|
Conferences in DBLP
Flexible and Transparent User Authentication for Mobile Devices. [Citation Graph (, )][DBLP]
Combining Authentication, Reputation and Classification to Make Phishing Unprofitable. [Citation Graph (, )][DBLP]
Audio CAPTCHA for SIP-Based VoIP. [Citation Graph (, )][DBLP]
Roving Bugnet: Distributed Surveillance Threat and Mitigation. [Citation Graph (, )][DBLP]
On Robust Covert Channels Inside DNS. [Citation Graph (, )][DBLP]
Discovering Application-Level Insider Attacks Using Symbolic Execution. [Citation Graph (, )][DBLP]
Custom JPEG Quantization for Improved Iris Recognition Accuracy. [Citation Graph (, )][DBLP]
On the IPP Properties of Reed-Solomon Codes. [Citation Graph (, )][DBLP]
A Generic Authentication LoA Derivation Model. [Citation Graph (, )][DBLP]
Media-Break Resistant eSignatures in eGovernment: An Austrian Experience. [Citation Graph (, )][DBLP]
How to Bootstrap Security for Ad-Hoc Network: Revisited. [Citation Graph (, )][DBLP]
Steganalysis of Hydan. [Citation Graph (, )][DBLP]
On the Impossibility of Detecting Virtual Machine Monitors. [Citation Graph (, )][DBLP]
Implementation of a Trusted Ticket System. [Citation Graph (, )][DBLP]
A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor. [Citation Graph (, )][DBLP]
A Policy Language for Modelling Recommendations. [Citation Graph (, )][DBLP]
On the Security Validation of Integrated Security Solutions. [Citation Graph (, )][DBLP]
Verification of Security Policy Enforcement in Enterprise Systems. [Citation Graph (, )][DBLP]
Optimization of the Controlled Evaluation of Closed Relational Queries. [Citation Graph (, )][DBLP]
Collaborative Privacy - A Community-Based Privacy Infrastructure. [Citation Graph (, )][DBLP]
Security and Privacy Improvements for the Belgian eID Technology. [Citation Graph (, )][DBLP]
A Structured Security Assessment Methodology for Manufacturers of Critical Infrastructure Components. [Citation Graph (, )][DBLP]
Mining Stable Roles in RBAC. [Citation Graph (, )][DBLP]
Privacy-Preserving Content-Based Publish/Subscribe Networks. [Citation Graph (, )][DBLP]
Broadcast Encryption for Differently Privileged. [Citation Graph (, )][DBLP]
Ontology-Based Secure XML Content Distribution. [Citation Graph (, )][DBLP]
NGBPA Next Generation BotNet Protocol Analysis. [Citation Graph (, )][DBLP]
Non-repudiation Analysis with LySa. [Citation Graph (, )][DBLP]
A Provably Secure Secret Handshake with Dynamic Controlled Matching. [Citation Graph (, )][DBLP]
Towards a Theory of White-Box Security. [Citation Graph (, )][DBLP]
On a Taxonomy of Delegation. [Citation Graph (, )][DBLP]
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios. [Citation Graph (, )][DBLP]
A Probabilistic Bound on the Basic Role Mining Problem and Its Applications. [Citation Graph (, )][DBLP]
Automating Access Control Logics in Simple Type Theory with LEO-II. [Citation Graph (, )][DBLP]
In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security. [Citation Graph (, )][DBLP]
Persona: Network Layer Anonymity and Accountability for Next Generation Internet. [Citation Graph (, )][DBLP]
Jason: A Scalable Reputation System for the Semantic Web. [Citation Graph (, )][DBLP]
Which Web Browsers Process SSL Certificates in a Standardized Way? [Citation Graph (, )][DBLP]
|