Heim
Forschungstrends
Wissenschaftliche Artikel
Zeitschriften
Wissenschaftliche Zeitschriften
Open Access Journals
Zeitschriftensuche
Kontakt
Melden Sie sich an
Login
Sprache
English
German
Journal of Computer Security
Titel
Veröffentlichungsdatum
Sprache
Zitate
A survey of algebraic properties used in cryptographic protocols
2006/02/01
1
Towards cost-sensitive assessment of intrusion response selection
2012/06/12
1
Establishing and protecting digital identity in federation systems
2006/06/23
1
Digital payment systems with passive anonymity-revoking trustees*
1997/01/01
1
Using sample size to limit exposure to data mining
2000/10/01
1
Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers
2007/01/01
1
Exploiting predictability in click-based graphical passwords*
2011/06/20
1
Privacy-preserving incremental data dissemination
2009/03/16
1
Verifying privacy-type properties of electronic voting protocols
2009/07/02
1
One step ahead to multisensor data fusion for DDoS detection
2005/12/06
1
A Classification of Security Properties for Process Algebras1
1995/01/01
1
Secure outsourced garbled circuit evaluation for mobile devices
2016/04/19
1
Per-session security: Password-based cryptography revisited
2019/01/11
1
Fabric: Building open distributed systems securely by construction
2017/07/10
1
User Privacy Concerns in Commercial Smart Buildings1
2022/07/04
1
Domain generated algorithms detection applying a combination of a deep feature selection and traditional machine learning models
2023/01/26
1
Enhancement of email spam detection using improved deep learning algorithms for cyber security
2022/03/02
1
Efficient backward private searchable encryption
2020/03/17
1
NetSTAT: A network-based intrusion detection system
1999/01/01
1
Some attacks upon authenticated group key agreement protocols
2003/10/01
1
Side channel cryptanalysis of product ciphers
2000/04/01
1
Intrusion confinement by isolation in information systems
2000/10/01
1
Shared and searchable encrypted data for untrusted servers
2011/05/30
1
Web search query privacy: Evaluating query obfuscation and anonymizing networks1
2014/01/24
1
Cost effective management frameworks for intrusion detection systems
2004/09/01
1
Verifying information flow goals in Security-Enhanced Linux
2005/01/20
1
A cascade architecture for DoS attacks detection based on the wavelet transform
2009/11/25
1
Reputation-based trust management
2005/01/20
1
Eliminating counterevidence with applications to accountable certificate management1
2002/07/01
1
Athena: a novel approach to efficient automatic security protocol analysis1
2001/01/01
1
«
‹ Durchlässig
Nächste ›
»