The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for confidentiality with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1985 (16) 1986-1990 (16) 1991-1994 (23) 1995-1996 (27) 1997 (20) 1998 (18) 1999 (29) 2000 (41) 2001 (40) 2002 (52) 2003 (91) 2004 (130) 2005 (176) 2006 (212) 2007 (199) 2008 (200) 2009 (167) 2010 (76) 2011 (81) 2012 (62) 2013 (59) 2014 (65) 2015 (61) 2016 (65) 2017 (58) 2018 (82) 2019 (91) 2020 (83) 2021 (93) 2022 (78) 2023 (82) 2024 (14)
Publication types (Num. hits)
article(774) incollection(28) inproceedings(1665) phdthesis(40)
Venues (Conferences, Journals, ...)
J. Priv. Confidentiality(181) CoRR(76) Privacy in Statistical Databas...(28) ARES(26) CSFW(23) ESORICS(22) DBSec(20) IACR Cryptol. ePrint Arch.(19) ACSAC(18) CCS(17) S&P(17) HICSS(16) AsiaCCS(15) ISCC(13) ITNG(12) IEEE Access(11) More (+10 of total 1048)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1928 occurrences of 929 keywords

Results
Found 2507 publication records. Showing 2507 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
64Johs Hansen Hammer, Gerardo Schneider On the Definition and Policies of Confidentiality. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF policies, confidentiality, norms
64Adeniyi Onabajo, Jens H. Jahnke Properties of Confidentiality Requirements. Search on Bibsonomy CBMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
57Renaud De Landtsheer, Axel van Lamsweerde Reasoning about confidentiality at requirements engineering time. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF reasoning about confidentiality, bounded model checking, security requirements, specification patterns
57Joachim Biskup, Piero A. Bonatti Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Potential secret, Combined refusal and lying, Policy, Confidentiality, Inference control, Secrecy, Lying, Refusal, Controlled query evaluation
57Andrei Sabelfeld Confidentiality for Multithreaded Programs via Bisimulation. Search on Bibsonomy Ershov Memorial Conference The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
57Jim J. Longstaff, Mike A. Lockyer, John Nicholas The tees confidentiality model: an authorisation model for identities and roles. Search on Bibsonomy SACMAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
50Joachim Biskup, Torben Weibert Confidentiality Policies for Controlled Query Evaluation. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF confidentiality policies, Inference control, logic databases
50Joachim Biskup, Jan-Hendrik Lochner Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF potential secrets, Access control, relational databases, policy, information flow, confidentiality, database security, inference control
50Bhavani Thuraisingham, Gal Lavee, Elisa Bertino, Jianping Fan 0001, Latifur Khan Access control, confidentiality and privacy for video surveillance databases. Search on Bibsonomy SACMAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF video and surveillance, privacy, access control, confidentiality
50Joachim Biskup, Piero A. Bonatti Controlled query evaluation for enforcing confidentiality in complete information systems. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Complete information system, Confidentiality, Inference control, Lying, Refusal
50Tobin Jackson, Delbert Hart Data decoys for confidentiality in a distributed computation: matrix multiplication. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF data decoys, distributed computation, confidentiality
50Seda F. Gürses, Jens H. Jahnke, Christina Obry, Adeniyi Onabajo, Thomas Santen, Morgan Price Eliciting confidentiality requirements in practice. Search on Bibsonomy CASCON The full citation details ... 2005 DBLP  BibTeX  RDF
43Han Tang, Bruce M. McMillin Security of Information Flow in the Electric Power Grid. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF information flow, confidentiality, power grid, Cyber-physical systems
43Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee 0001, Jong In Lim 0001 Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF encrypt-then-sign, authenticity, confidentiality, non-repudiation, signcryption, authenticated encryption, public verifiability
43Kimberly Lochner, Stephanie Bartee, Gloria Wheatcroft, Christine Cox A Practical Approach to Balancing Data Confidentiality and Research Needs: The NHIS Linked Mortality Files. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2008 DBLP  DOI  BibTeX  RDF health surveys, confidentiality, record linkage, mortality
43Bart Jacobs 0001, Wolter Pieters, Martijn Warnier Statically checking confidentiality via dynamic labels. Search on Bibsonomy WITS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF (Higher Order) theorem proving, formal verification, static analysis, abstract interpretation, confidentiality
43X. C. Dellanoy, C. Del Vigna Binary Integrity Constraints Against Confidentiality. Search on Bibsonomy DEXA The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Discretionary Models of Confidentiality, Integrity Constraints, Relational Model, Covert Channel
43Xavier C. Delannoy Understanding the Tension between Transition Rules and Confidentiality. Search on Bibsonomy BNCOD The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Discretionary Models of Confidentiality, Transition Integrity Constraints, Relational Model, Covert Channel
42Muhammad Adnan Tariq, Boris Koldehofe, Ala Altaweel, Kurt Rothermel Providing basic security mechanisms in broker-less publish/subscribe systems. Search on Bibsonomy DEBS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security, P2P, publish/subscribe
42Baihua Zheng, Wang-Chien Lee, Peng Liu 0005, Dik Lun Lee, Xuhua Ding Tuning On-Air Signatures for Balancing Performance and Confidentiality. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
42Adeniyi Onabajo, Jens H. Jahnke Modelling and Reasoning for Confidentiality Requirements in Software Development. Search on Bibsonomy ECBS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Giampaolo Bella, Stefano Bistarelli Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
42Johnathan M. Reason, David G. Messerschmitt The Impact of Confidentiality on Quality of Service in Heterogeneous Voice over IP Networks. Search on Bibsonomy MMNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
42Jim J. Longstaff, Mike A. Lockyer, M. G. Thick A model of accountability, confidentiality and override for healthcare and other applications. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
42John P. Nestor, E. S. Lee Prerequisite Confidentiality. Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
36S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan On the Security of Identity Based Ring Signcryption Schemes. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Ring Signcryption, Adaptive Chosen Ciphertext Attack, Cryptanalysis, Provable Security, Confidentiality, Bilinear Pairing, Random Oracle Model, Chosen Plaintext Attack
36Oliver Jung, Christoph Ruland Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF SDH/SONET, Cryptography, Encryption, Confidentiality, Modes of Operation, Broadband Networks, Self-Synchronization
36Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Search on Bibsonomy Wirel. Networks The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Probabilistic authentication, Wireless sensor networks, Key management, Confidentiality, Energy saving, Information leakage
36Gernot Armin Liebchen, Martin J. Shepperd Software Productivity Analysis of a Large Data Set and Issues of Confidentiality and Data Quality. Search on Bibsonomy IEEE METRICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF confidentiality, data quality, software productivity
36Mads Dam, Pablo Giambiagi Confidentiality for Mobile Code: The Case of a Simple Payment Protocol. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF information flow, confidentiality, Mobile code
36Jeremy Jacob A Uniform Presentation of Confidentiality Properties. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF confidentiality properties, information-flow properties, probabilistic security properties, security of data, composability, security property
35Pavol Cerný, Rajeev Alur Automated Analysis of Java Methods for Confidentiality. Search on Bibsonomy CAV The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Sameer Pai, Sergio A. Bermudez, Stephen B. Wicker, Marci Meingast, Tanya G. Roosta, Shankar Sastry 0001, Deirdre K. Mulligan Transactional Confidentiality in Sensor Networks. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milos Prvulovic, Yan Solihin Single-level integrity and confidentiality protection for distributed shared memory multiprocessors. Search on Bibsonomy HPCA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Jun Luo 0001, Panagiotis Papadimitratos, Jean-Pierre Hubaux GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries. Search on Bibsonomy SECON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Adeniyi Onabajo, Jens H. Weber-Jahnke Stratified Modelling and Analysis of Confidentiality Requirements. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Austin Rogers, Milena Milenkovic, Aleksandar Milenkovic A low overhead hardware technique for software integrity and confidentiality. Search on Bibsonomy ICCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Thomas Santen A Formal Framework for Confidentiality-Preserving Refinement. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao, Ashraf U. Kazi Attacking Confidentiality: An Agent Based Approach. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Miguel León Chávez, Carlos Hernández Rosete, Francisco Rodríguez-Henríquez Achieving Confidentiality Security Service for CAN. Search on Bibsonomy CONIELECOMP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Fangyong Hou, Zhiying Wang, Yuhua Tang, Zhen Liu Protecting integrity and confidentiality for data communication. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Thomas Santen, Maritta Heisel, Andreas Pfitzmann Confidentiality-Preserving Refinement is Compositional - Sometimes. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
35Giampaolo Bella, Stefano Bistarelli Soft Constraints for Security Protocol Analysis: Confidentiality. Search on Bibsonomy PADL The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
35Cynthia Dwork The Future of the Journal of Privacy and Confidentiality. Search on Bibsonomy J. Priv. Confidentiality The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
35Lars Vilhuber Relaunching the Journal of Privacy and Confidentiality. Search on Bibsonomy J. Priv. Confidentiality The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
35Satkartar K. Kinney, Jerome P. Reiter, James O. Berger Model Selection when multiple imputation is used to protect confidentiality in public use data. Search on Bibsonomy J. Priv. Confidentiality The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
35Jennifer H. Madans Use of Administrative Records and the Privacy-Confidentiality Trade-off. Search on Bibsonomy J. Priv. Confidentiality The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
35Kenneth Prewitt Why It Matters to Distinguish Between Privacy and Confidentiality. Search on Bibsonomy J. Priv. Confidentiality The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
35Gerald W. Gates How Uncertainty about Privacy and Confidentiality is Hampering Efforts to More Effectively Use Administrative Records in Producing U.S. National Statistics. Search on Bibsonomy J. Priv. Confidentiality The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
35Stephen E. Fienberg Toward a Reconceptualization of Confidentiality Protection in the Context of Linkages with Administrative Records. Search on Bibsonomy J. Priv. Confidentiality The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
35Avinash C. Singh Maintaining Analytic Utility while Protecting Confidentiality of Survey and Nonsurvey Data. Search on Bibsonomy J. Priv. Confidentiality The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
35Satkartar K. Kinney, Alan F. Karr, Joe Fred Gonzalez Jr. Data Confidentiality: The Next Five Years Summary and Guide to Papers. Search on Bibsonomy J. Priv. Confidentiality The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
35Stephen E. Fienberg The Relevance or Irrelevance of Weights for Confidentiality and Statistical Analyses. Search on Bibsonomy J. Priv. Confidentiality The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
35Margo J. Anderson, William Seltzer Federal Statistical Confidentiality and Business Data: Twentieth Century Challenges and Continuing Issues. Search on Bibsonomy J. Priv. Confidentiality The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Alysson Neves Bessani, Eduardo Adílio Pelinson Alchieri, Miguel Correia 0001, Joni da Silva Fraga DepSpace: a byzantine fault-tolerant coordination service. Search on Bibsonomy EuroSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF confidentiality, byzantine fault tolerance, tuple space
29Rita Noumeir, Alain Lemay, Jean-Marc Lina Pseudonymization of Radiology Data for Research Purposes. Search on Bibsonomy J. Digit. Imaging The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Research database, de-identification, nominative health care data, security, privacy, medical imaging, confidentiality, pseudonymization, radiology
29Zang Li, Wenyuan Xu 0001, Robert D. Miller, Wade Trappe Securing wireless systems via lower layer enforcements. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF wireless channel estimation, authentication, confidentiality, propagation, key establishment, fading
29Natalie Shlomo, Caroline Young Statistical Disclosure Control Methods Through a Risk-Utility Framework. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2006 DBLP  DOI  BibTeX  RDF R-U Confidentiality Map, Information loss, Disclosure risk
29Joachim Biskup, Piero A. Bonatti Controlled Query Evaluation with Open Queries for a Decidable Relational Submodel. Search on Bibsonomy FoIKS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Complete information system, Open query, Safe query, Domain-independent query, Bernays-Schönfinkel class, Completeness test, Relational database, Confidentiality, First-order logic, Finite model theory, Guarded fragment, Lying, Refusal, Implication problem, Controlled query evaluation
29Reouven Elbaz, Lionel Torres, Gilles Sassatelli, Pierre Guillemin, Michel Bardouillet, Albert Martinez A parallelized way to provide data encryption and integrity checking on a processor-memory bus. Search on Bibsonomy DAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bus encryption, data confidentiality and integrity, architectures
29Aleksandra B. Slavkovic, Stephen E. Fienberg Bounds for Cell Entries in Two-Way Tables Given Conditional Relative Frequencies. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Markov bases, Linear programming, Integer programming, Confidentiality, Statistical disclosure control, Contingency tables, Tabular data
29Jim Burridge Information preserving statistical obfuscation. Search on Bibsonomy Stat. Comput. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF multivariate multiple regression model, decomposable graphical models, confidentiality, contingency tables, disclosure, data perturbation, sufficient statistics
29Subramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran Responsive Security for Stored Data. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF distributed storage service, Security, data integrity, replication, availability, secret sharing, confidentiality, Byzantine fault tolerance
29Andrei Sabelfeld, Andrew C. Myers A Model for Delimited Information Release. Search on Bibsonomy ISSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Computer security, information flow, security policies, confidentiality, noninterference, declassification, security-type systems
29Subramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran Responsive Security for Stored Data. Search on Bibsonomy ICDCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF distributed storage service, Security, data integrity, replication, availability, secret sharing, confidentiality, Byzantine fault tolerance
29Martin S. Olivier Database Privacy. Search on Bibsonomy SIGKDD Explor. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF dataveillance, integrity, availability, confidentiality, personal data, database privacy
29Giampaolo Bella Mechanising a Protocol for Smart Cards. Search on Bibsonomy E-smart The full citation details ... 2001 DBLP  DOI  BibTeX  RDF smart card protocols, Inductive Approach, authentication, confidentiality, key distribution
29Kapali Viswanathan, Colin Boyd, Ed Dawson An Analysis of Integrity Services in Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF representation of cryptologic goals, integrity, Confidentiality
29Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 Encrypted Message Authentication by Firewalls. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption
29Simon N. Foley, Jeremy Jacob Specifying security for CSCW systems. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF confidentiality security, formal specification, formal specification, specification, groupware, safety, security of data, functionality, CSCW systems
29Molka Gharbaoui, Francesco Paolucci, Barbara Martini, Filippo Cugini, Piero Castoldi Behavior-Based Policies for Preserving Confidentiality in PCE-based Multi-domain MPLS Networks. Search on Bibsonomy POLICY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF PCE, Policies, Confidentiality, XACML
29Venki Balasubramanian, Doan B. Hoang, Tanveer A. Zia Addressing the Confidentiality and Integrity of Assistive Care Loop Framework Using Wireless Sensor Networks. Search on Bibsonomy ICSEng The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Body Area Wireless Sensor Network, ACLF, Privacy, Integrity, Healthcare, Confidentiality
29Aljosa Jerman-Blazic, Svetlana Saljic Confidentiality Labeling Using Structured Data Types. Search on Bibsonomy ICDS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF confidentiality label, classified data, XML, component, security domain
29Wei Jiang, Wensheng Guo, Nan Sang Periodic Real-Time Message Scheduling for Confidentiality-Aware Cyber-Physical System in Wireless Networks. Search on Bibsonomy FCST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Security-critical Cyber-Physical System, Confidentiality-aware, Periodic Message scheduling, Wireless networks
29Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano Private-Key Hidden Vector Encryption with Key Confidentiality. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF private-key predicate encryption, key confidentiality
28Benjamin Monate, Julien Signoles Slicing for Security of Code. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Sabu Emmanuel, Mohan S. Kankanhalli Mask-based fingerprinting scheme for digital video broadcasting. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Video security, Video on demand, Digital watermarks, Copyright protection, MPEG-2, Video watermarking, Pay TV, Digital video broadcasting
28Siu Fung Yeung, John C. S. Lui, David K. Y. Yau A multikey secure multimedia proxy using asymmetric reversible parametric sequences: theory, design, and implementation. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Anindya Banerjee 0001, David A. Naumann Using Access Control for Secure Information Flow in a Java-like Language. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Axel Schairer Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Siu Fung Yeung, John C. S. Lui, David K. Y. Yau A case for a multi-key secure video proxy: theory, design, and implementation. Search on Bibsonomy ACM Multimedia The full citation details ... 2002 DBLP  DOI  BibTeX  RDF asymmetric parametric sequence functions, multi-key RSA, video proxy, security
28Alexander W. Dent A Brief History of Security Models for Confidentiality. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Jiefei Ma, Alessandra Russo, Krysia Broda, Emil Lupu Multi-agent planning with confidentiality. Search on Bibsonomy AAMAS (2) The full citation details ... 2009 DBLP  BibTeX  RDF
28Wai-Pun Ken Yiu, Shueng-Han Gary Chan Offering data confidentiality for multimedia overlay multicast: Design and analysis. Search on Bibsonomy ACM Trans. Multim. Comput. Commun. Appl. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF performance analysis, Key management, overlay multicast, multicast security
28Marcus Völp Statically Checking Confidentiality of Shared Memory Programs with Dynamic Labels. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF information flow, language-based security
28Taiming Feng, Chuang Wang 0002, Wensheng Zhang 0001, Lu Ruan 0001 Confidentiality Protection for Distributed Sensor Data Aggregation. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Ayse Morali, Emmanuele Zambon, Sandro Etalle, Paul L. O. Re IT confidentiality risk assessment for an architecture-based approach. Search on Bibsonomy BDIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, Anne Anderson Obligations for Privacy and Confidentiality in Distributed Transactions. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Ashwin Swaminathan, Yinian Mao, Guan-Ming Su, Hongmei Gou, Avinash L. Varna, Shan He 0002, Min Wu 0001, Douglas W. Oard Confidentiality-preserving rank-ordered search. Search on Bibsonomy StorageSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF encrypted domain search, secure index, ranked retrieval
28Guoqiang Shu, David Lee 0001 Message Confidentiality Testing of Security Protocols - Passive Monitoring and Active Checking. Search on Bibsonomy TestCom The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Dachuan Yu, Nayeem Islam A Typed Assembly Language for Confidentiality. Search on Bibsonomy ESOP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Han Gao 0002, Hanne Riis Nielson Analysis of LYSA-calculus with explicit confidentiality annotations. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph Abstractions Preserving Parameter Confidentiality. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Tetsu Iwata, Tadayoshi Kohno New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Alan F. Karr, Adrian Dobra, Ashish P. Sanil Table servers protect confidentiality in tabular data releases. Search on Bibsonomy Commun. ACM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Maritta Heisel, Andreas Pfitzmann, Thomas Santen Confidentiality-Preserving Refinement. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer Authentication and Confidentiality via IPSEC. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
28Claude Crépeau A Zero-Knowledge Poker Protocol That Achieves Confidentiality of the Players' Strategy or How to Achieve an Electronic Poker Face. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
22Pierangela Samarati, Sabrina De Capitani di Vimercati Data protection in outsourcing scenarios: issues and directions. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF privacy, access control, encryption, confidentiality, data protection, data outsourcing, data fragmentation
22Sahel Alouneh, Abdeslam En-Nouaary, Anjali Agarwal MPLS security: an approach for unicast and multicast environments. Search on Bibsonomy Ann. des Télécommunications The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Threshold secret sharing scheme, Security, Confidentiality, MPLS
Displaying result #1 - #100 of 2507 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license