|
Conferences in DBLP
How to Steal a Botnet and What Can Happen When You Do. [Citation Graph (, )][DBLP]
A User-Mode-Kernel-Mode Co-operative Architecture for Trustable Computing. [Citation Graph (, )][DBLP]
Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform. [Citation Graph (, )][DBLP]
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher. [Citation Graph (, )][DBLP]
The rakaposhi Stream Cipher. [Citation Graph (, )][DBLP]
Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes. [Citation Graph (, )][DBLP]
Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems. [Citation Graph (, )][DBLP]
Online/Offline Ring Signature Scheme. [Citation Graph (, )][DBLP]
Policy-Controlled Signatures. [Citation Graph (, )][DBLP]
Public Key Encryption without Random Oracle Made Truly Practical. [Citation Graph (, )][DBLP]
A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate. [Citation Graph (, )][DBLP]
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains. [Citation Graph (, )][DBLP]
Biometric-Based Non-transferable Anonymous Credentials. [Citation Graph (, )][DBLP]
Secure Remote Execution of Sequential Computations. [Citation Graph (, )][DBLP]
Architecture- and OS-Independent Binary-Level Dynamic Test Generation. [Citation Graph (, )][DBLP]
Measuring Information Flow in Reactive Processes. [Citation Graph (, )][DBLP]
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model. [Citation Graph (, )][DBLP]
Denial-of-Service Attacks on Host-Based Generic Unpackers. [Citation Graph (, )][DBLP]
Predictive Pattern Matching for Scalable Network Intrusion Detection. [Citation Graph (, )][DBLP]
Deterministic Finite Automata Characterization for Memory-Based Pattern Matching. [Citation Graph (, )][DBLP]
A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold. [Citation Graph (, )][DBLP]
User-Assisted Host-Based Detection of Outbound Malware Traffic. [Citation Graph (, )][DBLP]
Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence. [Citation Graph (, )][DBLP]
Using the (Open) Solaris Service Management Facility as a Building Block for System Security. [Citation Graph (, )][DBLP]
IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program. [Citation Graph (, )][DBLP]
A Comparative Study of Privacy Mechanisms and a Novel Privacy Mechanism [Short Paper]. [Citation Graph (, )][DBLP]
Collusion-Resistant Protocol for Privacy-Preserving Distributed Association Rules Mining. [Citation Graph (, )][DBLP]
GUC-Secure Join Operator in Distributed Relational Database. [Citation Graph (, )][DBLP]
TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics. [Citation Graph (, )][DBLP]
Bring Efficient Connotation Expressible Policies to Trust Management. [Citation Graph (, )][DBLP]
A User Trust-Based Collaborative Filtering Recommendation Algorithm. [Citation Graph (, )][DBLP]
Fingerprinting Attack on the Tor Anonymity System. [Citation Graph (, )][DBLP]
Proactive Verifiable Linear Integer Secret Sharing Scheme. [Citation Graph (, )][DBLP]
A Multi-stage Secret Sharing Scheme Using All-or-Nothing Transform Approach. [Citation Graph (, )][DBLP]
Digital Audio Watermarking Technique Using Pseudo-Zernike Moments. [Citation Graph (, )][DBLP]
An Image Sanitizing Scheme Using Digital Watermarking. [Citation Graph (, )][DBLP]
Adaptive and Composable Oblivious Transfer Protocols (Short Paper). [Citation Graph (, )][DBLP]
Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation. [Citation Graph (, )][DBLP]
|