Displaying results 1 to 20 out of 10175

 Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Next >
Leakage-Resilient Layout Randomization for Mobile Devices
Kjell Braden, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Christopher Liebchen, Ahmad-Reza Sadeghi
In: 23nd Annual Network & Distributed System Security Symposium (NDSS), 2016.

On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks
Jörg Daubert, Tim Grube, Max Mühlhäuser, Mathias Fischer
In: IEEE: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), p. to be presented, IEEE, Januar 2016.

Andrea Abel and Christian M. Meyer
In: Annette Klosa: Handbuch Internetlexikografie, chap. 8, p. (to appear), Berlin: Akademie, 2016.

IOT: Using Channel State Information for Tamper Detection in the Internet of Things
Ibrahim Ethem Bagci, Utz Roedig, Ivan Martinovic, Matthias Schulz and Matthias Hollick
In: 31st Annual Computer Security Applications Conference (ACSAC 2015), Dezember 2015.

Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing
Peter Mayer, Melanie Volkamer
In: Annual Computer Security Applications Conference 2015, Dezember 2015.

IIT-TUDA: System for Sentiment Analysis in Indian Languages using Lexical Acquisition
Ayush Kumar, Sarah Kohail, Asif Ekbal, Chris Biemann
In: The Third International Conference on Mining Intelligence and Knowledge Exploration, Dezember 2015.

Detection and Forensics of Domains Hijacking
Andreas Borgwart, Spyros Boukoros, Haya Shulman, Michael Waidner, Carel van Royeen
In: IEEE Global Communications Conference, IEEE, Dezember 2015.

SkipMon: a Locality-Aware Collaborative Intrusion Detection System
Emmanouil Vasilomanolakis, Matthias Kruegl, Carlos Garcia Cordero, Max Mühlhäuser, Mathias Fischer
In: International Performance Computing and Communications Conference (IPCCC), IEEE, Dezember 2015.

Extrinsic Evaluation of Topic Models on Unknown Corpora
Carsten Schnober, Iryna Gurevych
In: (TO APPEAR): (TO APPEAR), (TO APPEAR), vol. (TO APPEAR), no. (TO APPEAR), p. (TO APPEAR), (TO APPEAR), Dezember 2015.

Capricate: A Fabrication Pipeline to Design and 3D Print Capacitive Touch Sensors for Interactive Objects
Martin Schmitz, Mohammadreza Khalilbeigi, Matthias Balwierz, Roman Lissermann, Max Mühlhäuser, Jürgen Steimle
In: UIST '15, Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology, p. 253-258, ACM, November 2015. ISBN 978-1-4503-3779-3.

Rating Decomposition with Conjoint Analysis and Machine Learning
Florian Volk, Nadine Trüschler, Max Mühlhäuser
In: CENTRIC 2015, November 2015.

Upgrading Wireless Home Routers for Enabling Large-scale Deployment of Cloudlets
Christian Meurisch, Alexander Seeliger, Benedikt Schmidt, Immanuel Schweizer, Fabian Kaup, Max Mühlhäuser
In: Proceedings of the 7th International Conference on Mobile Computing, Applications and Services (MobiCASE'15), Springer, November 2015.

Design Principles for HFEv- based Signature Schemes
Albrecht Petzoldt, Ming-Shing Cheng, Bo-Yin Yang, Tao Chengdong, Jintai Ding
In: LNCS, ASIACRYPT 2015 - Part I - 21st International Conference on the Theory and Application of Cryptology and Information Security, no. 9452, p. 1-24, Springer, November 2015.

"I Am Because We Are": Developing and Nurturing an African Digital Security Culture
Karen Renaud, Stephen Flowerday, Lotfi ben Othmane, Melanie Volkamer
In: African Cyber Citizenship Conference 2015, November 2015.

On the Optimality of Differential Fault Analyses on CLEFIA
Ágnes Kiss, Anke Stüber, Juliane Krämer
In: LNCS, MACIS 2015 - Sixth International Conference on Mathematical Aspects of Computer and Information Sciences, p. 19, Springer, November 2015.

Factors of Difficulty in German Language Proficiency Tests
Lisa Beinborn and Torsten Zesch and Iryna Gurevych
Book of Abstracts: Language, Learning, Technologgy Conference, November 2015.

A Spatiotemporal Approach for Social Situation Recognition
Christian Meurisch, Tahir Hussain, Artur Gogel, Benedikt Schmidt, Immanuel Schweizer, Max Mühlhäuser
In: Proceedings of Workshop on Situation Recognition by Mining Temporal Information, Springer, November 2015.

Upgrading Wireless Home Routers as Emergency Cloudlet: A Runtime Measurement
Christian Meurisch, Ashwinkumar Yakkundimath, Benedikt Schmidt, Max Mühlhäuser
In: Proceedings of the 7th International Conference on Mobile Computing, Applications and Services (MobiCASE'15), Springer, November 2015.

Learning With Errors in the Exponent
Özgür Dagdelen, Sebastian Gajek, Florian Göpfert
In: LNCS, 18th International Conference on information Security and Cryptology (ICISC) 2015, Springer, November 2015.

Body-worn Cameras for Police Accountability: Opportunities and Risks
Fanny Coudert, Denis Butin, Daniel Le Métayer
In: Computer Law & Security Review (CLSR), vol. 31, no. 6, p. 749-762, November 2015.

 Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Next >

[Export this query result to XML]

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Suche Suche | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang