Sciweavers

5484 search results - page 94 / 1097
» Almost-Everywhere Secure Computation
Sort
View
71
Voted
COMPUTER
2007
102views more  COMPUTER 2007»
15 years 3 months ago
Challenges in Securing Networked J2ME Applications
André N. Klingsheim, Vebjørn Moen, K...
COMPUTER
2007
52views more  COMPUTER 2007»
15 years 3 months ago
Reengineering the Internet for Better Security
Manoj Parameswaran, Xia Zhao, Andrew B. Whinston, ...
COMPUTER
2007
72views more  COMPUTER 2007»
15 years 3 months ago
Enterprise Security for Web 2.0
Mary Ann Davidson, Elad Yoran
155
Voted
ISF
2008
114views more  ISF 2008»
15 years 3 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
137
Voted
INFOCOM
2008
IEEE
15 years 10 months ago
A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing
—Trusted Collaborative Computing (TCC) is a new research and application paradigm. Two important challenges in such a context are represented by secure information transmission a...
Xukai Zou, Yuan-Shun Dai, Elisa Bertino