The SCEAS System
Navigation Menu

Conferences in DBLP

Communications and Multimedia Security (cms)
2010 (conf/cms/2010)


  1. A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks. [Citation Graph (, )][DBLP]


  2. Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion. [Citation Graph (, )][DBLP]


  3. Throwing a MonkeyWrench into Web Attackers Plans. [Citation Graph (, )][DBLP]


  4. Security in OpenSocial-Instrumented Social Networking Services. [Citation Graph (, )][DBLP]


  5. Security for XML Data Binding. [Citation Graph (, )][DBLP]


  6. Watermark Detection for Video Bookmarking Using Mobile Phone Camera. [Citation Graph (, )][DBLP]


  7. Watermark-Based Authentication and Key Exchange in Teleconferencing Systems. [Citation Graph (, )][DBLP]


  8. Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking. [Citation Graph (, )][DBLP]


  9. Statistical Detection of Malicious PE-Executables for Fast Offline Analysis. [Citation Graph (, )][DBLP]


  10. A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC). [Citation Graph (, )][DBLP]


  11. Business and IT Continuity Benchmarking. [Citation Graph (, )][DBLP]


  12. Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks. [Citation Graph (, )][DBLP]


  13. SIP Proxies: New Reflectors in the Internet. [Citation Graph (, )][DBLP]


  14. Analysis of Token and Ticket Based Mechanisms for Current VoIP Security Issues and Enhancement Proposal. [Citation Graph (, )][DBLP]


  15. Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication. [Citation Graph (, )][DBLP]


  16. Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction. [Citation Graph (, )][DBLP]


  17. Privacy Preserving Key Generation for Iris Biometrics. [Citation Graph (, )][DBLP]


  18. Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare. [Citation Graph (, )][DBLP]


  19. Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption. [Citation Graph (, )][DBLP]


  20. Detecting Hidden Encrypted Volumes. [Citation Graph (, )][DBLP]


  21. Tor HTTP Usage and Information Leakage. [Citation Graph (, )][DBLP]


  22. Secure Communication Using Identity Based Encryption. [Citation Graph (, )][DBLP]


  23. Anonymous Client Authentication for Transport Layer Security. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002