default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 19 matches
- 2016
- Leila Bahri, Barbara Carminati, Elena Ferrari, William Lucia:
LAMP - Label-Based Access-Control for More Privacy in Online Social Networks. WISTP 2016: 171-186 - Guillaume Barbu, Alberto Battistello:
Analysis of a Code-Based Countermeasure Against Side-Channel and Fault Attacks. WISTP 2016: 153-168 - Hervé Chabanne, Julien Keuffer, Roch Lescuyer:
Delegating Biometric Authentication with the Sumcheck Protocol. WISTP 2016: 236-244 - Madeline Cheah, Siraj A. Shaikh, Jeremy W. Bryans, Hoang Nga Nguyen:
Combining Third Party Components Securely in Automotive Systems. WISTP 2016: 262-269 - Ling Chen, Ting Yu, Rada Chirkova:
Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data. WISTP 2016: 187-203 - Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet:
Runtime Code Polymorphism as a Protection Against Side Channel Attacks. WISTP 2016: 136-152 - Fatma Al Maqbali, Chris J. Mitchell:
Password Generators: Old Ideas and New. WISTP 2016: 245-253 - Frank Morgner, Paul Bastian, Marc Fischlin:
Securing Transactions with the eIDAS Protocols. WISTP 2016: 3-18 - Jan Tobias Mühlberg, Sara Cleemput, Mustafa A. Mustafa, Jo Van Bulck, Bart Preneel, Frank Piessens:
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures. WISTP 2016: 53-69 - Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent:
Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY. WISTP 2016: 19-34 - Panagiotis Papadopoulos, Elias Athanasopoulos, Eleni Kosta, George Siganos, Angelos D. Keromytis, Evangelos P. Markatos:
Provable Network Activity for Protecting Users Against False Accusation. WISTP 2016: 254-261 - Leonardo Regano, Daniele Canavese, Cataldo Basile, Alessio Viticchié, Antonio Lioy:
Towards Automatic Risk Analysis and Mitigation of Software Applications. WISTP 2016: 120-135 - Ishai Rosenberg, Ehud Gudes:
Attacking and Defending Dynamic Analysis System-Calls Based IDS. WISTP 2016: 103-119 - Ahmad Sabouri:
The Effect of Semantic Elaboration on the Perceived Security and Privacy Risk of Privacy-ABCs - An Empirical Experiment. WISTP 2016: 223-235 - Peter Samarin, Alexander Skripnik, Kerstin Lemke-Rust:
Fault-Channel Watermarks. WISTP 2016: 204-219 - Vlasta Stavova, Vashek Matyas, Mike Just:
Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms. WISTP 2016: 35-50 - Kyriakos Stefanidis, Artemios G. Voyiatzis:
An HMM-Based Anomaly Detection Approach for SCADA Systems. WISTP 2016: 85-99 - Vassilios G. Vassilakis, Emmanouil Panaousis, Haralambos Mouratidis:
Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments. WISTP 2016: 70-84 - Sara Foresti, Javier López:
Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Lecture Notes in Computer Science 9895, Springer 2016, ISBN 978-3-319-45930-1 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-22 16:12 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint