Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 52 matches
- 2008
- André Adelsbach, Ulrich Greveler:
ANOCAST: Rethinking Broadcast Anonymity in the Case of Wireless Communication. Sicherheit 2008: 71-84 - Ammar Alkassar, Utz Gnaida, Thomas Quirin:
MoTrust-TCG: Manipulationsschutz für mobile Signaturanwendungen mittels "Trusted Computing". Sicherheit 2008: 575-580 - Peter Backs, Norbert Pohlmann:
Einfluss von Sicherungsmaßnahmen auf die Übertragungsqualität von VoIP. Sicherheit 2008: 563-568 - Michael Becher, Felix C. Freiling:
Towards Dynamic Malware Analysis to Increase Mobile Device Security423. Sicherheit 2008: 423-433 - Frank van der Beek, Martin Mink:
Wie lernt man IT-Sicherheit am besten? Eine empirische Studie. Sicherheit 2008: 499-511 - Johannes Buchmann, Martin Döring, Richard Lindner:
Efficiency Improvement for NTRU. Sicherheit 2008: 163-178 - Christoph Busch, Alexander Nouak:
3-D-Gesichtserkennung für die unbeaufsichtigte Grenzkontrolle. Sicherheit 2008: 249-261 - Christian J. Dietrich, Christian Rossow:
Empirische Untersuchung von IP-Blacklists. Sicherheit 2008: 545-549 - Peter Ebinger, Martin Sommer:
Using Localization Information for Attack Detection in Mobile Ad hoc Networks. Sicherheit 2008: 395-406 - Jan Eichholz, Detlef Hühnlein:
Using ISO/IEC 24727 for Mobile Devices. Sicherheit 2008: 581-587 - Hannes Federrath, Wolfgang Pöppel:
Detektion von anonym abgerufenen rechtswidrigen Inhalten mit einem hashwertbasierten Datenscanner. Sicherheit 2008: 59-70 - Felix C. Freiling, Jens Liebchen:
Iterative Kompromittierungsgraphverfeinerung als methodische Grundlage für Netzwerkpenetrationstests. Sicherheit 2008: 435-447 - Lothar Fritsch, Habtamu Abie:
Towards a Research Road Map for the Management of Privacy Risks in Information Systems. Sicherheit 2008: 1-15 - Wilfried N. Gansterer, Michael Ilger:
Towards Self-Learning and Fully Transparent UCE Prevention. Sicherheit 2008: 277-290 - Max Gebhardt, Georg Illies, Werner Schindler:
On an Approach to Compute (at least Almost) Exact Probabilities for Differentia Hash Collision Paths. Sicherheit 2008: 111-125 - Peer Heinlein:
Rechtliche Aspekte der Spamfilterung für Unternehmen und Administratoren. Sicherheit 2008: 539-544 - Sibylle Hick, Luigi Lo Iacono:
Elliptic Curve Cryptography in x.509-based PKI. Sicherheit 2008: 137-147 - Thomas Hildmann, Odej Kao, Christopher Ritter:
eXtreme Role Engineering: Ein neuer Ansatz zur Rechtedefinition und -vergabe. Sicherheit 2008: 569-573 - Tobias Hoppe, Jana Dittmann:
Vortäuschen von Komponentenfunktionalität im Automobil: Safety- und Komfort-Implikationen durch Security-Verletzungen am Beispiel des Airbags. Sicherheit 2008: 341-353 - Ali Ikinci, Thorsten Holz, Felix C. Freiling:
Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients. Sicherheit 2008: 407-421 - Tibor Jager, Heiko Jäkel, Jörg Schwenk:
Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS. Sicherheit 2008: 127-136 - Marko Jahnke, Christian Thul, Peter Martini:
Comparison and Improvement of Metrics for Selecting Intrusion Response Measures against DoS Attacks. Sicherheit 2008: 381-393 - Dogan Kesdogan, Dang Vinh Pham, Lexi Pimenidis:
Analyse der Verkettbarkeit in nutzergesteuerten Identitätsmanagementsystemen. Sicherheit 2008: 17-30 - Ulrike Korte, Michael Krawczak, Johannes Merkle, Rainer Plaga, Matthias Niesing, Carsten Tiemann, A. J. Han Vinck, Ulrich Martini:
A Cryptographic Biometric Authentication System based on Genetic Fingerprints. Sicherheit 2008: 263-276 - Ulrich Kühn, Andrei Pyshkin, Erik Tews, Ralf-Philipp Weinmann:
Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures. Sicherheit 2008: 97-109 - Lutz Lowis, Sebastian Höhn, Maike Gilliot:
Vulnerability Effect Propagation in Service-Oriented Archtectures. Sicherheit 2008: 473-484 - Andrey Makrushin, Jana Dittmann, Stefan Kiltz, Tobias Hoppe:
Exemplarische Mensch-Maschine-Interaktionsszenarien und deren Komfort-, Safety- und Security-Implikationen am Beispiel von Gesicht und Sprache. Sicherheit 2008: 315-327 - Tina Mattes, Frank Schiller, Jörg Pfahler, Annemarie Mörwald, Thomas Honold:
Nachweis der Güte von Kombinationen des CRC. Sicherheit 2008: 355-366 - Martin Meints, Marit Hansen:
Der ePass - eine Sicherheits-und Datenschutzanalyse. Sicherheit 2008: 31-43 - Horst Miedl, Josef Märtz:
Qualifizierung integrierter Werkzeugumgebungen für die Erstellung sicherheitsrelevanter Software in Kernkraftwerken. Sicherheit 2008: 589-593
skipping 22 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-11 05:08 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint