History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 209 total

Mining the categorized software repositories to improve the analysis of security vulnerabilities. (English)
Gnesi, Stefania (ed.) et al., Fundamental approaches to software engineering. 17th international conference, FASE 2014, held as part of the European joint conferences on theory and practice of software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings. Berlin: Springer (ISBN 978-3-642-54803-1/pbk). Lecture Notes in Computer Science 8411, 155-169 (2014).
WorldCat.org
1
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs. (English)
IEEE Transactions on Information Forensics and SecurityIEEE Transactions on Information Forensics and Security 9, N0. 2, 221-232(2014)
WorldCat.org
2
ConXsense: automated context classification for context-aware access control. (English)
ASIACCS, 293-304(2014)
WorldCat.org
3
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs. (English)
DAC, 1-6(2014)
WorldCat.org
4
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. (English)
USENIX Security, 401-416(2014)
WorldCat.org
5
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks. (English)
ESORICS (1), 76-93(2014)
WorldCat.org
6
Mobile Trusted Computing. (English)
Proceedings of the IEEEProceedings of the IEEE 102, N0. 8, 1189-1206(2014)
WorldCat.org
7
On Offline Payments with Bitcoin (Poster Abstract). (English)
Financial Cryptography Workshops, 159-160(2014)
WorldCat.org
8
On the (In)Security of Mobile Two-Factor Authentication. (English)
Financial Cryptography, 365-383(2014)
WorldCat.org
9
ASM: A Programmable Interface for Extending Android Security. (English)
USENIX Security, 1005-1019(2014)
WorldCat.org
10
You Can Call but You Can’t Hide: Detecting Caller ID Spoofing Attacks. (English)
DSN, 168-179(2014)
WorldCat.org
11
Optimal operation of distributed generation in power systems considering uncertainty effects through probabilistic load flow. (English)
Journal of Intelligent and Fuzzy SystemsJournal of Intelligent and Fuzzy Systems 27, N0. 3, 1479-1485(2014)
WorldCat.org
12
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices. (English)
ACM Conference on Computer and Communications Security, 880-891(2014)
WorldCat.org
13
A trusted versioning file system for passive mobile storage devices. (English)
J. Network and Computer ApplicationsJ. Network and Computer Applications 38, 65-75(2014)
WorldCat.org
14
MoP-2-MoP - Mobile Private Microblogging. (English)
Financial Cryptography, 384-396(2014)
WorldCat.org
15
Check my profile: Leveraging static analysis for fast and accurate detection of ROP gadgets. (English)
Stolfo, Salvatore J. (ed.) et al., Research in attacks, intrusions, and defenses. 16th international symposium, RAID 2013, Rodney Bay, St. Lucia, October 23‒25, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41283-7/pbk). Lecture Notes in Computer Science 8145, 62-81 (2013).
WorldCat.org
16
Plant root strategies for robotic soil penetration. (English)
Lepora, Nathan F. (ed.) et al., Biomimetic and biohybrid systems. Second international conference, Living Machines 2013, London, UK, July 29‒August 2, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39802-5/pbk). Lecture Notes in Computer Science 8064. Lecture Notes in Artificial Intelligence, 447-449 (2013).
WorldCat.org
17
Embodied behavior of plant roots in obstacle avoidance. (English)
Lepora, Nathan F. (ed.) et al., Biomimetic and biohybrid systems. Second international conference, Living Machines 2013, London, UK, July 29‒August 2, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39802-5/pbk). Lecture Notes in Computer Science 8064. Lecture Notes in Artificial Intelligence, 431-433 (2013).
WorldCat.org
18
Crowdshare: secure mobile resource sharing. (English)
Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25‒28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 432-440 (2013).
WorldCat.org
19
Client-controlled cryptography-as-a-service in the cloud. (English)
Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25‒28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 19-36 (2013).
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 209 total

Valid XHTML 1.0 Transitional Valid CSS!