|
Conferences in DBLP
Securing virtual machine monitors: what is needed? [Citation Graph (, )][DBLP]
Automatic discovery of botnet communities on large-scale communication networks. [Citation Graph (, )][DBLP]
Assured information sharing between trustworthy, semi-trustworthy and untrustworthy coalition partners. [Citation Graph (, )][DBLP]
Automating analysis of large-scale botnet probing events. [Citation Graph (, )][DBLP]
Towards complete node enumeration in a peer-to-peer botnet. [Citation Graph (, )][DBLP]
Efficient IRM enforcement of history-based access control policies. [Citation Graph (, )][DBLP]
Lightweight self-protecting JavaScript. [Citation Graph (, )][DBLP]
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. [Citation Graph (, )][DBLP]
A generic construction of useful client puzzles. [Citation Graph (, )][DBLP]
An integrated approach to detection of fast and slow scanning worms. [Citation Graph (, )][DBLP]
Authenticated wireless roaming via tunnels: making mobile guests feel at home. [Citation Graph (, )][DBLP]
On-board credentials with open provisioning. [Citation Graph (, )][DBLP]
Flexible muTPMs through disembedding. [Citation Graph (, )][DBLP]
A chipset level network backdoor: bypassing host-based firewall & IDS. [Citation Graph (, )][DBLP]
TimeVM: a framework for online intrusion mitigation and fast recovery using multi-time-lag traffic replay. [Citation Graph (, )][DBLP]
Universally composable contributory group key exchange. [Citation Graph (, )][DBLP]
Universal forgery of the identity-based sequential aggregate signature scheme. [Citation Graph (, )][DBLP]
Partnership in key exchange protocols. [Citation Graph (, )][DBLP]
Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary. [Citation Graph (, )][DBLP]
Formalizing information security knowledge. [Citation Graph (, )][DBLP]
Efficient zero-knowledge identification schemes which respect privacy. [Citation Graph (, )][DBLP]
Quantifying maximal loss of anonymity in protocols. [Citation Graph (, )][DBLP]
The union-split algorithm and cluster-based anonymization of social networks. [Citation Graph (, )][DBLP]
Hidden credential retrieval from a reusable password. [Citation Graph (, )][DBLP]
Expressive policy analysis with enhanced system dynamicity. [Citation Graph (, )][DBLP]
Semantic context aware security policy deployment. [Citation Graph (, )][DBLP]
PBES: a policy based encryption system with application to data sharing in the power grid. [Citation Graph (, )][DBLP]
Attribute based proxy re-encryption with delegating capabilities. [Citation Graph (, )][DBLP]
Confidentiality-preserving distributed proofs of conjunctive queries. [Citation Graph (, )][DBLP]
D-algebra for composing access control policy decisions. [Citation Graph (, )][DBLP]
Toward practical analysis for trust management policy. [Citation Graph (, )][DBLP]
Conditional proxy re-encryption secure against chosen-ciphertext attack. [Citation Graph (, )][DBLP]
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem. [Citation Graph (, )][DBLP]
Provably secure and efficient bounded ciphertext policy attribute based encryption. [Citation Graph (, )][DBLP]
A new hash family obtained by modifying the SHA-2 family. [Citation Graph (, )][DBLP]
Logging key assurance indicators in business processes. [Citation Graph (, )][DBLP]
Anonymous user communication for privacy protection in wireless metropolitan mesh networks. [Citation Graph (, )][DBLP]
Delegate predicate encryption and its application to anonymous authentication. [Citation Graph (, )][DBLP]
Improved searchable public key encryption with designated tester. [Citation Graph (, )][DBLP]
A note on Cook's elastic block cipher. [Citation Graph (, )][DBLP]
A conceptual framework for Group-Centric secure information sharing. [Citation Graph (, )][DBLP]
Intrusion response cost assessment methodology. [Citation Graph (, )][DBLP]
|