default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 28 matches
- 2020
- Chengwei Ai, Weiyu Dong, Zicong Gao:
A Novel Concolic Execution Approach on Embedded Device. ICCSP 2020: 47-52 - Hui Chen:
Quantum Relay Blockchain and Its Applications in Key Service. ICCSP 2020: 95-99 - Jing Chen, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Xingkai Wang:
Forward Secure Dynamic Searchable Symmetric Encryption with Lighter Storage. ICCSP 2020: 24-30 - Tao Chen, Guangming Zhou, Zhangpu Liu, Tao Jing:
A Novel Ensemble Anomaly based Approach for Command and Control Channel Detection. ICCSP 2020: 74-78 - Zhouping Cui, Weihai Li, Chaohai Yu, Nenghai Yu:
A New Type of Two-dimensional Anti-counterfeit Code for Document Authentication Using Neural Networks. ICCSP 2020: 68-73 - Wei Ding, Zidong Hua, Panhui Li, Qiushi Gong, Yuxi Cheng:
Botnet Host Detection Based on Heartbeat Association. ICCSP 2020: 42-46 - Nghia Duong-Trung
, Ha Xuan Son, Hai Trieu Le, Tan Tai Phan:
On Components of a Patient-centered Healthcare System Using Smart Contract. ICCSP 2020: 31-35 - Nghia Duong-Trung
, Ha Xuan Son, Hai Trieu Le, Tan Tai Phan:
Smart Care: Integrating Blockchain Technology into the Design of Patient-centered Healthcare Systems. ICCSP 2020: 105-109 - Enmei Lai, Wenjun Luo:
Static Analysis of Integer Overflow of Smart Contracts in Ethereum. ICCSP 2020: 110-115 - Jian Lin, Liehui Jiang, Chengwei Ai, Shihong Chao:
A Shape-inference-based Approach to Enhance Constraint Independence Optimization. ICCSP 2020: 141-145 - Fukang Liu, Guorui Wu, Yang Liu
:
A Privacy-Preserving Friend Recommendation Mechanism for Online Social Networks. ICCSP 2020: 63-67 - Kunyu Liu, Liang Zhou:
Routing Authentication Chain Mechanism to Resist AODV Black Hole Attacks. ICCSP 2020: 53-57 - Yihong Long, Feng Xiong:
Secret Sharing Based BLMQ Signature Generation. ICCSP 2020: 6-12 - Lianxiao Meng, Shuangyin Ren, Gaigai Tang, Chao Yang, Wu Yang:
UAV Sensor Spoofing Detection Algorithm Based on GPS and Optical Flow Fusion. ICCSP 2020: 146-151 - Martin Ocenas, Ivan Homoliak, Petr Hanácek
, Kamil Malinka
:
Security and Encryption at Modern Databases. ICCSP 2020: 19-23 - Pansilu Pitigalaarachchi, Chandana Gamage:
Efficiency Enhancements for Practical Techniques for Searches on Encrypted Data. ICCSP 2020: 13-18 - Zedong Sun, Chunxiang Gu, Yonghui Zheng:
Block Sieve Reduction: A New Random Sampling Reduction Algorithm Based on Sieve Algorithms. ICCSP 2020: 1-5 - Yonghao Wang:
A Trust Management Model for Internet of Vehicles. ICCSP 2020: 136-140 - Shuangbao Wang, Matthew Rohde, Amjad Ali:
Quantum Cryptography and Simulation: Tools and Techniques. ICCSP 2020: 36-41 - Quanmin Wang, Xuan Wei:
The Detection of Network Intrusion Based on Improved Adaboost Algorithm. ICCSP 2020: 84-88 - Shixuan Wang, Jiabin Yuan, Shudi Chen:
Quality-based Score Level Fusion for Continuous Authentication with Motion Sensor and Face. ICCSP 2020: 58-62 - Hongman Wang, Yongbin Yuan, Fangchun Yang:
A Personal Data Determination Method Based On Blockchain Technology and Smart Contract. ICCSP 2020: 89-94 - Ping Wang, Jinjiang Yang, Min Zhu, Bo Liu:
A High-throughput Low-area Entropy Source Based on Asynchronous Feedback Unit. ICCSP 2020: 131-135 - Yong Wang, Mengge Zhang, Zhengyu Zhu:
Detection of Voice Transformation Disguise Based on Deep Residual Net. ICCSP 2020: 126-130 - Xincheng Yan, Yue Chen, Yuchang Zhai, Yang Ba, Xuewei Li, Hongyong Jia:
An Encryption and Decryption Outsourcing CP-ABE scheme Supporting Efficient Ciphertext Evolution. ICCSP 2020: 116-125 - Zhongxin Yang, Zhifeng Chen, Ping Zhang, Ming Liu, Qingbao Li:
An Information Intelligent Search Method for Computer Forensics Based on Text Similarity. ICCSP 2020: 79-83 - Gang Zhao, Hui He, Bingbing Di:
Design and Implementation of the Digital Education Resources Authentication System Based on Blockchain. ICCSP 2020: 100-104 - ICCSP 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020. ACM 2020, ISBN 978-1-4503-7744-7 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-08-18 16:40 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint