Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5665
search results - page 100 / 1133
»
Introduction to Computer Security
Sort
relevance
views
votes
recent
update
View
thumb
title
78
click to vote
TISSEC
2008
104
views
more
TISSEC 2008
»
Toward a Usage-Based Security Framework for Collaborative Computing Systems
15 years 2 months ago
Download
profsandhu.com
Xinwen Zhang, Masayuki Nakae, Michael J. Covington...
claim paper
Read More »
64
click to vote
CACM
2002
103
views
more
CACM 2002
»
Computer security: quality rather than quantity
15 years 2 months ago
Download
www.notablesoftware.com
Rebecca Mercuri
claim paper
Read More »
86
click to vote
CORR
1999
Springer
78
views
Education
»
more
CORR 1999
»
Multiparty computation unconditionally secure against Q^2 adversary structures
15 years 1 months ago
Download
www.instantlogic.net
Adam Smith, Anton Stiglic
claim paper
Read More »
87
click to vote
MONET
2007
75
views
more
MONET 2007
»
MONET Special Issue on Next Generation Hardware Architectures for Secure Mobile Computing
15 years 1 months ago
Download
www.nsklavos.gr
Nicolas Sklavos, Máire McLoone, Xinmiao Zha...
claim paper
Read More »
114
Voted
ASIACRYPT
2010
Springer
113
views
Cryptology
»
more
ASIACRYPT 2010
»
Computationally Secure Pattern Matching in the Presence of Malicious Adversaries
15 years 5 days ago
Download
www.spms.ntu.edu.sg
Carmit Hazay, Tomas Toft
claim paper
Read More »
« Prev
« First
page 100 / 1133
Last »
Next »