Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
2817
search results - page 21 / 564
»
A Framework for the Management of Information Security
Sort
relevance
views
votes
recent
update
View
thumb
title
23
click to vote
CIKM
2005
Springer
118
views
Information Technology
»
more
CIKM 2005
»
Securing XML data in third-party distribution systems
14 years 1 months ago
Download
www.dsc.ufcg.edu.br
Web-based third-party architectures for data publishing are today receiving growing attention, due to their scalability and the ability to efficiently manage large numbers of use...
Barbara Carminati, Elena Ferrari, Elisa Bertino
claim paper
Read More »
16
click to vote
CAISE
2006
Springer
117
views
Information Technology
»
more
CAISE 2006
»
Choosing a Prioritization Method-Case of IS Security Improvement
13 years 11 months ago
Download
sunsite.informatik.rwth-aachen.de
Camille Salinesi, Elena Kornyshova
claim paper
Read More »
20
click to vote
EEE
2005
IEEE
117
views
Information Technology
»
more
EEE 2005
»
E-Voting: A Scalable Approach using XML and Hardware Security Modules
14 years 1 months ago
Download
www.a-sit.at
Thomas Rössler, Herbert Leitold, Reinhard Pos...
claim paper
Read More »
26
click to vote
ISW
2001
Springer
98
views
Information Technology
»
more
ISW 2001
»
Securing Elliptic Curve Point Multiplication against Side-Channel Attacks
14 years 12 hour ago
Download
www.cdc.informatik.tu-darmstadt.de
Bodo Möller
claim paper
Read More »
21
click to vote
IH
1999
Springer
82
views
Information Technology
»
more
IH 1999
»
Secure Steganographic Methods for Palette Images
13 years 12 months ago
Download
www.ws.binghamton.edu
Jiri Fridrich, Rui Du
claim paper
Read More »
« Prev
« First
page 21 / 564
Last »
Next »