Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
3821
search results - page 23 / 765
»
A Security Model for Aglets
Sort
relevance
views
votes
recent
update
View
thumb
title
101
click to vote
CSFW
1996
IEEE
93
views
Security Privacy
»
more
CSFW 1996
»
Towards a model of storage jamming
15 years 7 months ago
Download
www.cs.fsu.edu
John P. McDermott, David M. Goldschlag
claim paper
Read More »
129
click to vote
AINA
2004
IEEE
174
views
Computer Networks
»
more
AINA 2004
»
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking
15 years 7 months ago
Download
www.irisa.fr
IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify PAP and EAP-MD5 based securit...
Il-Gon Kim, Jin-Young Choi
claim paper
Read More »
109
click to vote
ETRICS
2006
123
views
Security Privacy
»
more
ETRICS 2006
»
Controlling Access to Documents: A Formal Access Control Model
15 years 6 months ago
Download
www.inf.ethz.ch
Paul E. Sevinç, David A. Basin, Ernst-R&uum...
claim paper
Read More »
102
click to vote
OOPSLA
2000
Springer
83
views
Security Privacy
»
more
OOPSLA 2000
»
Improving the Java memory model using CRF
15 years 6 months ago
Download
www.cs.umd.edu
Jan-Willem Maessen, Arvind, Xiaowei Shen
claim paper
Read More »
117
click to vote
SP
1991
IEEE
85
views
Security Privacy
»
more
SP 1991
»
A Pattern-Oriented Intrusion-Detection Model and Its Applications
15 years 6 months ago
Download
www.syros.aegean.gr
Shiuh-Pyng Shieh, Virgil D. Gligor
claim paper
Read More »
« Prev
« First
page 23 / 765
Last »
Next »