default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 37 matches
- 2018
- Ting Chen, Youzheng Feng, Xingwei Lin, Zihao Li, Xiaosong Zhang:
DBAF: Dynamic Binary Analysis Framework and Its Applications. NSS 2018: 361-375 - Ahmed Raad Al-Sudani, Wanlei Zhou, Sheng Wen, Ahmed Al-Mansoori:
SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control. NSS 2018: 202-211 - Paola Barra, Carmen Bisogni, Michele Nappi, Stefano Ricciardi:
Fast QuadTree-Based Pose Estimation for Security Applications Using Face Biometrics. NSS 2018: 160-173 - Silvio Barra, Mirko Marras, Gianni Fenu:
Continuous Authentication on Smartphone by Means of Periocular and Virtual Keystroke. NSS 2018: 212-220 - Animesh Basak Chowdhury, Ansuman Banerjee, Bhargab B. Bhattacharya:
ATPG Binning and SAT-Based Approach to Hardware Trojan Detection for Safety-Critical Systems. NSS 2018: 391-410 - Motalib Hossain Bhuyan, Nur A. Azad, Weizhi Meng, Christian Damsgaard Jensen:
Analyzing the Communication Security Between Smartphones and IoT Based on CORAS. NSS 2018: 251-265 - Jie Cai, Han Jiang, Qiuliang Xu, Guangshi Lv, Minghao Zhao, Hao Wang:
Towards Security Authentication for IoT Devices with Lattice-Based ZK. NSS 2018: 141-150 - Aniello Castiglione, Kim-Kwang Raymond Choo, Maria De Marsico, Alessio Mecca:
Walking on the Cloud: Gait Recognition, a Wearable Solution. NSS 2018: 174-186 - Fengjun Chen, Zhiqiang Liu, Yu Long, Zhen Liu, Ning Ding:
Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain. NSS 2018: 1-15 - Yunfang Chen, Yihong Zhu, Hao Zhou, Wei Chen, Wei Zhang:
Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes Through WiFi. NSS 2018: 237-250 - Junbin Fang, Yun-Ju Huang, Frankie Li, Jing Li, Xuan Wang, Yang Xiang:
Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT. NSS 2018: 484-490 - Ibbad Hafeez, Aaron Yi Ding, Markku Antikainen, Sasu Tarkoma:
Real-Time IoT Device Activity Detection in Edge Networks. NSS 2018: 221-236 - Peter Ince, Joseph K. Liu, Peng Zhang:
Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs. NSS 2018: 32-45 - Dragos-George Ionica, Florin Pop, Aniello Castiglione:
Creating and Managing Realism in the Next-Generation Cyber Range. NSS 2018: 452-462 - Nesrine Kaaniche, Sana Belguith, Giovanni Russello:
EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control. NSS 2018: 187-201 - Junming Ke, Han Jiang, Xiangfu Song, Shengnan Zhao, Hao Wang, Qiuliang Xu:
Analysis on the Block Reward of Fork After Withholding (FAW). NSS 2018: 16-31 - Yu Li, Ivan Frasure, Ademola Ayodeji Ikusan, Junjie Zhang, Rui Dai:
Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture. NSS 2018: 266-276 - Dennis Y. W. Liu, Chi Tsiu Tong, Winnie W. M. Lam:
Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices. NSS 2018: 80-94 - Jinhui Liu, Yong Yu, Yanqi Zhao, Jianwei Jia, Shijia Wang:
An Efficient Privacy Preserving Batch Authentication Scheme with Deterable Function for VANETs. NSS 2018: 288-303 - Yemian Lu, Qi Li, Purui Su, Juan Pan, Jia Yan, Pengyi Zhan, Wei Guo:
A Comprehensive Study of Permission Usage on Android. NSS 2018: 64-79 - Xianping Mao, Xuefeng Li, Xiaochuan Wu, Chuansheng Wang, Junzuo Lai:
Anonymous Attribute-Based Conditional Proxy Re-encryption. NSS 2018: 95-110 - Weizhi Meng, Jianfeng Wang, Xianmin Wang, Joseph K. Liu, Zuoxia Yu, Jin Li, Yongjun Zhao, Sherman S. M. Chow:
Position Paper on Blockchain Technology: Smart Contract and Applications. NSS 2018: 474-483 - Jiahao Peng, Xiaobo Ma, Jianfeng Li, Lei Xue, Wenjun Hu:
Shoot at a Pigeon and Kill a Crow: On Strike Precision of Link Flooding Attacks. NSS 2018: 436-451 - Umberto Ferraro Petrillo:
Using Software Visualization for Supporting the Teaching of MapReduce. NSS 2018: 349-360 - Danni Ren, Wenti Jiang, Huakang Li, Guozi Sun:
An OpenvSwitch Extension for SDN Traceback. NSS 2018: 423-435 - Manuel Rigger, Daniel Pekarek, Hanspeter Mössenböck:
Context-Aware Failure-Oblivious Computing as a Means of Preventing Buffer Overflows. NSS 2018: 376-390 - Francisco-Javier Rodrigo-Ginés, Javier Parra-Arnau, Weizhi Meng, Yu Wang:
PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search. NSS 2018: 304-318 - Junliang Shu, Juanru Li, Yuanyuan Zhang, Dawu Gu:
Burn After Reading: Expunging Execution Footprints of Android Apps. NSS 2018: 46-63 - Tony Miu Tung, Chenxu Wang, Jinhe Wang:
Understanding the Behaviors of BGP-based DDoS Protection Services. NSS 2018: 463-473 - Amber Umair, Priyadarsi Nanda, Xiangjian He, Kim-Kwang Raymond Choo:
User Relationship Classification of Facebook Messenger Mobile Data using WEKA. NSS 2018: 337-348
skipping 7 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-24 01:34 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint