|
Conferences in DBLP
A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks. [Citation Graph (, )][DBLP]
Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion. [Citation Graph (, )][DBLP]
Throwing a MonkeyWrench into Web Attackers Plans. [Citation Graph (, )][DBLP]
Security in OpenSocial-Instrumented Social Networking Services. [Citation Graph (, )][DBLP]
Security for XML Data Binding. [Citation Graph (, )][DBLP]
Watermark Detection for Video Bookmarking Using Mobile Phone Camera. [Citation Graph (, )][DBLP]
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems. [Citation Graph (, )][DBLP]
Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking. [Citation Graph (, )][DBLP]
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis. [Citation Graph (, )][DBLP]
A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC). [Citation Graph (, )][DBLP]
Business and IT Continuity Benchmarking. [Citation Graph (, )][DBLP]
Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks. [Citation Graph (, )][DBLP]
SIP Proxies: New Reflectors in the Internet. [Citation Graph (, )][DBLP]
Analysis of Token and Ticket Based Mechanisms for Current VoIP Security Issues and Enhancement Proposal. [Citation Graph (, )][DBLP]
Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication. [Citation Graph (, )][DBLP]
Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction. [Citation Graph (, )][DBLP]
Privacy Preserving Key Generation for Iris Biometrics. [Citation Graph (, )][DBLP]
Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare. [Citation Graph (, )][DBLP]
Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption. [Citation Graph (, )][DBLP]
Detecting Hidden Encrypted Volumes. [Citation Graph (, )][DBLP]
Tor HTTP Usage and Information Leakage. [Citation Graph (, )][DBLP]
Secure Communication Using Identity Based Encryption. [Citation Graph (, )][DBLP]
Anonymous Client Authentication for Transport Layer Security. [Citation Graph (, )][DBLP]
|