|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 14395 occurrences of 3839 keywords
|
|
|
Results
Found 52511 publication records. Showing 52511 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
61 | Di Ma, Gene Tsudik |
A new approach to secure logging. |
ACM Trans. Storage |
2009 |
DBLP DOI BibTeX RDF |
Secure logging, forward secure sequential aggregate (FssAgg) authentication, forward-secure stream integrity, MACs, signatures, truncation attack |
53 | Guang-Huei Chiou, Wen-Tsuen Chen |
Secure Broadcasting Using the Secure Lock. |
IEEE Trans. Software Eng. |
1989 |
DBLP DOI BibTeX RDF |
secure broadcasting protocols, secret key minimization, secure broadcasting, secure lock, deciphering operation, private-key cryptosystem, cryptography, protocols, broadcasting, public-key cryptosystem, Chinese Remainder theorem, satellite, telecommunication channels, session key, radio, broadcast channels, secret keys, ciphertext |
48 | Sungwoo Tak, Eun Kyo Park |
A Software Framework for Non-Repudiation Service based on Adaptive Secure Methodology in Electronic Commerce. |
Inf. Syst. Frontiers |
2004 |
DBLP DOI BibTeX RDF |
security software framework, electronic commerce (e-commerce), adaptive secure methodology, non-repudiation |
45 | Zhenyu Hu, JianChun Jiang, Fuchun Sun 0001 |
Using IND-CVA for constructing secure communication. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
integrity, authenticated encryption, semantic security, universally composable security, secure channel |
45 | Di Ma, Gene Tsudik |
A New Approach to Secure Logging. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
secure logging, forward secure stream integrity, MACs, signatures, truncation attack |
45 | Panagiotis Papadimitratos, Zygmunt J. Haas |
Secure data transmission in mobile ad hoc networks. |
Workshop on Wireless Security |
2003 |
DBLP DOI BibTeX RDF |
MANET security, secure message transmission, secure routing, multi-path routing, secure routing protocol |
45 | Thomas F. Keefe, Wei-Tek Tsai |
A multiversion transaction scheduler for centralized multilevel secure database systems. |
HASE |
1996 |
DBLP DOI BibTeX RDF |
multiversion transaction scheduler, centralized multilevel secure database systems, multilevel secure database management systems, MLS/DBMSs, secure multiversion scheduling protocol, serializable schedules, MLS noninterference assertions, timestamp generation, concurrency, concurrency control, transactions, correctness, contention, failure, covert channels, data access, abstract model, concurrent execution, multiple versions |
44 | Peishun Wang, Huaxiong Wang, Josef Pieprzyk |
Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data. |
Secure Data Management |
2007 |
DBLP DOI BibTeX RDF |
Common secure index, Paillier’s cryptosystem, search on encrypted data |
42 | Dong-Hong Xu, Yong Qi, Di Hou, Gong-Zhen Wang, Ying Chen 0004 |
An Improved Calculus for Secure Dynamic Services Composition. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
Global calculus, Web services composition, Orchestration, Choreography, Spi calculus |
41 | Jae-Deok Lim, Joon-Suk Yu, Jeong-Nyeo Kim |
A study of the method of providing secure network channel among secure OSs. |
ISICT |
2003 |
DBLP DOI BibTeX RDF |
|
39 | Soumyadeb Mitra, Marianne Winslett |
Secure deletion from inverted indexes on compliance storage. |
StorageSS |
2006 |
DBLP DOI BibTeX RDF |
secure deletion, inverted index, regulatory compliance |
39 | Vu Dong Tô, Reihaneh Safavi-Naini, Yejing Wang |
A 2-Secure Code with Efficient Tracing Algorithm. |
INDOCRYPT |
2002 |
DBLP DOI BibTeX RDF |
frameproof codes, secure codes, secure frameproof codes, traceability codes, fingerprinting codes |
39 | Rohit Valia, Yahya Y. Al-Salqan |
Secure Workflow Environment. |
WETICE |
1997 |
DBLP DOI BibTeX RDF |
administrative data processing, secure workflow environment, workflow management products, geographical distribution, platform-independent environment, group-oriented virtual private network, write once, run anywhere paradigm, Internet, heterogeneity, portability, public-key encryption, future, Java language, Secure Sockets Layer |
39 | Mark Moriconi, Xiaolei Qian, Robert A. Riemenschneider, Li Gong |
Secure Software Architectures. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
secure software architectures, open architectural standards, competitive success, secure system design, X/Open distributed transaction processing reference architecture, secure access control, Bell-LaPadula model, formal methods, authorisation, security properties, computer industry |
37 | Manjinder Singh, Sarabjit Singh |
Network Security (Security in Large Networks). |
LCN |
2000 |
DBLP DOI BibTeX RDF |
secure broadcasting, secure communication channel, legal receiving principals, secure broadcasting protocol, broadcast packet size, cryptography, cryptography, protocols, network security, broadcasting, computer networks, computer networks, packet switching, telecommunication security, decrypting, large networks, packet transmission, encryption algorithm |
36 | Shafi Goldwasser, Yehuda Lindell |
Secure Multi-Party Computation without Agreement. |
J. Cryptol. |
2005 |
DBLP DOI BibTeX RDF |
Broadcast, Secure multi-party computation, Protocol composition |
36 | Stephen S. Yau, Xinyu Zhang |
A Middleware Service for Secure Group Communication in Mobile Ad Hoc Networks. |
COMPSAC |
2003 |
DBLP DOI BibTeX RDF |
context-sensitive middleware, ubiquitous computing, mobile ad hoc networks, distributed applications, Secure group communication, middleware service |
36 | Shailesh Vaya |
Brief announcement: realizing secure multiparty computation on incomplete networks. |
PODC |
2010 |
DBLP DOI BibTeX RDF |
almost everywhere secure computation, hybrid argument, simulation paradigm, unconditional secure multiparty computation |
36 | Yuan Tian 0036, Hao Zhang |
GUC-Secure Set-Intersection Computation. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
Secure Set-Intersection Computation, Anonymous Identity-based Encryption, Generalized Universally Composable Security, Secure Multiparty Computation |
36 | Christopher Dilloway, Gavin Lowe |
Specifying Secure Transport Channels. |
CSF |
2008 |
DBLP DOI BibTeX RDF |
Confidentiality and authentication, Secure transport layers, Specification, Security protocols, Secure channels |
36 | Jaideep Vaidya, Chris Clifton |
Leveraging the "Multi" in secure multi-party computation. |
WPES |
2003 |
DBLP DOI BibTeX RDF |
secure distributed computation, privacy, secure multi-party computation |
36 | Lakshminath R. Dondeti, Sarit Mukherjee, Ashok Samal |
DISEC: A Distributed Framework for Scalable Secure Many-to-Many Communication. |
ISCC |
2000 |
DBLP DOI BibTeX RDF |
distributed group key management, many-to-many secure multicasting, secure group communication, Multicast security |
36 | Christian Labonté, Sampalli Srinivas |
Group Management Strategies for Secure Multicasting on Active Virtual Private Networks. |
LCN |
2000 |
DBLP DOI BibTeX RDF |
multicast group management, active virtual private networks, message integrity, message privacy, Secure Active VPN Environment, SAVE project, Dalhousie University, authentication, cryptography, cryptography, multicasting, transport protocols, network architecture, multicast communication, message authentication, IP multicast, telecommunication networks, telecommunication security, secure multicasting, business communication, telecommunication network management |
36 | Sarvar Patel |
Number Theoretic Attacks on Secure Password Schemes. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
number theoretic attacks, secure password schemes, Encrypted Key Exchange, EKE, authenticated information exchange, insecure network, secret key cryptography, randomized confounders, RSA version, half encrypted versions, Direct Authentication Protocol, Secret Public Key Protocol versions, secure protocols, message authentication, dictionary attacks, active attacks, password guessing attacks |
35 | Navdeep Kaur, Rajwinder Singh, Anil Kumar Sarje, Manoj Misra |
Performance Evaluation of Secure Concurrency Control Algorithm for Multilevel Secure Distributed Database Systems. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
Distributed database, concurrency control, covert channel, multilevel secure database system |
34 | Simon N. Foley |
Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
secure canonical upgrade policies, multilevel secure object stores, multilevel relabel policies, high-level subjects, low-level security labels, message filter model, object-oriented database, security of data |
34 | Leon Pan, Chang N. Zhang |
A criterion-based multilayer access control approach for multimedia applications and the implementation considerations. |
ACM Trans. Multim. Comput. Commun. Appl. |
2008 |
DBLP DOI BibTeX RDF |
Multilayer access control, secure object, secure permission, secure user, security criterion |
33 | Danny Harnik, Yuval Ishai, Eyal Kushilevitz, Jesper Buus Nielsen |
OT-Combiners via Secure Computation. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Vijay Sundaresan, Srividhya Rammohan, Ranga Vemuri |
Power invariant secure IC design methodology using reduced complementary dynamic and differential logic. |
VLSI-SoC |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Jin Li 0002, Yuen-Yan Chan, Yanming Wang |
A Generic Construction of Secure Signatures Without Random Oracles. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
Weak Chosen Message Attack, Signature, Standard Model |
33 | Lan Ma, Zhijun Wu 0001, Yun Hu, Wei Yang |
An Information-Hiding Model for Secure Communication. |
ICIC (1) |
2007 |
DBLP DOI BibTeX RDF |
Information hiding model, Security, Steganography, Speech, Secure communication |
33 | Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang |
Secure information sharing enabled by Trusted Computing and PEI models. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
PEI models, secure information sharing, access control, authorization, trusted computing, security framework |
33 | Mohammed Assora, Ayoub Shirvani |
Enhancing the Security and Efficiency of 3-D Secure. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
3-D Secure, password based authentication and key exchange, online transaction security, SSL/TLS |
33 | Luciano Bononi, Carlo Tacconi |
A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
Secure Clustering and Routing, Statistically Unique and Cryptographically Verifiable Identifiers, Mobile Ad Hoc Networks, Intrusion Detection System |
33 | Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin |
On 2-Round Secure Multiparty Computation. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
lower bounds, Secure multiparty computation, round complexity |
33 | Hirofumi Muratani |
A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience. |
Information Hiding |
2001 |
DBLP DOI BibTeX RDF |
c-secure code, digital watermarking, fingerprinting, error correction, Chinese Remainder Theorem, collusion attack |
33 | Aris Zakinthinos, E. Stewart Lee |
How and why feedback composition fails [secure systems]. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
feedback composition, generalized noninterference, secure components, n-forward correctability, system designer, security of data, composability, necessary and sufficient conditions, restrictiveness |
33 | Martin S. Olivier, Sebastiaan H. von Solms |
A Taxonomy for Secure Object-Oriented Databases. |
ACM Trans. Database Syst. |
1994 |
DBLP DOI BibTeX RDF |
multilevel secure databases, object-orientation, information security, formal security models |
33 | Mohammad Hossain Heydari, Linda Morales, Ivan Hal Sudborough |
Efficient Algorithms for Batch Re-Keying Operations in Secure Multicast. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
secure multicast re-keying multicasting, tree-based system, re-key complexity, batch re-keying, security, group key management, Secure multicast |
33 | M. V. N. Ashwin Kumar, Pranava R. Goundan, K. Srinathan, C. Pandu Rangan |
On perfectly secure cmmunication over arbitrary networks. |
PODC |
2002 |
DBLP DOI BibTeX RDF |
adversary structures, secure communication, information-theoretic security, secure multiparty computation |
33 | Ioannis Ioannidis, Ananth Grama, Mikhail J. Atallah |
A Secure Protocol for Computing Dot-Products in Clustered and Distributed Environments. |
ICPP |
2002 |
DBLP DOI BibTeX RDF |
Secure dot-products, Application-level security protocols, Distributed secure computations |
33 | Kuen-Pin Wu, Shanq-Jang Ruan, Feipei Lai, Chih-Kuang Tseng |
On Key Distribution in Secure Multicasting. |
LCN |
2000 |
DBLP DOI BibTeX RDF |
video-conferencing systems, authorized recipients, message encryption, secure filter, cryptography, distributed processing, key distribution, teleconferencing, multicast communication, distributed environment, telecommunication security, secure multicasting, group key, pay per view |
33 | Lakshminath R. Dondeti, Ashok Samal, Sarit Mukherjee |
A Dual Encryption Protocol for Scalable Secure Multicasting. |
ISCC |
1999 |
DBLP DOI BibTeX RDF |
Scalable Key Distribution Dual Encryption, Secure Group Communication, Secure Multicasting |
33 | P. Venkat Rangan |
Trust Requirements and Performance of a Fast Subtransprot-Level Protocol for Secure Communication. |
IEEE Trans. Software Eng. |
1993 |
DBLP DOI BibTeX RDF |
trust requirements, fast subtransport-level protocol, authenticated datagram protocol, host-to-host secure channels, agent-to-agent channels, average latency, performance, protocols, data integrity, Ethernet, security of data, secure communication, Sun workstations, maximum throughput |
33 | Abdessamad Imine, Asma Cherif 0001, Michaël Rusinowitch |
A Flexible Access Control Model for Distributed Collaborative Editors. |
Secure Data Management |
2009 |
DBLP DOI BibTeX RDF |
Secure Data Management, Authorization and Access Control, Collaborative Editing Systems |
33 | Yuval Ishai, Eyal Kushilevitz |
Randomizing Polynomials: A New Representation with Applications to Round-Efficient Secure Computation. |
FOCS |
2000 |
DBLP DOI BibTeX RDF |
randomizing polynomials, round-efficient secure computation, natural representation, degree-3 polynomials, round-efficient secure protocols, protocols, probability, Boolean functions, Boolean functions, communication complexity, communication complexity, polynomials, secure multi-party computation, branching program, low-degree polynomials |
32 | Kihong Kim, Jinkeun Hong, Jongin Lim 0001 |
A Secure and Efficient Communication Resume Protocol for Secure Wireless Networks. |
DAIS |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Qi Mi, John A. Stankovic, Radu Stoleru |
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks. |
WISEC |
2010 |
DBLP DOI BibTeX RDF |
wireless sensor networks, key distribution, secure localization |
31 | Zhenchao Zhu, Yuqing Zhang, Fengjiao Wang |
The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
provably secure, signcryption, Identity based cryptography |
31 | Mohamed Shehab, Elisa Bertino, Arif Ghafoor |
SERAT: SEcure role mApping technique for decentralized secure interoperability. |
SACMAT |
2005 |
DBLP DOI BibTeX RDF |
decentralized secure interoperability, path discovery, collaboration, role based access control, access path |
31 | Ragib Hasan, Marianne Winslett, Radu Sion |
Requirements of Secure Storage Systems for Healthcare Records. |
Secure Data Management |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Kari Kostiainen, Jan-Erik Ekberg, N. Asokan, Aarne Rantala |
On-board credentials with open provisioning. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
provisioning protocols, trusted computing, credentials, secure hardware |
31 | Payman Mohassel, Matthew K. Franklin |
Efficiency Tradeoffs for Malicious Two-Party Computation. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Yao’s garbled circuit, malicious adversary, secure two-party computation, secure function evaluation |
30 | Christoph Lucas, Dominik Raub, Ueli M. Maurer |
Hybrid-secure MPC: trading information-theoretic robustness for computational privacy. |
PODC |
2010 |
DBLP DOI BibTeX RDF |
hybrid security, party emulation, computational security, information-theoretic security, universal composability, multi-party computation |
30 | N. R. Sunitha, B. B. Amberker |
Forward-Secure Multi-signatures. |
ICDCIT |
2008 |
DBLP DOI BibTeX RDF |
Serial multi-signature, Parallel multi-signature, Digital Signature, Forward-Security, e-banking, ElGamal Signatures |
30 | Hao Chen 0095, Ronald Cramer, Shafi Goldwasser, Robbert de Haan, Vinod Vaikuntanathan |
Secure Computation from Random Error Correcting Codes. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin |
The round complexity of verifiable secret sharing and secure multicast. |
STOC |
2001 |
DBLP DOI BibTeX RDF |
|
30 | Jan-Erik Ekberg, N. Asokan, Kari Kostiainen, Aarne Rantala |
Scheduling execution of credentials in constrained secure environments. |
STC |
2008 |
DBLP DOI BibTeX RDF |
onboard credentials, secure execution environments, trusted hardware, scheduling |
30 | R. Aparna, B. B. Amberker |
Authenticated Secure Group Communication using Broadcast Encryption Key Computation. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Threshold, Broadcast encryption, Secure Group Communication, Secret key |
30 | Hanping Lufei, Weisong Shi, Vipin Chaudhary |
Adaptive Secure Access to Remote Services. |
IEEE SCC (1) |
2008 |
DBLP DOI BibTeX RDF |
Secure Access, Adaptation, Services |
30 | Luciano Bononi, Carlo Tacconi |
Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks. |
Int. J. Inf. Sec. |
2007 |
DBLP DOI BibTeX RDF |
Secure clustering and routing, Statistically unique and cryptographically verifiable identifiers, Mobile Ad Hoc and Vehicular Networks, Intrusion detection system |
30 | Shejie Lu, Jun Li, Zhiyuan Liu, Guohua Cui |
A Secure Data Transmission Protocol for Mobile Ad Hoc Networks. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
secure data transmission, malicious behavior judgment, Ad Hoc network, intrusion detection |
30 | James Kempf, Jonathan Wood, Zulfikar Ramzan, Craig Gentry |
IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
secure address proxy, SEND, multi-key cryptographically generated address, Mobile IPv6, ring signature |
30 | Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank |
Black-box constructions for secure computation. |
STOC |
2006 |
DBLP DOI BibTeX RDF |
theory of cryptography, oblivious transfer, secure computation, black-box reductions |
30 | Vince Grolmusz, Zoltán Király |
Generalized Secure Routerless Routing. |
ICN (2) |
2005 |
DBLP DOI BibTeX RDF |
High speed optical networks, routerless routing, secure network protocols |
30 | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow |
Secure Hierarchical Identity Based Signature and Its Application. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
Hierarchical identity-based signature, forward-secure signature, bilinear pairings |
30 | Yehuda Lindell |
Bounded-concurrent secure two-party computation without setup assumptions. |
STOC |
2003 |
DBLP DOI BibTeX RDF |
secure computation, protocol composition |
30 | Li Gong, Xiaolei Qian |
Computational Issues in Secure Interoperation. |
IEEE Trans. Software Eng. |
1996 |
DBLP DOI BibTeX RDF |
secure composability, algorithms, computational complexity, interoperability, Computer security, database systems |
30 | Marianne Winslett, Kenneth P. Smith, Xiaolei Qian |
Formal Query Languages for Secure Relational Databases. |
ACM Trans. Database Syst. |
1994 |
DBLP DOI BibTeX RDF |
multilevel secure databases, information security, formal security models |
30 | Meng Yu 0001, Peng Liu 0005, Wanyu Zang, Sushil Jajodia |
Trusted Recovery. |
Secure Data Management in Decentralized Systems |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Juan Du 0006, Wei Wei, Xiaohui Gu, Ting Yu 0001 |
Towards secure dataflow processing in open distributed systems. |
STC |
2009 |
DBLP DOI BibTeX RDF |
secure component composition, secure data processing, service oriented architecture, cloud computing |
30 | Fergle D'Aubeterre, Lakshmi S. Iyer, Rahul Singh |
An empirical evaluation of information security awareness levels in designing secure business processes. |
DESRIST |
2009 |
DBLP DOI BibTeX RDF |
secure business process, secure process design, situational awareness, design science, security awareness, information systems security |
30 | Mohamed Shehab, Kamal Bhattacharya, Arif Ghafoor |
Web services discovery in secure collaboration environments. |
ACM Trans. Internet Techn. |
2007 |
DBLP DOI BibTeX RDF |
Secure collaboration, encapsulated SOAP, private UDDI registries, secure access paths, protocols, services |
30 | Dijiang Huang, Deep Medhi |
A key-chain-based keying scheme for many-to-many secure group communication. |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
key chain, many-to-many secure group communication, secure group communication, Hash chain |
30 | Naveen Sastry, Umesh Shankar, David A. Wagner 0001 |
Secure verification of location claims. |
Workshop on Wireless Security |
2003 |
DBLP DOI BibTeX RDF |
secure location authentication, secure location verification, sensor networks |
30 | Steven J. Ross, Jason L. Hill, Michael Y. Chen, Anthony D. Joseph, David E. Culler, Eric A. Brewer |
A Composable Framework for Secure Multi-Modal Access to Internet Services from Post-PC Devices. |
WMCSA |
2000 |
DBLP DOI BibTeX RDF |
secure multi-modal access, post-PC devices, public kiosks, cellular telephones, voice based vehicle telematics, infrastructure-based secure proxy architecture, security transformation functions, generic content, service-specific rules, untrusted public Internet access points, proxy transformations, unoptimized Java implementation, Internet, mobile computing, mobile devices, PDAs, latency, security of data, information access, information resources, telecommunication security, Internet services, reusable components |
30 | P. C. Clark, M. C. Meissner, K. O. Vance |
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
secure compartmented data access, untrusted network, COTS-based architecture, secure network computing architecture, application-level firewalls, DoD applications, software architecture, access control, electronic commerce, computer networks, authorisation, telecommunication security, electronic business, military computing, military applications, sensitive information, commercial-off-the-shelf products, sensitive data |
30 | Vikram R. Pesati, Thomas E. Keefe, Shankar Pal |
The Design and Implementation of a Multilevel Secure Log Manager. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
data loggers, multilevel secure log manager, log management, flush latency, performance, system design, bandwidth, system implementation, security evaluation, multilevel secure database system |
30 | Luigi Giuri, Pietro Iglio |
A Role-Based Secure Database Design Tool. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
role based secure database design tool, database design methodologies, secure database design methodology, entity relationship conceptual data model, role based security model, analysis algorithm, potential security design mistakes, translation procedure, SQL specification, conceptual model, entity-relationship modelling |
28 | Suman Banerjee 0001, Arunesh Mishra |
MobiCom poster: secure spaces: location-based secure wireless group communication. |
ACM SIGMOBILE Mob. Comput. Commun. Rev. |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Gaesoon Ahn, B. Chang, Tai-Myung Chung |
Design of Secure Monitor in the Secure Zone Cooperation. |
ICCSA (2) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Miguel Angel García de Dios, Carolina Dania, David A. Basin, Manuel Clavel |
Model-Driven Development of a Secure eHealth Application. |
Engineering Secure Future Internet Services and Systems |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Elda Paja, Fabiano Dalpiaz, Paolo Giorgini |
The Socio-technical Security Requirements Modelling Language for Secure Composite Services. |
Secure and Trustworthy Service Composition |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Achim D. Brucker, Luca Compagna, Pierre Guilleminot |
Compliance Validation of Secure Service Compositions. |
Secure and Trustworthy Service Composition |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Marianne Busch, Nora Koch, Martin Wirsing |
Evaluation of Engineering Approaches in the Secure Software Development Life Cycle. |
Engineering Secure Future Internet Services and Systems |
2014 |
DBLP DOI BibTeX RDF |
|
28 | José Antonio Martín, Fabio Martinelli, Ilaria Matteucci, Ernesto Pimentel 0001, Mathieu Turuani |
On the Synthesis of Secure Services Composition. |
Engineering Secure Future Internet Services and Systems |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Erkuden Rios, Francesco Malmignati, Eider Iturbe, Michela D'Errico, Mattia Salnitri |
From Consumer Requirements to Policies in Secure Services. |
Secure and Trustworthy Service Composition |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi 0001, Bo Zhou 0001 |
The Aniketos Service Composition Framework - Analysing and Ranking of Secure Services. |
Secure and Trustworthy Service Composition |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Konstantinos Markantonakis, Keith Mayes |
Errata to: Secure Smart Embedded Devices, Platforms and Applications. |
Secure Smart Embedded Devices, Platforms and Applications |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Konstantinos Markantonakis, Keith Mayes |
Errata to: Secure Smart Embedded Devices, Platforms and Applications. |
Secure Smart Embedded Devices, Platforms and Applications |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Yuval Ishai |
Randomization Techniques for Secure Computation. |
Secure Multi-Party Computation |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Gilad Asharov, Yehuda Lindell |
The BGW Protocol for Perfectly-Secure Multiparty Computation. |
Secure Multi-Party Computation |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Ueli Maurer, Vassilis Zikas |
Information-Theoretic Secure Multiparty Computation. |
Secure Multi-Party Computation |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Sahin Buyrukbilen, Spiridon Bakiras |
Secure Similar Document Detection with Simhash. |
Secure Data Management |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Jan Camenisch |
Research Challenges to Secure the Future Internet. |
Secure Data Management |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Stepan Kozak, David Novak, Pavel Zezula |
Secure Metric-Based Index for Similarity Cloud. |
Secure Data Management |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Chunwang Zhang, Junjie Jin, Ee-Chien Chang, Sharad Mehrotra |
Secure Quasi-Realtime Collaborative Editing over Low-Cost Storage Services. |
Secure Data Management |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Spiridon Bakiras, Konstantinos F. Nikolopoulos |
Adjusting the Trade-Off between Privacy Guarantees and Computational Cost in Secure Hardware PIR. |
Secure Data Management |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi |
A Comprehensive Framework for Secure Query Processing on Relational Data in the Cloud. |
Secure Data Management |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Nayot Poolsappasit, Vimal Kumar 0001, Sanjay Madria, Sriram Chellappan |
Challenges in Secure Sensor-Cloud Computing. |
Secure Data Management |
2011 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 52511 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|