The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2007 (conf/ccs/2007csaw)

  1. Some thoughts on security after ten years of qmail 1.0. [Citation Graph (, )][DBLP]

  2. Yet another MicroArchitectural Attack: : exploiting I-Cache. [Citation Graph (, )][DBLP]

  3. A flexible security architecture to support third-party applications on mobile devices. [Citation Graph (, )][DBLP]

  4. Protecting users from "themselves". [Citation Graph (, )][DBLP]

  5. Analysis of three multilevel security architectures. [Citation Graph (, )][DBLP]

  6. Implementing middleware for content filtering and information flow control. [Citation Graph (, )][DBLP]

  7. Improving multi-tier security using redundant authentication. [Citation Graph (, )][DBLP]

  8. A data outsourcing architecture combining cryptography and access control. [Citation Graph (, )][DBLP]

  9. A cryptographic access control architecture secure against privileged attackers. [Citation Graph (, )][DBLP]

  10. Non-volatile memory and disks: avenues for policy architectures. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002