Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 28 matches
- 2007
- Dhananjay Bapat, Kevin R. B. Butler, Patrick D. McDaniel:
Towards Automated Privilege Separation. ICISS 2007: 272-276 - Debojyoti Bhattacharya, Nitin Bansal, Amitava Banerjee, Dipanwita Roy Chowdhury:
A Near Optimal S-Box Design. ICISS 2007: 77-90 - Joachim Biskup, Dominique Marc Burgard, Torben Weibert, Lena Wiese:
Inference Control in Logic Databases as a Constraint Satisfaction Problem. ICISS 2007: 128-142 - Rakeshbabu Bobba, Himanshu Khurana:
DLPKH - Distributed Logical Public-Key Hierarchy. ICISS 2007: 110-127 - Christophe Clavier:
An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm. ICISS 2007: 143-155 - Subrat Kumar Dash, Sanjay Rawat, Arun K. Pujari:
Use of Dimensionality Reduction for Intrusion Detection. ICISS 2007: 306-320 - Debasis Giri, Parmeshwary Dayal Srivastava:
Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes. ICISS 2007: 156-166 - Gaurav Gupta, R. Sultania, Sounak Mondal, Sanjoy Kumar Saha, Bhabatosh Chanda:
A Structured Approach to Detect Scanner-Printer Used in Generating Fake Document. ICISS 2007: 250-253 - Ramanarayana Kandikattu, Lillykutty Jacob:
A Secure Intra-domain Routing Protocol for Wireless Mesh Networks. ICISS 2007: 37-50 - Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje:
Secure Transaction Management Protocols for MLS/DDBMS. ICISS 2007: 219-233 - Jun Li, Dejing Dou, Shiwoong Kim, Han Qin, Yibo Wang:
On Knowledge-Based Classification of Abnormal BGP Events. ICISS 2007: 267-271 - Meng-Hui Lim, Sanggon Lee, Sang-Jae Moon:
Cryptanalysis of Tso et al.'s ID-Based Tripartite Authenticated Key Agreement Protocol. ICISS 2007: 64-76 - Shimon K. Modi, Stephen J. Elliott, Hakil Kim:
Performance Analysis for Multi Sensor Fingerprint Recognition System. ICISS 2007: 292-305 - G. K. Patra, V. Anil Kumar, R. P. Thangavelu:
Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned Signals. ICISS 2007: 193-207 - G. K. Patra, V. Anil Kumar, R. P. Thangavelu:
A New Concept of Key Agreement Using Chaos-Synchronization Based Parameter Estimation. ICISS 2007: 263-266 - Atul Prakash:
Security in Practice - Security-Usability Chasm. ICISS 2007: 1-9 - K. B. Raja, Kiran Kumar K., Satish Kumar N., M. S. Lakshmi, H. Preeti, K. R. Venugopal, Lalit M. Patnaik:
Genetic Algorithm Based Steganography Using Wavelets. ICISS 2007: 51-63 - Kotagiri Ramamohanarao, Kapil Kumar Gupta, Tao Peng, Christopher Leckie:
The Curse of Ease of Access to the Internet. ICISS 2007: 234-249 - Daniel A. Ray, Charles B. Ward, Bogdan Munteanu, Jonathan Blackwell, Xiaoyan Hong, Jun Li:
Investigating the Impact of Real-World Factors on Internet Worm Propagation. ICISS 2007: 10-24 - Anjali Sardana, Ramesh Chandra Joshi:
Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks. ICISS 2007: 259-262 - Anshuman Saxena, Marc Lacoste, Tahar Jarboui, Ulf Lücking, Bernd Steinke:
A Software Framework for Autonomic Security in Pervasive Environments. ICISS 2007: 91-109 - Zhiyong Shan, Qiuyue Wang, Xiaofeng Meng:
An OS Security Protection Model for Defeating Attacks from Network. ICISS 2007: 25-36 - Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mohammad Zoroufi:
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks. ICISS 2007: 254-258 - Ashish Kumar Singh, Priya Chandran:
A Secure and Efficient Multi-authority Proactive Election Scheme. ICISS 2007: 208-218 - K. Sivakumar, K. Garg:
Constructing a "Common Cross Site Scripting Vulnerabilities Enumeration (CXE)" Using CWE and CVE. ICISS 2007: 277-291 - Hidema Tanaka:
Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures. ICISS 2007: 167-179 - Sabrina De Capitani di Vimercati, Pierangela Samarati:
Data Privacy - Problems and Solutions. ICISS 2007: 180-192 - Patrick D. McDaniel, Shyam K. Gupta:
Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings. Lecture Notes in Computer Science 4812, Springer 2007, ISBN 978-3-540-77085-5 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-20 00:27 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint