Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
103 | Jan Cederquist, Muhammad Torabi Dashti |
An intruder model for verifying liveness in security protocols. |
FMSE |
2006 |
DBLP DOI BibTeX RDF |
Dolev-Yao intruder, intruder models, security protocols, liveness properties |
100 | Bin Tong, Santosh Panchapakesan, Wensheng Zhang 0001 |
A Three-Tier Framework for Intruder Information Sharing in Sensor Networks. |
SECON |
2008 |
DBLP DOI BibTeX RDF |
|
92 | Alwen Tiu, Rajeev Goré |
A Proof Theoretic Analysis of Intruder Theories. |
RTA |
2009 |
DBLP DOI BibTeX RDF |
AC convergent theories, intruder deduction, security protocols, sequent calculus |
92 | Lali Barrière, Paola Flocchini, Pierre Fraigniaud, Nicola Santoro |
Capture of an intruder by mobile agents. |
SPAA |
2002 |
DBLP DOI BibTeX RDF |
network intruder, mobile agent, graph-searching |
84 | Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi |
From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. |
WETICE |
1997 |
DBLP DOI BibTeX RDF |
authentication protocol specifications, flaws, automatic formal algorithm, protocol roles, intruder communication abilities, intruder computational abilities, protocol instrumentations, formal verification, encryption, message authentication, decryption, attack scenarios, deductive system |
81 | Flaminia L. Luccio |
Intruder Capture in Sierpinski Graphs. |
FUN |
2007 |
DBLP DOI BibTeX RDF |
intruder capture, Sierpi?ski graphs, Mobile agents |
81 | Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò 0001 |
A Formalization of Off-Line Guessing for Security Protocol Analysis. |
LPAR |
2004 |
DBLP DOI BibTeX RDF |
|
70 | Yannick Chevalier, Michaël Rusinowitch |
Combining Intruder Theories. |
ICALP |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Flaminia L. Luccio |
Contiguous Search Problem in Sierpinski Graphs. |
Theory Comput. Syst. |
2009 |
DBLP DOI BibTeX RDF |
Intruder capture, Sierpi?ski graphs, Mobile agents |
62 | Heejin Jang, Sangwook Kim |
A Self-Extension Monitoring for Security Management. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
self-extension monitoring, information security patterns, active security protection, intruder identification system, authorisation, security management, hackers, information infrastructures, computer crime, information warfare |
60 | Yannick Chevalier, Mounira Kourjieh |
A Symbolic Intruder Model for Hash-Collision Attacks. |
ASIAN |
2006 |
DBLP DOI BibTeX RDF |
|
60 | Heejin Jang, Sangwook Kim |
An intruder tracing system based on a shadowing mechanism. |
ISCC |
2002 |
DBLP DOI BibTeX RDF |
|
60 | Heejin Jang, Sangwook Kim |
Real-Time Intruder Tracing through Self-Replication. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
52 | Yannick Chevalier, Laurent Vigneron |
Strategy for Verifying Security Protocols with Unbounded Message Size. |
Autom. Softw. Eng. |
2004 |
DBLP DOI BibTeX RDF |
intruder model, automatic strategies, verification, security protocols, flaw detection |
52 | Mourad Debbabi, Nancy A. Durgin, Mohamed Mejri, John C. Mitchell |
Security by typing. |
Int. J. Softw. Tools Technol. Transf. |
2003 |
DBLP DOI BibTeX RDF |
Intruder abilities, Authentication, Integrity, Type System, Cryptographic Protocols, Secrecy |
51 | N. E. Venkatesan, Tarun Agarwal, P. Vijay Kumar |
On the Average Case Communication Complexity for Detection in Sensor Networks. |
DCOSS |
2008 |
DBLP DOI BibTeX RDF |
|
51 | Stéphanie Delaune, Florent Jacquemard |
Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks. |
J. Autom. Reason. |
2006 |
DBLP DOI BibTeX RDF |
verification, formal methods, cryptographic protocols, dictionary attacks, probabilistic encryption |
51 | Ping Yi, Zhoulin Dai, YiPing Zhong, Shiyong Zhang |
Resisting Flooding Attacks in Ad Hoc Networks. |
ITCC (2) |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Navid Imani, Hamid Sarbazi-Azad, Albert Y. Zomaya |
Capturing an Intruder in Product Networks. |
HiPC |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Pooya Shareghi, Navid Imani, Hamid Sarbazi-Azad |
Capturing an Intruder in the Pyramid. |
CSR |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Yannick Chevalier, Michaël Rusinowitch |
Hierarchical Combination of Intruder Theories. |
RTA |
2006 |
DBLP DOI BibTeX RDF |
|
49 | James N. K. Liu, Meng Wang 0005, Bo Feng |
iBotGuard: an Internet-based Intelligent Robot security system using Invariant Face Recognition against intruder. |
IEEE Trans. Syst. Man Cybern. Part C |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Paola Flocchini, Miao Jun Huang, Flaminia L. Luccio |
Contiguous Search in the Hypercube for Capturing an Intruder. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Hubert Comon-Lundh, Ralf Treinen |
Easy Intruder Deductions. |
Verification: Theory and Practice |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Jurek Czyzowicz, Evangelos Kranakis, Danny Krizanc, Ioannis Lambadaris, Lata Narayanan, Jaroslav Opatrny, Ladislav Stacho, Jorge Urrutia, Mohammadreza Yazdani |
On Minimizing the Maximum Sensor Movement for Barrier Coverage of a Line Segment. |
ADHOC-NOW |
2009 |
DBLP DOI BibTeX RDF |
Intruder, Optimal Movement, Sensors, NP-complete, Coverage, Detection, PTAS, Barrier, Line Segment |
42 | Paola Flocchini, Amiya Nayak, Arno Schulz |
Cleaning an Arbitrary Regular Network with Mobile Agents. |
ICDCIT |
2005 |
DBLP DOI BibTeX RDF |
Intruder Capture, Mobile Agents, Mesh, Graph Search |
42 | Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas |
Specifying electronic voting protocols in typed MSR. |
WPES |
2005 |
DBLP DOI BibTeX RDF |
Dolev-Yao intruder, typed MSR, privacy, specification, security protocols, electronic voting |
42 | Kymie M. C. Tan, Blair R. Collie |
Detection and Classification of TCP/IP Network Services. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
TCP/IP network service classification, computer intruders, remote terminal software, undetectable access, system audit, intruder activity detection, unauthorised network services, network connection signature, neural network, learning, monitoring, experiment, transport protocols, data security, network traffic, generalisation, Australia, law enforcement |
41 | Gitae Kim, Tony J. Bogovic, Dana Chee |
ACtive edge-Tagging (ACT): An Intruder Identification & Isolation Scheme in Active Networks. |
ISCC |
2001 |
DBLP DOI BibTeX RDF |
Intruder Identification & Isolation, Distributed Denial of Service (DDoS) Attacks, Active (or Programmable) Networks, Network Security, Traffic Monitoring |
41 | Rimvydas Ruksenas, Paul Curzon, Ann Blandford |
Modelling and analysing cognitive causes of security breaches. |
Innov. Syst. Softw. Eng. |
2008 |
DBLP DOI BibTeX RDF |
Security, Formal verification, Human error, Cognitive architecture, SAL |
41 | Tiago Sak, Jacques Wainer, Siome Klein Goldenstein |
Probabilistic Multiagent Patrolling. |
SBIA |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani |
An NP Decision Procedure for Protocol Insecurity with XOR. |
LICS |
2003 |
DBLP DOI BibTeX RDF |
|
41 | James Heather, Steve A. Schneider |
Equal To The Task? |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
inequality tests, formal methods in security, RSA, cryptographic protocols, security models, rank functions, data independence, security verification, strand spaces |
41 | Lawrence H. Ozarow, Aaron D. Wyner |
Wire-Tap Channel II. |
EUROCRYPT |
1984 |
DBLP DOI BibTeX RDF |
|
39 | Sergio de Oliveira, Hao Chi Wong, José Marcos S. Nogueira |
NEKAP: Intruder Resilient and Energy Efficient Key Establishment in Sensor Networks. |
ICCCN |
2007 |
DBLP DOI BibTeX RDF |
|
39 | David A. Basin, Sebastian Mödersheim, Luca Viganò 0001 |
Algebraic Intruder Deductions. |
LPAR |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Hubert Comon-Lundh |
Intruder Theories (Ongoing Work). |
FoSSaCS |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Hubert Comon-Lundh, Vitaly Shmatikov |
Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or. |
LICS |
2003 |
DBLP DOI BibTeX RDF |
|
39 | Dongxi Liu, Xiaoyong Li, Yingcai Bai |
An Intelligent Intruder Model for Security Protocol Analysis. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
|
38 | Shivam Kainth, Subham Sahoo, Rajtilak Pal, Shashi Shekhar Jha |
Chasing the Intruder: A Reinforcement Learning Approach for Tracking Intruder Drones. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
30 | Siva Anantharaman, Hai Lin 0005, Christopher Lynch, Paliath Narendran, Michaël Rusinowitch |
Cap unification: application to protocol security modulo homomorphic encryption. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
secrecy analysis, protocol, rewriting, unification |
30 | Navid Imani, Hamid Sarbazi-Azad, Albert Y. Zomaya, Paria Moinzadeh |
Detecting Threats in Star Graphs. |
IEEE Trans. Parallel Distributed Syst. |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Bijan Soleymani, Muthucumaru Maheswaran |
Social Authentication Protocol for Mobile Phones. |
CSE (4) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Sebastian Mödersheim, Luca Viganò 0001 |
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols. |
FOSAD |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani |
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption. |
ACM Trans. Comput. Log. |
2008 |
DBLP DOI BibTeX RDF |
Diffie-Hellman exponentiation, Dolev-Yao model, complexity, protocols, Algebraic properties |
30 | Xuehou Tan, Bo Jiang 0004 |
Searching a Polygonal Region by Two Guards. |
J. Comput. Sci. Technol. |
2008 |
DBLP DOI BibTeX RDF |
polygon search problem, two-guard problem, robotics, computational geometry, visibility |
30 | Assane Gueye, Jean C. Walrand |
Security in networks: A game-theoretic approach. |
CDC |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis |
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees. |
SAFECOMP |
2007 |
DBLP DOI BibTeX RDF |
intrusion attacks, e-commerce protocols, model checking, SPIN |
30 | Siva Anantharaman, Paliath Narendran, Michaël Rusinowitch |
Intruders with Caps. |
RTA |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Damas P. Gruska |
Information-Flow Attacks Based on Limited Observations. |
Ershov Memorial Conference |
2006 |
DBLP DOI BibTeX RDF |
process algebras, information flow, timing attacks |
30 | Olivier Dousse, Christina Tavoularis, Patrick Thiran |
Delay of intrusion detection in wireless sensor networks. |
MobiHoc |
2006 |
DBLP DOI BibTeX RDF |
sensor networks, intrusion detection, delay, percolation |
30 | Mark Moors, Dirk Schulz 0001 |
Improved Markov Models for Indoor Surveillance. |
IROS |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Giovanni Di Crescenzo, Richard J. Lipton, Shabsi Walfish |
Perfectly Secure Password Protocols in the Bounded Retrieval Model. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Vaibhav Mehta, Constantinos Bartzis, Haifeng Zhu 0001, Edmund M. Clarke, Jeannette M. Wing |
Ranking Attack Graphs. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
Google PageRank, Model Checking, security metric, Attack Graph, Attack Model |
30 | S. Prasanna, V. Vetri Selvi |
An Improved Intrusion Detection Technique for Mobile Adhoc Networks. |
ICDCIT |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Ping Yi, YiPing Zhong, Shiyong Zhang |
Applying Mobile Agent to Intrusion Response for Ad Hoc Networks. |
International Conference on Computational Science (2) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Jae-Ha Lee, Sang-Min Park, Kyung-Yong Chwa |
Equivalence of Search Capability Among Mobile Guards with Various Visibilities. |
ESA |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Yongjian Li, Rui Xue |
Using SPIN to Model Cryptographic Protocols. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Catherine Meadows 0001 |
A Procedure for Verifying Security Against Type Confusion Attacks. |
CSFW |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Hui-Feng Huang, Chin-Chen Chang 0001 |
An Efficient Convertible Authenticated Encryption Scheme and Its Variant. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Somesh Jha, Oleg Sheyner, Jeannette M. Wing |
Two Formal Analys s of Attack Graphs. |
CSFW |
2002 |
DBLP DOI BibTeX RDF |
|
30 | Kenji Masui, Masahiko Tomoishi, Naoki Yonezaki |
Design of UNIX System for the Prevention of Damage Propagation by Intrusion and Its Implementation Based on 4.4BSD. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
|
30 | Xuehou Tan |
Efficient Algorithms for Searching a Polygonal Room with a Door. |
JCDCG |
2000 |
DBLP DOI BibTeX RDF |
|
29 | Hernando Fernandez-Canque, Sorin Hintea, John Freer, Ali Ahmadinia |
Machine Vision Application to Automatic Intruder Detection Using CCTV. |
KES (2) |
2009 |
DBLP DOI BibTeX RDF |
CCTV, human posture recognition, image processing, Machine vision |
29 | ChingSeong Tan, Aryuanto Soetedjo |
Feasibility Study on An Automated Intruder Detection for Tropical Fish Farm. |
RAM |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Stijn B. J. Van Dam, Max Mulder, M. M. van Paassen |
Airborne self-separation display with turn dynamics and intruder intent-information. |
SMC |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Vincent Bernat, Hubert Comon-Lundh |
Normal Proofs in Intruder Theories. |
ASIAN |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Pascal Lafourcade 0001, Denis Lugiez, Ralf Treinen |
Intruder Deduction for AC-Like Equational Theories with Homomorphisms. |
RTA |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani, Laurent Vigneron |
Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions. |
CSL |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Alwen Tiu, Jeremy E. Dawson |
Automating Open Bisimulation Checking for the Spi Calculus. |
CSF |
2010 |
DBLP DOI BibTeX RDF |
open bisimulation, symbolic trace analysis, intruder deduction, spi-calculus |
22 | Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas |
Specifying and implementing privacy-preserving cryptographic protocols. |
Int. J. Inf. Sec. |
2008 |
DBLP DOI BibTeX RDF |
Specification of Security Protocols, Dolev-Yao Intruder, Security-typed language, Typed MSR, Jif, Privacy, Linkability |
22 | Yuliy M. Baryshnikov, Edward G. Coffman Jr., Kyung Joon Kwak |
High Performance Sleep-Wake Sensor Systems Based on Cyclic Cellular Automata. |
IPSN |
2008 |
DBLP DOI BibTeX RDF |
intruder detection, cyclic cellular automata, self-organizing, Sleep schedule |
22 | Youssef Hanna, Hridesh Rajan, Wensheng Zhang 0001 |
Slede: a domain-specific verification framework for sensor network security protocol implementations. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
intruder generation, sensor networks, model checking, security protocols |
22 | Paola Flocchini, Amiya Nayak, Arno Schulz |
Decontamination of Arbitrary Networks using a Team of Mobile Agents with Limited Visibility. |
ACIS-ICIS |
2007 |
DBLP DOI BibTeX RDF |
Network Decontamination, Intruder Capture, Mobile Agents |
22 | Tarak Gandhi, Mohan M. Trivedi |
Motion analysis for event detection and tracking with a mobile omnidirectional camera. |
Multim. Syst. |
2004 |
DBLP DOI BibTeX RDF |
Intruder detection, Mobile robots, Optical flow, Surveillance, Motion detection, Dynamic vision, Panoramic vision |
20 | Fida Kamal Dankar, Khaled El Emam |
A method for evaluating marketer re-identification risk. |
EDBT/ICDT Workshops |
2010 |
DBLP DOI BibTeX RDF |
identity disclosure, re-identification risk, privacy, disclosure control |
20 | Boting Yang, Yi Cao |
Standard directed search strategies and their applications. |
J. Comb. Optim. |
2009 |
DBLP DOI BibTeX RDF |
Oriented grids, Pursuit-evasion problem, Digraph, Directed search |
20 | Binay K. Bhattacharya, Tsunehiko Kameda, John Z. Zhang |
Surveillance of a polygonal area by a mobile searcher from the boundary: Searchability testing. |
ICRA |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Jan Platos, Václav Snásel, Pavel Krömer, Ajith Abraham |
Detecting Insider Attacks Using Non-negative Matrix Factorization. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Bo Jiang 0004, Xuehou Tan |
Searching a Circular Corridor with Two Flashlights. |
TAMC |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Adnan Nadeem, Michael P. Howarth |
Adaptive intrusion detection & prevention of denial of service attacks in MANETs. |
IWCMC |
2009 |
DBLP DOI BibTeX RDF |
intrusion detection & prevention, ad-hoc network security |
20 | Bogdan Groza, Marius Minea |
A Calculus to Detect Guessing Attacks. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Rohit Chadha, Stéphanie Delaune, Steve Kremer |
Epistemic Logic for the Applied Pi Calculus. |
FMOODS/FORTE |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Nicola Basilico, Nicola Gatti 0001, Francesco Amigoni |
Leader-follower strategies for robotic patrolling in environments with arbitrary topologies. |
AAMAS (1) |
2009 |
DBLP BibTeX RDF |
leader-follower strategies, robotic patrolling |
20 | Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano |
Efficient representation of the attacker's knowledge in cryptographic protocols analysis. |
Formal Aspects Comput. |
2008 |
DBLP DOI BibTeX RDF |
Knowledge representation, Cryptographic protocols, State space exploration |
20 | Stephen Kloder, Seth Hutchinson 0001 |
Partial barrier coverage: Using game theory to optimize probability of undetected intrusion in polygonal environments. |
ICRA |
2008 |
DBLP DOI BibTeX RDF |
|
20 | YuanYuan Li, Lynne E. Parker |
Detecting and monitoring time-related abnormal events using a wireless sensor network and mobile robot. |
IROS |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Aaron Hunter 0001 |
Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an Adversary. |
EuroISI |
2008 |
DBLP DOI BibTeX RDF |
|
20 | John Z. Zhang, Tsunehiko Kameda |
A Linear-Time Algorithm for Finding All Door Locations That Make a Room Searchable. |
TAMC |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Michael J. Ocean, Azer Bestavros |
Wireless and physical security via embedded sensor networks. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
sensor networks, intrusion detection, wireless, physical security |
20 | Xuehou Tan |
Searching a Polygonal Region by Two Guards. |
TAMC |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Vivek K. Singh 0001, Mohan S. Kankanhalli |
Towards Adversary Aware Surveillance Systems. |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Oscar García Morchon, Heribert Baldus, Tobias Heer, Klaus Wehrle |
Cooperative security in distributed sensor networks. |
CollaborateCom |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Yannick Chevalier, Mounira Kourjieh |
Key Substitution in the Symbolic Analysis of Cryptographic Protocols. |
FSTTCS |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Guoqiang Shu, David Lee 0001 |
Message Confidentiality Testing of Security Protocols - Passive Monitoring and Active Checking. |
TestCom |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Yohan Boichut, Pierre-Cyrille Héam, Olga Kouchnarenko |
Handling Algebraic Properties in Automatic Analysis of Security Protocols. |
ICTAC |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Andrew D. Gordon 0001 |
Provable Implementations of Security Protocols. |
LICS |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Giorgio Delzanno, Javier Esparza, Jirí Srba |
Monotonic Set-Extended Prefix Rewriting and Verification of Recursive Ping-Pong Protocols. |
ATVA |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Satoshi Kawabata, Shinsaku Hiura, Kosuke Sato |
Real-Time Detection of Anomalous Objects in Dynamic Scene. |
ICPR (3) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Urs Hengartner, Peter Steenkiste |
Securing Information Gateways with Derivation-Constrained Access Control. |
SPC |
2006 |
DBLP DOI BibTeX RDF |
|