|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1928 occurrences of 929 keywords
|
|
|
Results
Found 2507 publication records. Showing 2507 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
64 | Johs Hansen Hammer, Gerardo Schneider |
On the Definition and Policies of Confidentiality. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
policies, confidentiality, norms |
64 | Adeniyi Onabajo, Jens H. Jahnke |
Properties of Confidentiality Requirements. |
CBMS |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Renaud De Landtsheer, Axel van Lamsweerde |
Reasoning about confidentiality at requirements engineering time. |
ESEC/SIGSOFT FSE |
2005 |
DBLP DOI BibTeX RDF |
reasoning about confidentiality, bounded model checking, security requirements, specification patterns |
57 | Joachim Biskup, Piero A. Bonatti |
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
Potential secret, Combined refusal and lying, Policy, Confidentiality, Inference control, Secrecy, Lying, Refusal, Controlled query evaluation |
57 | Andrei Sabelfeld |
Confidentiality for Multithreaded Programs via Bisimulation. |
Ershov Memorial Conference |
2003 |
DBLP DOI BibTeX RDF |
|
57 | Jim J. Longstaff, Mike A. Lockyer, John Nicholas |
The tees confidentiality model: an authorisation model for identities and roles. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
|
50 | Joachim Biskup, Torben Weibert |
Confidentiality Policies for Controlled Query Evaluation. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
confidentiality policies, Inference control, logic databases |
50 | Joachim Biskup, Jan-Hendrik Lochner |
Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
potential secrets, Access control, relational databases, policy, information flow, confidentiality, database security, inference control |
50 | Bhavani Thuraisingham, Gal Lavee, Elisa Bertino, Jianping Fan 0001, Latifur Khan |
Access control, confidentiality and privacy for video surveillance databases. |
SACMAT |
2006 |
DBLP DOI BibTeX RDF |
video and surveillance, privacy, access control, confidentiality |
50 | Joachim Biskup, Piero A. Bonatti |
Controlled query evaluation for enforcing confidentiality in complete information systems. |
Int. J. Inf. Sec. |
2004 |
DBLP DOI BibTeX RDF |
Complete information system, Confidentiality, Inference control, Lying, Refusal |
50 | Tobin Jackson, Delbert Hart |
Data decoys for confidentiality in a distributed computation: matrix multiplication. |
ACM Southeast Regional Conference |
2004 |
DBLP DOI BibTeX RDF |
data decoys, distributed computation, confidentiality |
50 | Seda F. Gürses, Jens H. Jahnke, Christina Obry, Adeniyi Onabajo, Thomas Santen, Morgan Price |
Eliciting confidentiality requirements in practice. |
CASCON |
2005 |
DBLP BibTeX RDF |
|
43 | Han Tang, Bruce M. McMillin |
Security of Information Flow in the Electric Power Grid. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
information flow, confidentiality, power grid, Cyber-physical systems |
43 | Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee 0001, Jong In Lim 0001 |
Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
encrypt-then-sign, authenticity, confidentiality, non-repudiation, signcryption, authenticated encryption, public verifiability |
43 | Kimberly Lochner, Stephanie Bartee, Gloria Wheatcroft, Christine Cox |
A Practical Approach to Balancing Data Confidentiality and Research Needs: The NHIS Linked Mortality Files. |
Privacy in Statistical Databases |
2008 |
DBLP DOI BibTeX RDF |
health surveys, confidentiality, record linkage, mortality |
43 | Bart Jacobs 0001, Wolter Pieters, Martijn Warnier |
Statically checking confidentiality via dynamic labels. |
WITS |
2005 |
DBLP DOI BibTeX RDF |
(Higher Order) theorem proving, formal verification, static analysis, abstract interpretation, confidentiality |
43 | X. C. Dellanoy, C. Del Vigna |
Binary Integrity Constraints Against Confidentiality. |
DEXA |
1996 |
DBLP DOI BibTeX RDF |
Discretionary Models of Confidentiality, Integrity Constraints, Relational Model, Covert Channel |
43 | Xavier C. Delannoy |
Understanding the Tension between Transition Rules and Confidentiality. |
BNCOD |
1996 |
DBLP DOI BibTeX RDF |
Discretionary Models of Confidentiality, Transition Integrity Constraints, Relational Model, Covert Channel |
42 | Muhammad Adnan Tariq, Boris Koldehofe, Ala Altaweel, Kurt Rothermel |
Providing basic security mechanisms in broker-less publish/subscribe systems. |
DEBS |
2010 |
DBLP DOI BibTeX RDF |
security, P2P, publish/subscribe |
42 | Baihua Zheng, Wang-Chien Lee, Peng Liu 0005, Dik Lun Lee, Xuhua Ding |
Tuning On-Air Signatures for Balancing Performance and Confidentiality. |
IEEE Trans. Knowl. Data Eng. |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Adeniyi Onabajo, Jens H. Jahnke |
Modelling and Reasoning for Confidentiality Requirements in Software Development. |
ECBS |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Giampaolo Bella, Stefano Bistarelli |
Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks. |
Security Protocols Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
42 | Johnathan M. Reason, David G. Messerschmitt |
The Impact of Confidentiality on Quality of Service in Heterogeneous Voice over IP Networks. |
MMNS |
2001 |
DBLP DOI BibTeX RDF |
|
42 | Jim J. Longstaff, Mike A. Lockyer, M. G. Thick |
A model of accountability, confidentiality and override for healthcare and other applications. |
ACM Workshop on Role-Based Access Control |
2000 |
DBLP DOI BibTeX RDF |
|
42 | John P. Nestor, E. S. Lee |
Prerequisite Confidentiality. |
CCS |
1994 |
DBLP DOI BibTeX RDF |
|
36 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
On the Security of Identity Based Ring Signcryption Schemes. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Ring Signcryption, Adaptive Chosen Ciphertext Attack, Cryptanalysis, Provable Security, Confidentiality, Bilinear Pairing, Random Oracle Model, Chosen Plaintext Attack |
36 | Oliver Jung, Christoph Ruland |
Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks. |
CHES |
1999 |
DBLP DOI BibTeX RDF |
SDH/SONET, Cryptography, Encryption, Confidentiality, Modes of Operation, Broadband Networks, Self-Synchronization |
36 | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei |
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. |
Wirel. Networks |
2006 |
DBLP DOI BibTeX RDF |
Probabilistic authentication, Wireless sensor networks, Key management, Confidentiality, Energy saving, Information leakage |
36 | Gernot Armin Liebchen, Martin J. Shepperd |
Software Productivity Analysis of a Large Data Set and Issues of Confidentiality and Data Quality. |
IEEE METRICS |
2005 |
DBLP DOI BibTeX RDF |
confidentiality, data quality, software productivity |
36 | Mads Dam, Pablo Giambiagi |
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol. |
CSFW |
2000 |
DBLP DOI BibTeX RDF |
information flow, confidentiality, Mobile code |
36 | Jeremy Jacob |
A Uniform Presentation of Confidentiality Properties. |
IEEE Trans. Software Eng. |
1991 |
DBLP DOI BibTeX RDF |
confidentiality properties, information-flow properties, probabilistic security properties, security of data, composability, security property |
35 | Pavol Cerný, Rajeev Alur |
Automated Analysis of Java Methods for Confidentiality. |
CAV |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Sameer Pai, Sergio A. Bermudez, Stephen B. Wicker, Marci Meingast, Tanya G. Roosta, Shankar Sastry 0001, Deirdre K. Mulligan |
Transactional Confidentiality in Sensor Networks. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milos Prvulovic, Yan Solihin |
Single-level integrity and confidentiality protection for distributed shared memory multiprocessors. |
HPCA |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Jun Luo 0001, Panagiotis Papadimitratos, Jean-Pierre Hubaux |
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries. |
SECON |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Adeniyi Onabajo, Jens H. Weber-Jahnke |
Stratified Modelling and Analysis of Confidentiality Requirements. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Austin Rogers, Milena Milenkovic, Aleksandar Milenkovic |
A low overhead hardware technique for software integrity and confidentiality. |
ICCD |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Thomas Santen |
A Formal Framework for Confidentiality-Preserving Refinement. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao, Ashraf U. Kazi |
Attacking Confidentiality: An Agent Based Approach. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Miguel León Chávez, Carlos Hernández Rosete, Francisco Rodríguez-Henríquez |
Achieving Confidentiality Security Service for CAN. |
CONIELECOMP |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Fangyong Hou, Zhiying Wang, Yuhua Tang, Zhen Liu |
Protecting integrity and confidentiality for data communication. |
ISCC |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Thomas Santen, Maritta Heisel, Andreas Pfitzmann |
Confidentiality-Preserving Refinement is Compositional - Sometimes. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Giampaolo Bella, Stefano Bistarelli |
Soft Constraints for Security Protocol Analysis: Confidentiality. |
PADL |
2001 |
DBLP DOI BibTeX RDF |
|
35 | Cynthia Dwork |
The Future of the Journal of Privacy and Confidentiality. |
J. Priv. Confidentiality |
2018 |
DBLP DOI BibTeX RDF |
|
35 | Lars Vilhuber |
Relaunching the Journal of Privacy and Confidentiality. |
J. Priv. Confidentiality |
2018 |
DBLP DOI BibTeX RDF |
|
35 | Satkartar K. Kinney, Jerome P. Reiter, James O. Berger |
Model Selection when multiple imputation is used to protect confidentiality in public use data. |
J. Priv. Confidentiality |
2011 |
DBLP DOI BibTeX RDF |
|
35 | Jennifer H. Madans |
Use of Administrative Records and the Privacy-Confidentiality Trade-off. |
J. Priv. Confidentiality |
2011 |
DBLP DOI BibTeX RDF |
|
35 | Kenneth Prewitt |
Why It Matters to Distinguish Between Privacy and Confidentiality. |
J. Priv. Confidentiality |
2011 |
DBLP DOI BibTeX RDF |
|
35 | Gerald W. Gates |
How Uncertainty about Privacy and Confidentiality is Hampering Efforts to More Effectively Use Administrative Records in Producing U.S. National Statistics. |
J. Priv. Confidentiality |
2011 |
DBLP DOI BibTeX RDF |
|
35 | Stephen E. Fienberg |
Toward a Reconceptualization of Confidentiality Protection in the Context of Linkages with Administrative Records. |
J. Priv. Confidentiality |
2011 |
DBLP DOI BibTeX RDF |
|
35 | Avinash C. Singh |
Maintaining Analytic Utility while Protecting Confidentiality of Survey and Nonsurvey Data. |
J. Priv. Confidentiality |
2010 |
DBLP DOI BibTeX RDF |
|
35 | Satkartar K. Kinney, Alan F. Karr, Joe Fred Gonzalez Jr. |
Data Confidentiality: The Next Five Years Summary and Guide to Papers. |
J. Priv. Confidentiality |
2010 |
DBLP DOI BibTeX RDF |
|
35 | Stephen E. Fienberg |
The Relevance or Irrelevance of Weights for Confidentiality and Statistical Analyses. |
J. Priv. Confidentiality |
2010 |
DBLP DOI BibTeX RDF |
|
35 | Margo J. Anderson, William Seltzer |
Federal Statistical Confidentiality and Business Data: Twentieth Century Challenges and Continuing Issues. |
J. Priv. Confidentiality |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Alysson Neves Bessani, Eduardo Adílio Pelinson Alchieri, Miguel Correia 0001, Joni da Silva Fraga |
DepSpace: a byzantine fault-tolerant coordination service. |
EuroSys |
2008 |
DBLP DOI BibTeX RDF |
confidentiality, byzantine fault tolerance, tuple space |
29 | Rita Noumeir, Alain Lemay, Jean-Marc Lina |
Pseudonymization of Radiology Data for Research Purposes. |
J. Digit. Imaging |
2007 |
DBLP DOI BibTeX RDF |
Research database, de-identification, nominative health care data, security, privacy, medical imaging, confidentiality, pseudonymization, radiology |
29 | Zang Li, Wenyuan Xu 0001, Robert D. Miller, Wade Trappe |
Securing wireless systems via lower layer enforcements. |
Workshop on Wireless Security |
2006 |
DBLP DOI BibTeX RDF |
wireless channel estimation, authentication, confidentiality, propagation, key establishment, fading |
29 | Natalie Shlomo, Caroline Young |
Statistical Disclosure Control Methods Through a Risk-Utility Framework. |
Privacy in Statistical Databases |
2006 |
DBLP DOI BibTeX RDF |
R-U Confidentiality Map, Information loss, Disclosure risk |
29 | Joachim Biskup, Piero A. Bonatti |
Controlled Query Evaluation with Open Queries for a Decidable Relational Submodel. |
FoIKS |
2006 |
DBLP DOI BibTeX RDF |
Complete information system, Open query, Safe query, Domain-independent query, Bernays-Schönfinkel class, Completeness test, Relational database, Confidentiality, First-order logic, Finite model theory, Guarded fragment, Lying, Refusal, Implication problem, Controlled query evaluation |
29 | Reouven Elbaz, Lionel Torres, Gilles Sassatelli, Pierre Guillemin, Michel Bardouillet, Albert Martinez |
A parallelized way to provide data encryption and integrity checking on a processor-memory bus. |
DAC |
2006 |
DBLP DOI BibTeX RDF |
bus encryption, data confidentiality and integrity, architectures |
29 | Aleksandra B. Slavkovic, Stephen E. Fienberg |
Bounds for Cell Entries in Two-Way Tables Given Conditional Relative Frequencies. |
Privacy in Statistical Databases |
2004 |
DBLP DOI BibTeX RDF |
Markov bases, Linear programming, Integer programming, Confidentiality, Statistical disclosure control, Contingency tables, Tabular data |
29 | Jim Burridge |
Information preserving statistical obfuscation. |
Stat. Comput. |
2003 |
DBLP DOI BibTeX RDF |
multivariate multiple regression model, decomposable graphical models, confidentiality, contingency tables, disclosure, data perturbation, sufficient statistics |
29 | Subramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran |
Responsive Security for Stored Data. |
IEEE Trans. Parallel Distributed Syst. |
2003 |
DBLP DOI BibTeX RDF |
distributed storage service, Security, data integrity, replication, availability, secret sharing, confidentiality, Byzantine fault tolerance |
29 | Andrei Sabelfeld, Andrew C. Myers |
A Model for Delimited Information Release. |
ISSS |
2003 |
DBLP DOI BibTeX RDF |
Computer security, information flow, security policies, confidentiality, noninterference, declassification, security-type systems |
29 | Subramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran |
Responsive Security for Stored Data. |
ICDCS |
2003 |
DBLP DOI BibTeX RDF |
distributed storage service, Security, data integrity, replication, availability, secret sharing, confidentiality, Byzantine fault tolerance |
29 | Martin S. Olivier |
Database Privacy. |
SIGKDD Explor. |
2002 |
DBLP DOI BibTeX RDF |
dataveillance, integrity, availability, confidentiality, personal data, database privacy |
29 | Giampaolo Bella |
Mechanising a Protocol for Smart Cards. |
E-smart |
2001 |
DBLP DOI BibTeX RDF |
smart card protocols, Inductive Approach, authentication, confidentiality, key distribution |
29 | Kapali Viswanathan, Colin Boyd, Ed Dawson |
An Analysis of Integrity Services in Protocols. |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
representation of cryptologic goals, integrity, Confidentiality |
29 | Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 |
Encrypted Message Authentication by Firewalls. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption |
29 | Simon N. Foley, Jeremy Jacob |
Specifying security for CSCW systems. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
confidentiality security, formal specification, formal specification, specification, groupware, safety, security of data, functionality, CSCW systems |
29 | Molka Gharbaoui, Francesco Paolucci, Barbara Martini, Filippo Cugini, Piero Castoldi |
Behavior-Based Policies for Preserving Confidentiality in PCE-based Multi-domain MPLS Networks. |
POLICY |
2011 |
DBLP DOI BibTeX RDF |
PCE, Policies, Confidentiality, XACML |
29 | Venki Balasubramanian, Doan B. Hoang, Tanveer A. Zia |
Addressing the Confidentiality and Integrity of Assistive Care Loop Framework Using Wireless Sensor Networks. |
ICSEng |
2011 |
DBLP DOI BibTeX RDF |
Body Area Wireless Sensor Network, ACLF, Privacy, Integrity, Healthcare, Confidentiality |
29 | Aljosa Jerman-Blazic, Svetlana Saljic |
Confidentiality Labeling Using Structured Data Types. |
ICDS |
2010 |
DBLP DOI BibTeX RDF |
confidentiality label, classified data, XML, component, security domain |
29 | Wei Jiang, Wensheng Guo, Nan Sang |
Periodic Real-Time Message Scheduling for Confidentiality-Aware Cyber-Physical System in Wireless Networks. |
FCST |
2010 |
DBLP DOI BibTeX RDF |
Security-critical Cyber-Physical System, Confidentiality-aware, Periodic Message scheduling, Wireless networks |
29 | Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano |
Private-Key Hidden Vector Encryption with Key Confidentiality. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
private-key predicate encryption, key confidentiality |
28 | Benjamin Monate, Julien Signoles |
Slicing for Security of Code. |
TRUST |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Sabu Emmanuel, Mohan S. Kankanhalli |
Mask-based fingerprinting scheme for digital video broadcasting. |
Multim. Tools Appl. |
2006 |
DBLP DOI BibTeX RDF |
Video security, Video on demand, Digital watermarks, Copyright protection, MPEG-2, Video watermarking, Pay TV, Digital video broadcasting |
28 | Siu Fung Yeung, John C. S. Lui, David K. Y. Yau |
A multikey secure multimedia proxy using asymmetric reversible parametric sequences: theory, design, and implementation. |
IEEE Trans. Multim. |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Anindya Banerjee 0001, David A. Naumann |
Using Access Control for Secure Information Flow in a Java-like Language. |
CSFW |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Axel Schairer |
Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems. |
SPC |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Siu Fung Yeung, John C. S. Lui, David K. Y. Yau |
A case for a multi-key secure video proxy: theory, design, and implementation. |
ACM Multimedia |
2002 |
DBLP DOI BibTeX RDF |
asymmetric parametric sequence functions, multi-key RSA, video proxy, security |
28 | Alexander W. Dent |
A Brief History of Security Models for Confidentiality. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Jiefei Ma, Alessandra Russo, Krysia Broda, Emil Lupu |
Multi-agent planning with confidentiality. |
AAMAS (2) |
2009 |
DBLP BibTeX RDF |
|
28 | Wai-Pun Ken Yiu, Shueng-Han Gary Chan |
Offering data confidentiality for multimedia overlay multicast: Design and analysis. |
ACM Trans. Multim. Comput. Commun. Appl. |
2008 |
DBLP DOI BibTeX RDF |
performance analysis, Key management, overlay multicast, multicast security |
28 | Marcus Völp |
Statically Checking Confidentiality of Shared Memory Programs with Dynamic Labels. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
information flow, language-based security |
28 | Taiming Feng, Chuang Wang 0002, Wensheng Zhang 0001, Lu Ruan 0001 |
Confidentiality Protection for Distributed Sensor Data Aggregation. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Ayse Morali, Emmanuele Zambon, Sandro Etalle, Paul L. O. Re |
IT confidentiality risk assessment for an architecture-based approach. |
BDIM |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, Anne Anderson |
Obligations for Privacy and Confidentiality in Distributed Transactions. |
EUC Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Ashwin Swaminathan, Yinian Mao, Guan-Ming Su, Hongmei Gou, Avinash L. Varna, Shan He 0002, Min Wu 0001, Douglas W. Oard |
Confidentiality-preserving rank-ordered search. |
StorageSS |
2007 |
DBLP DOI BibTeX RDF |
encrypted domain search, secure index, ranked retrieval |
28 | Guoqiang Shu, David Lee 0001 |
Message Confidentiality Testing of Security Protocols - Passive Monitoring and Active Checking. |
TestCom |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Dachuan Yu, Nayeem Islam |
A Typed Assembly Language for Confidentiality. |
ESOP |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Han Gao 0002, Hanne Riis Nielson |
Analysis of LYSA-calculus with explicit confidentiality annotations. |
AINA (2) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph |
Abstractions Preserving Parameter Confidentiality. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Tetsu Iwata, Tadayoshi Kohno |
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Alan F. Karr, Adrian Dobra, Ashish P. Sanil |
Table servers protect confidentiality in tabular data releases. |
Commun. ACM |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Maritta Heisel, Andreas Pfitzmann, Thomas Santen |
Confidentiality-Preserving Refinement. |
CSFW |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer |
Authentication and Confidentiality via IPSEC. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
|
28 | Claude Crépeau |
A Zero-Knowledge Poker Protocol That Achieves Confidentiality of the Players' Strategy or How to Achieve an Electronic Poker Face. |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
|
22 | Pierangela Samarati, Sabrina De Capitani di Vimercati |
Data protection in outsourcing scenarios: issues and directions. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
privacy, access control, encryption, confidentiality, data protection, data outsourcing, data fragmentation |
22 | Sahel Alouneh, Abdeslam En-Nouaary, Anjali Agarwal |
MPLS security: an approach for unicast and multicast environments. |
Ann. des Télécommunications |
2009 |
DBLP DOI BibTeX RDF |
Threshold secret sharing scheme, Security, Confidentiality, MPLS |
Displaying result #1 - #100 of 2507 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|