X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Conference Proceeding (61) 61
Journal Article (56) 56
Patent (11) 11
Newspaper Article (7) 7
Book Chapter (3) 3
Dissertation (2) 2
Book / eBook (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
calculating (10) 10
computing (10) 10
counting (10) 10
physics (10) 10
browser (8) 8
web security (8) 8
computer science (6) 6
electric digital data processing (6) 6
bitcoin (5) 5
computer science - cryptography and security (5) 5
diagnosis (5) 5
electric communication technique (5) 5
electricity (5) 5
gewährleistung (5) 5
servers (5) 5
behavior (4) 4
blockchain (4) 4
computer communication networks (4) 4
google (4) 4
human necessities (4) 4
hygiene (4) 4
identification (4) 4
image data processing or generation, in general (4) 4
internet-sicherheit (4) 4
materials science, multidisciplinary (4) 4
medical or veterinary science (4) 4
perovskite (4) 4
surgery (4) 4
transaktion (4) 4
transmission of digital information, e.g. telegraphiccommunication (4) 4
anonymity (3) 3
browsers (3) 3
cross-site scripting (3) 3
cryptocurrency (3) 3
data encryption (3) 3
electric fields (3) 3
gain (3) 3
handling record carriers (3) 3
index medicus (3) 3
internet (3) 3
management of computing and information systems (3) 3
oxidation (3) 3
physics, applied (3) 3
presentation of data (3) 3
pulpe (3) 3
recognition of data (3) 3
record carriers (3) 3
security (3) 3
video-on-demand (3) 3
acyl fluorides (2) 2
algorithm analysis and problem complexity (2) 2
analytical models (2) 2
bergbau (2) 2
beugung (2) 2
browser design (2) 2
browser security (2) 2
ceramics (2) 2
chemische synthese (2) 2
chemistry, physical (2) 2
chrom (2) 2
computational modeling (2) 2
computer architecture (2) 2
computer information security (2) 2
computer science, software engineering (2) 2
computer simulation (2) 2
computer-leistung (2) 2
computers and society (2) 2
comsol (2) 2
cryptography (2) 2
crystal (2) 2
data protection (2) 2
dielectric-properties (2) 2
dielektrikum (2) 2
dielektrizitätskonstante (2) 2
dom-based xss (2) 2
electric contacts (2) 2
electrodes (2) 2
energy & fuels (2) 2
energy dissipation (2) 2
ethereum (2) 2
expression (2) 2
female (2) 2
festkörperreaktion (2) 2
fluorides (2) 2
geometrical approach (2) 2
hardware (2) 2
heat distribution (2) 2
heat transfer (2) 2
hexafluoropropylene (2) 2
hrnr (2) 2
humans (2) 2
image processing (2) 2
impedanzspektroskopie (2) 2
india (2) 2
information storage and retrieval (2) 2
information systems applications (2) 2
intel sgx (2) 2
isolation (2) 2
iterative spectral subtraction (2) 2
k-edge (2) 2
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Proceedings of the 2016 ACM SIGSAC Conference on computer and communications security, ISSN 1543-7221, 10/2016, Volume 24-28-, pp. 254 - 269
Cryptocurrencies record transactions in a decentralized data structure called a blockchain. Two of the most popular cryptocurrencies, Bitcoin and Ethereum,... 
symbolic execution | ethereum | blockchain | smart contract | cryptocurrencies
Conference Proceeding
Proceedings of the 2016 ACM SIGSAC Conference on computer and communications security, ISSN 1543-7221, 10/2016, Volume 24-28-, pp. 17 - 30
Cryptocurrencies, such as Bitcoin and 250 similar alt-coins, embody at their core a blockchain protocol --- a mechanism for a distributed network of... 
bitcoin | sharding | consensus protocol
Conference Proceeding
AIP Conference Proceedings, ISSN 0094-243X, 08/2019, Volume 2136, Issue 1
The nonlinear interaction of two co-propagating cosh-Gaussian laser beams in a cluster plasma is investigated and the electric field amplitude of emitted... 
Plasma | Amplitudes | Parameters | Ripples | Laser beams | Nonuniformity | Plasma density | Wave propagation | Terahertz frequencies | Lasers | Gaussian beams (optics) | Ponderomotive forces | Clusters | Electric fields
Journal Article
Indian Journal of Orthopaedics, ISSN 0019-5413, 07/2015, Volume 49, Issue 4, pp. 458 - 464
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2017, Volume 10327, pp. 25 - 47
Conference Proceeding
Proceedings of the Third ACM workshop on security and privacy in smartphones & mobile devices, ISSN 1543-7221, 11/2013, pp. 33 - 42
Many applications are available on Android market place for SMS spam filtering. In this paper, we conduct a detailed study of the methods used in spam... 
message tagging | spam filtering | svm | android app analysis | naive bayes
Conference Proceeding
Proceedings of the 22nd ACM SIGSAC Conference on computer and communications security, ISSN 1543-7221, 10/2015, Volume 2015-, pp. 706 - 719
Cryptocurrencies like Bitcoin and the more recent Ethereum system allow users to specify scripts in transactions and contracts to support applications beyond... 
cryptocurrency | consensus computer | ethereum | verifiable computation | incentive compatibility | bitcoin | Verifiable computation | Cryptocurrency | Consensus computer | Bitcoin | Ethereum | Incentive compatibility
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2016, Volume 9604, pp. 106 - 125
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2017, Volume 10493, pp. 153 - 173
Conference Proceeding
Radiation Physics and Chemistry, ISSN 0969-806X, 03/2019, Volume 156, pp. 44 - 49
Journal Article
Proceedings of the 18th ACM conference on computer and communications security, ISSN 1543-7221, 10/2011, pp. 601 - 614
We empirically analyzed sanitizer use in a shipping web ap- plication with over 400,000 lines of code and over 23,244 methods, the largest empirical analysis... 
runtime analysis | web applications | cross-site scripting | Cross-site scripting | Runtime analysis | Web applications
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2017, Volume 9603, pp. 499 - 514
Conference Proceeding
Optical Materials, ISSN 0925-3467, 10/2018, Volume 84, pp. 625 - 630
Surface morphological evolution is observed in thermally activated nanocrystalline CdS (nc-CdS) thin films. The chemical bath deposited nc-CdS thin films show... 
Chemical bath deposition | CdS thin films | Surface morphology | Photoluminescence | Phase transition | SURFACE-MORPHOLOGY | PHOTOCATALYTIC H-2-PRODUCTION ACTIVITY | MATERIALS SCIENCE, MULTIDISCIPLINARY | OPTICAL-PROPERTIES | SOLAR-CELL | QUANTUM DOTS | NANOPARTICLES | PHASE-TRANSITION | OPTICS | Thin films | Annealing | Dielectric films | Structure | Optical properties | Crystals
Journal Article
IOP Conference Series: Materials Science and Engineering, ISSN 1757-8981, 10/2016, Volume 149, Issue 1
Conference Proceeding
Proceedings of the 18th ACM conference on computer and communications security, ISSN 1543-7221, 10/2011, pp. 587 - 600
Scripting vulnerabilities, such as cross-site scripting (XSS), plague web applications today. Most research on defense techniques has focused on securing... 
cross-site scripting | type systems | web frameworks | Cross-site scripting | Type systems
Conference Proceeding
Proceedings on Privacy Enhancing Technologies, ISSN 2299-0984, 10/2016, Volume 2016, Issue 4, pp. 294 - 314
The peer-assisted CDN is a new content distribution paradigm supported by CDNs (e.g., Akamai), which enables clients to cache and distribute web content on... 
Anonymity | Peer-assisted CDNs | Inference Attacks
Journal Article
Industrial Psychiatry Journal, ISSN 0972-6748, 7/2017, Volume 26, Issue 2, pp. 207 - 214
Introduction: Little is known about the relationships between adverse health effects and unhealthy behaviors among dental undergraduate students surfing social... 
Web 2.0 | University students | Interactive learning | Social networks | Addictions | Social research | Higher education | Cellular telephones | Collaboration | Pharmacy | Internet | Public health | Communication | websites | social networking | Original | Physical health
Journal Article
IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, ISSN 0743-166X, 04/2018, Volume 2018-, pp. 2528 - 2536
In a sybil attack, an adversary creates a large number of fake identities/nodes and have them join the system. Computational puzzles have long been... 
Computer science | Protocols | Error probability | Time complexity | Bitcoin
Conference Proceeding
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.