Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5484
search results - page 142 / 1097
»
Almost-Everywhere Secure Computation
Sort
relevance
views
votes
recent
update
View
thumb
title
97
click to vote
EUROPAR
2008
Springer
96
views
Distributed And Parallel Com...
»
more
EUROPAR 2008
»
Securing Real-Time On-Line Interactive Applications in edutain@grid
15 years 5 months ago
Download
eprints.ecs.soton.ac.uk
Justin Ferris, Mike Surridge, Frank Glinka
claim paper
Read More »
104
click to vote
PERVASIVE
2006
Springer
85
views
Applied Computing
»
more
PERVASIVE 2006
»
Enhancing Security and Privacy in Traffic-Monitoring Systems
15 years 4 months ago
Download
www.winlab.rutgers.edu
Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabad...
claim paper
Read More »
82
click to vote
PERVASIVE
2006
Springer
73
views
Applied Computing
»
more
PERVASIVE 2006
»
The Evolution of RFID Security
15 years 4 months ago
Download
autoid.mit.edu
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...
claim paper
Read More »
135
click to vote
TGC
2010
Springer
184
views
Applied Computing
»
more
TGC 2010
»
Probabilistic Aspects: Checking Security in an Imperfect World
15 years 1 months ago
Download
www.dcs.kcl.ac.uk
Chris Hankin, Flemming Nielson, Hanne Riis Nielson
claim paper
Read More »
125
click to vote
CSUR
2011
176
views
Theoretical Computer Science
»
more
CSUR 2011
»
A survey of DHT security techniques
14 years 11 months ago
Download
www.cs.vu.nl
Guido Urdaneta, Guillaume Pierre, Maarten van Stee...
claim paper
Read More »
« Prev
« First
page 142 / 1097
Last »
Next »