


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 172 matches
- 2015
- Hiromichi Abe, Kazuya Kinoshita, Kensuke Baba
, Shigeru Takano, Kazuaki J. Murakami:
Analyzing Brain Waves for Activity Recognition of Learners. ICT-EurAsia/CONFENIS 2015: 64-73 - Yana A. Bekeneva, Konstantin Borisenko, Andrey Shorov, Igor V. Kotenko
:
Investigation of DDoS Attacks by Hybrid Simulation. ICT-EurAsia/CONFENIS 2015: 179-189 - Andrej Binder, Tomas Boros, Ivan Kotuliak:
A SDN Based Method of TCP Connection Handover. ICT-EurAsia/CONFENIS 2015: 13-19 - Roman Bronis, Ivan Kotuliak, Tomas Kovacik
, Peter Trúchly
, Andrej Binder:
IP Data Delivery in HBB-Next Network Architecture. ICT-EurAsia/CONFENIS 2015: 20-29 - Kamil Burda
, Martin Nagy, Ivan Kotuliak:
Reducing Keepalive Traffic in Software-Defined Mobile Networks with Port Control Protocol. ICT-EurAsia/CONFENIS 2015: 3-12 - Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai:
Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse. ICT-EurAsia/CONFENIS 2015: 255-264 - Hsing-Chung Chen, Chung-Wei Chen:
A Secure Multicast Key Agreement Scheme. ICT-EurAsia/CONFENIS 2015: 275-281 - Mi-Young Cho, Young-Sook Jeong:
Face Recognition Performance Comparison Between Real Faces and Pose Variant Face Images from Image Display Device. ICT-EurAsia/CONFENIS 2015: 229-234 - Guido David:
Markov Chain Solution to the 3-Tower Problem. ICT-EurAsia/CONFENIS 2015: 121-128 - Han Gang, Hongyang Yan, Lingling Xu:
Secure Image Deduplication in Cloud Storage. ICT-EurAsia/CONFENIS 2015: 243-251 - Lukás Gregorovic, Ivan Polásek
, Branislav Sobota
:
Software Model Creation with Multidimensional UML. ICT-EurAsia/CONFENIS 2015: 343-352 - Nan Guo, Fangting Peng, Tianhan Gao:
Secure Mobility Management for MIPv6 with Identity-Based Cryptography. ICT-EurAsia/CONFENIS 2015: 173-178 - Tomás Halagan, Tomas Kovacik
, Peter Trúchly
, Andrej Binder:
Syn Flood Attack Detection and Type Distinguishing Mechanism Based on Counting Bloom Filter. ICT-EurAsia/CONFENIS 2015: 30-39 - Dirmanto Jap, Jakub Breier
:
Differential Fault Attack on LEA. ICT-EurAsia/CONFENIS 2015: 265-274 - Hikari Kato, Szilárd Zsolt Fazekas
, Mayumi Takaya, Akihiro Yamamura
:
Comparative Study of Monte-Carlo Tree Search and Alpha-Beta Pruning in Amazons. ICT-EurAsia/CONFENIS 2015: 139-148 - Priagung Khusumanegara, Rischan Mafrur
, Deokjai Choi:
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomerative Clustering Algorithm Based on Browsing History. ICT-EurAsia/CONFENIS 2015: 89-96 - David Kiwana, Björn Johansson
, Sven A. Carlsson:
Usage of Finance Information Systems in Developing Countries: Identifying Factors During Implementation that Impact Use. ICT-EurAsia/CONFENIS 2015: 333-342 - Sergey Krendelev, Mikhail Yakovlev, Maria Usoltseva:
Secure Database Using Order-Preserving Encryption Scheme Based on Arithmetic Coding and Noise Function. ICT-EurAsia/CONFENIS 2015: 193-202 - Takashi Kurokawa, Ryo Nojima, Shiho Moriai:
Can We Securely Use CBC Mode in TLS1.0? ICT-EurAsia/CONFENIS 2015: 151-160 - Masahiro Kuzunishi
, Tetsuya Furukawa:
Strength of Relationship Between Multi-labeled Data and Labels. ICT-EurAsia/CONFENIS 2015: 99-108 - Yanchen Liu, Fang Cao, Masood S. Mortazavi, Mengmeng Chen, Ning Yan, Chi Ku, Aniket Adnaik, Stephen Morgan, Guangyu Shi, Yuhu Wang, Fan Fang:
DCODE: A Distributed Column-Oriented Database Engine for Big Data Analytics. ICT-EurAsia/CONFENIS 2015: 289-299 - Bo Liu, Baokang Zhao, Chunqing Wu, Wanrong Yu, Ilsun You:
Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution - Extended Abstract. ICT-EurAsia/CONFENIS 2015: 282-285 - Andreas Mladenow
, Niina Maarit Novak
, Christine Strauss
:
Online Ad-fraud in Search Engine Advertising Campaigns - Prevention, Detection and Damage Limitation. ICT-EurAsia/CONFENIS 2015: 109-118 - Martin Nagy, Ivan Kotuliak, Jan Skalny, Martin Kalcok, Tibor Hirjak:
Integrating Mobile OpenFlow Based Network Architecture with Legacy Infrastructure. ICT-EurAsia/CONFENIS 2015: 40-49 - Thi Ai Thao Nguyen, Dinh Thanh Nguyen, Tran Khanh Dang
:
A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation. ICT-EurAsia/CONFENIS 2015: 77-88 - Antonín Pavlícek
, Petr Doucek
:
Corporate Social Responsibility in Social Media Environment. ICT-EurAsia/CONFENIS 2015: 323-332 - Peige Ren, Xiaofeng Wang, Hao Sun, Fen Xu, Baokang Zhao, Chunqing Wu:
An Efficient Unsavory Data Detection Method for Internet Big Data. ICT-EurAsia/CONFENIS 2015: 213-220 - N. Renugadevi
, C. Mala:
Key Agreement with Modified Batch Rekeying for Distributed Group in Cognitive Radio Networks. ICT-EurAsia/CONFENIS 2015: 161-172 - Martin Sarnovsky
, Peter Butka
, Peter Bednár, Frantisek Babic
, Ján Paralic:
Analytical Platform Based on Jbowl Library Providing Text-Mining Services in Distributed Environment. ICT-EurAsia/CONFENIS 2015: 310-319 - Sooyeon Shin, Seungyeon Kim, Taekyoung Kwon:
Identification of Corrupted Cloud Storage in Batch Auditing for Multi-Cloud Environments. ICT-EurAsia/CONFENIS 2015: 221-225
skipping 142 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-03-01 16:12 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint