Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5484
search results - page 162 / 1097
»
Almost-Everywhere Secure Computation
Sort
relevance
views
votes
recent
update
View
thumb
title
100
click to vote
PERVASIVE
2008
Springer
65
views
Applied Computing
»
more
PERVASIVE 2008
»
Security and Privacy for Implantable Medical Devices
15 years 4 months ago
Download
www.cs.umass.edu
Daniel Halperin, Thomas S. Heydt-Benjamin, Kevin F...
claim paper
Read More »
152
click to vote
RAID
2010
Springer
264
views
Computer Networks
»
more
RAID 2010
»
A Centralized Monitoring Infrastructure for Improving DNS Security
15 years 2 months ago
Download
www.raid2010.org
Manos Antonakakis, David Dagon, Xiapu Luo, Roberto...
claim paper
Read More »
102
click to vote
CLOUDCOM
2010
Springer
143
views
Distributed And Parallel Com...
»
more
CLOUDCOM 2010
»
Security Services Lifecycle Management in On-Demand Infrastructure Services Provisioning
15 years 2 months ago
Download
www.ogf.org
Yuri Demchenko, Cees de Laat, Diego R. Lopez, Joan...
claim paper
Read More »
156
click to vote
COMCOM
2011
238
views
Computational Linguistics
»
more
COMCOM 2011
»
An RFID secure authentication mechanism in WLAN
14 years 11 months ago
Download
hcc.dormv6.niu.edu.tw
Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Ha...
claim paper
Read More »
143
click to vote
WS
2006
ACM
135
views
Computer Networks
»
more
WS 2006
»
Modeling Ad-hoc rushing attack in a negligibility-based security framework
15 years 10 months ago
Download
netlab.cs.ucla.edu
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla
claim paper
Read More »
« Prev
« First
page 162 / 1097
Last »
Next »