Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 42 matches
- 2016
- Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu:
Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9543, Springer 2016, ISBN 978-3-319-29813-9 [contents] - 2015
- Zhenzhen Bao, Peng Luo, Dongdai Lin:
Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-Bit Microcontrollers. ICICS 2015: 18-36 - Weiqiong Cao, Jingyi Feng, Shaofeng Zhu, Hua Chen, Wenling Wu, Xucang Han, Xiaoguang Zheng:
Practical Lattice-Based Fault Attack and Countermeasure on SM2 Signature Algorithm. ICICS 2015: 62-70 - Nairen Cao, Xiaoqi Yu, Yufang Yang, Linru Zhang, Siu-Ming Yiu:
An ORAM Scheme with Improved Worst-Case Computational Overhead. ICICS 2015: 393-405 - Depeng Chen, Daojing He, Sammy Chan:
Security-Enhanced Reprogramming with XORs Coding in Wireless Sensor Networks. ICICS 2015: 421-435 - Zhifeng Chen, Qingbao Li, Songhui Guo, Ye Wang:
Ensuring Kernel Integrity Using KIPBMFH. ICICS 2015: 10-17 - Xuejie Ding, Meng Zhang, Jun Shi, Wei-qing Huang:
A Novel Post-processing Method to Improve the Ability of Reconstruction for Video Leaking Signal. ICICS 2015: 141-151 - Chuntao Dong, Qingni Shen, Wenting Li, Yahui Yang, Zhonghai Wu, Xiang Wan:
Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop. ICICS 2015: 458-466 - Wenjun Fan, Zhihui Du, David Fernández, Xinning Hui:
Dynamic Hybrid Honeypot System Based Transparent Traffic Redirection Mechanism. ICICS 2015: 311-319 - Hongbo Fan, Shupeng Shi, Jing Zhang, Li Dong:
Suffix Type String Matching Algorithms Based on Multi-windows and Integer Comparison. ICICS 2015: 414-420 - Dimitris Geneiatakis:
Minimizing Databases Attack Surface Against SQL Injection Attacks. ICICS 2015: 1-9 - Shoichi Hirose:
Generic Construction of Audit Logging Schemes with Forward Privacy and Authenticity. ICICS 2015: 125-140 - Yafei Ji, Luning Xia, Jingqiang Lin, Jian Zhou, Guozhu Zhang, Shijie Jia:
Chameleon: A Lightweight Method for Thwarting Relay Attacks in Near Field Communication. ICICS 2015: 346-355 - Shangqi Lai, Joseph K. Liu, Kim-Kwang Raymond Choo, Kaitai Liang:
Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN. ICICS 2015: 467-477 - Peili Li, Haixia Xu, Yuanyuan Ji:
Multi-input Functional Encryption and Its Application in Outsourcing Computation. ICICS 2015: 220-235 - Zhen Liu, Duncan S. Wong:
Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-Resistant Blackbox Traceable. ICICS 2015: 109-124 - Muhua Liu, Ying Wu, Jinyong Chang, Rui Xue, Wei Guo:
Verifiable Proxy Re-encryption from Indistinguishability Obfuscation. ICICS 2015: 363-378 - Mohammad Saiful Islam Mamun, Ali A. Ghorbani, Natalia Stakhanova:
An Entropy Based Encrypted Traffic Classifier. ICICS 2015: 282-294 - Hongwei Meng, Zhong Chen, Ziqian Meng, Chuck Song:
A Secure Route Optimization Mechanism for Expressive Internet Architecture (XIA) Mobility. ICICS 2015: 269-281 - Viktor Monarev, Andrey Pestunov:
Prior Classification of Stego Containers as a New Approach for Enhancing Steganalyzers Accuracy. ICICS 2015: 445-457 - Paolo Palmieri:
Preserving Context Privacy in Distributed Hash Table Wireless Sensor Networks. ICICS 2015: 436-444 - Ady Wahyudi Paundu, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Leveraging Static Probe Instrumentation for VM-based Anomaly Detection System. ICICS 2015: 320-334 - Rajeev Anand Sahu, Vishal Saraswat:
Efficient and Secure Many-to-One Signature Delegation. ICICS 2015: 252-259 - Degang Sun, Kun Yang, Wei-qing Huang, Yan Wang, Bo Hu:
An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS Attacks. ICICS 2015: 303-310 - Zizhou Sun, Yahui Yang, Qingni Shen, Zhonghai Wu, Xiaochen Li:
MB-DDIVR: A Map-Based Dynamic Data Integrity Verification and Recovery Scheme in Cloud Storage. ICICS 2015: 335-345 - Jiehui Tang, Yongbin Zhou, Hailong Zhang, Shuang Qiu:
Higher-Order Masking Schemes for Simon. ICICS 2015: 379-392 - Chenyang Tu, Jian Zhou, Neng Gao, Zeyi Liu, Yuan Ma, Zongbin Liu:
QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations. ICICS 2015: 184-198 - Xuanxuan Wang, Lihuan Jiang, Lars Thiele, Yongming Wang:
Secret Key Extraction with Quantization Randomness Using Hadamard Matrix on QuaDRiGa Channel. ICICS 2015: 50-61 - Wenwen Wang, Kewei Lv:
On Promise Problem of the Generalized Shortest Vector Problem. ICICS 2015: 37-49 - Yao Wang, Kewei Lv:
The Security of Polynomial Information of Diffie-Hellman Key. ICICS 2015: 71-81
skipping 12 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-03 14:09 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint