Convergence of Fixed and Mobile Networks. TrustCom 2011: 1789-1794
skipping 229 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-26 15:05 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint