|
Conferences in DBLP
A Survey of Voice over IP Security Research. [Citation Graph (, )][DBLP]
Security for a Smarter Planet. [Citation Graph (, )][DBLP]
The WOMBAT Attack Attribution Method: Some Results. [Citation Graph (, )][DBLP]
Biometrics and Security. [Citation Graph (, )][DBLP]
Remote Electronic Voting with Revocable Anonymity. [Citation Graph (, )][DBLP]
On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals. [Citation Graph (, )][DBLP]
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. [Citation Graph (, )][DBLP]
Biometric Identification over Encrypted Data Made Feasible. [Citation Graph (, )][DBLP]
Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity. [Citation Graph (, )][DBLP]
Formal Verification of Security Policy Implementations in Enterprise Networks. [Citation Graph (, )][DBLP]
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles. [Citation Graph (, )][DBLP]
An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products. [Citation Graph (, )][DBLP]
DROP: Detecting Return-Oriented Programming Malicious Code. [Citation Graph (, )][DBLP]
A Framework for Behavior-Based Malware Analysis in the Cloud. [Citation Graph (, )][DBLP]
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs. [Citation Graph (, )][DBLP]
Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders. [Citation Graph (, )][DBLP]
Database Relation Watermarking Resilient against Secondary Watermarking Attacks. [Citation Graph (, )][DBLP]
A Robust Damage Assessment Model for Corrupted Database Systems. [Citation Graph (, )][DBLP]
A Generic Distortion Free Watermarking Technique for Relational Databases. [Citation Graph (, )][DBLP]
On Some Weaknesses in the Disk Encryption Schemes EME and EME2. [Citation Graph (, )][DBLP]
TWIS - A Lightweight Block Cipher. [Citation Graph (, )][DBLP]
Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking. [Citation Graph (, )][DBLP]
Method-Specific Java Access Control via RMI Proxy Objects Using Annotations. [Citation Graph (, )][DBLP]
Let Only the Right One IN: Privacy Management Scheme for Social Network. [Citation Graph (, )][DBLP]
Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper). [Citation Graph (, )][DBLP]
|