Sciweavers

5484 search results - page 13 / 1097
» Almost-Everywhere Secure Computation
Sort
View
CCS
2008
ACM
15 years 5 months ago
Secure control of portable images in a virtual computing utility
Ionut Constandache, Aydan R. Yumerefendi, Jeffrey ...
ISPEC
2009
Springer
15 years 10 months ago
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying...
75
Voted
IEEEARES
2007
IEEE
15 years 9 months ago
Self-Stabilization as a Foundation for Autonomic Computing
Olga Brukman, Shlomi Dolev, Yinnon A. Haviv, Reuve...
ESORICS
2007
Springer
15 years 9 months ago
Inductive Proofs of Computational Secrecy
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
CCS
2003
ACM
15 years 8 months ago
Automatic generation of two-party computations
Philip D. MacKenzie, Alina Oprea, Michael K. Reite...