|
Conferences in DBLP
Usage Control, Risk and Trust. [Citation Graph (, )][DBLP]
Attacking Image Recognition Captchas - A Naive but Effective Approach. [Citation Graph (, )][DBLP]
An Insider Threat Prediction Model. [Citation Graph (, )][DBLP]
A Call Conference Room Interception Attack and Its Detection. [Citation Graph (, )][DBLP]
Safe and Efficient Strategies for Updating Firewall Policies. [Citation Graph (, )][DBLP]
A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression. [Citation Graph (, )][DBLP]
Context-Aware Privacy Design Pattern Selection. [Citation Graph (, )][DBLP]
Real-Time Remote Attestation with Privacy Protection. [Citation Graph (, )][DBLP]
Private Searching on MapReduce. [Citation Graph (, )][DBLP]
In Search of Search Privacy. [Citation Graph (, )][DBLP]
Untraceability and Profiling Are Not Mutually Exclusive. [Citation Graph (, )][DBLP]
Privacy Policy Referencing. [Citation Graph (, )][DBLP]
Formal Proof of Cooperativeness in a Multi-Party P2P Content Authentication Protocol. [Citation Graph (, )][DBLP]
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation. [Citation Graph (, )][DBLP]
An Agent Based Back-End RFID Tag Management System. [Citation Graph (, )][DBLP]
Assessing the Usability of End-User Security Software. [Citation Graph (, )][DBLP]
Building ISMS through the Reuse of Knowledge. [Citation Graph (, )][DBLP]
Mechanizing Social Trust-Aware Recommenders with T-Index Augmented Trustworthiness. [Citation Graph (, )][DBLP]
Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution. [Citation Graph (, )][DBLP]
Analyzing Information Security Awareness through Networks of Association. [Citation Graph (, )][DBLP]
Efficiency Improvement of Homomorphic E-Auction. [Citation Graph (, )][DBLP]
|