|
Conferences in DBLP
(nordsec) 2009 (conf/nordsec/2009)
On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock Market. [Citation Graph (, )][DBLP]
Facilitating the Adoption of Tor by Focusing on a Promising Target Group. [Citation Graph (, )][DBLP]
A Parallelism-Based Approach to Network Anonymization. [Citation Graph (, )][DBLP]
Security Usability of Petname Systems. [Citation Graph (, )][DBLP]
An Analysis of Widget Security. [Citation Graph (, )][DBLP]
Trade-Offs in Cryptographic Implementations of Temporal Access Control. [Citation Graph (, )][DBLP]
Blunting Differential Attacks on PIN Processing APIs. [Citation Graph (, )][DBLP]
Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic. [Citation Graph (, )][DBLP]
An Improved Attack on TKIP. [Citation Graph (, )][DBLP]
ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System. [Citation Graph (, )][DBLP]
A Mechanism for Identity Delegation at Authentication Level. [Citation Graph (, )][DBLP]
Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services. [Citation Graph (, )][DBLP]
Towards True Random Number Generation in Mobile Environments. [Citation Graph (, )][DBLP]
Towards Modelling Information Security with Key-Challenge Petri Nets. [Citation Graph (, )][DBLP]
Security and Trust for the Norwegian E-Voting Pilot Project E-valg 2011. [Citation Graph (, )][DBLP]
Advanced SIM Capabilities Supporting Trust-Based Applications. [Citation Graph (, )][DBLP]
Towards Practical Enforcement Theories. [Citation Graph (, )][DBLP]
Security Analysis of AN.ON's Payment Scheme. [Citation Graph (, )][DBLP]
Formal Analysis of the Estonian Mobile-ID Protocol. [Citation Graph (, )][DBLP]
Generating In-Line Monitors for Rabin Automata. [Citation Graph (, )][DBLP]
|