Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
203
search results - page 5 / 41
»
A Secure PLAN
Sort
relevance
views
votes
recent
update
View
thumb
title
20
click to vote
PERCOM
2007
ACM
120
views
Computer Networks
»
more
PERCOM 2007
»
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
14 years 7 months ago
Download
lsub.org
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
claim paper
Read More »
21
click to vote
FM
2003
Springer
115
views
Formal Methods
»
more
FM 2003
»
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis
14 years 22 days ago
Download
www.ai-lab.it
Alessandro Armando, Luca Compagna, Pierre Ganty
claim paper
Read More »
30
click to vote
AIA
2006
125
views
Artificial Intelligence
»
more
AIA 2006
»
Optimal Path Planning using an Improved A* Algorithm for Homeland Security Applications
13 years 9 months ago
Download
staffweb.cms.gre.ac.uk
Anand Veeraswamy, Bala P. Amavasai
claim paper
Read More »
12
click to vote
AICOM
2008
51
views
more
AICOM 2008
»
To secure an anchor - a recovery planning approach to ambiguity in perceptual anchoring
13 years 7 months ago
Download
www.aass.oru.se
Lars Karlsson, Abdelbaki Bouguerra, Mathias Broxva...
claim paper
Read More »
9
click to vote
IMCS
2000
42
views
more
IMCS 2000
»
Disaster recovery planning: a strategy for data security
13 years 7 months ago
Download
www.ekam.ie
Steve M. Hawkins, David C. Yen, David C. Chou
claim paper
Read More »
« Prev
« First
page 5 / 41
Last »
Next »