Sciweavers

5665 search results - page 102 / 1133
» Introduction to Computer Security
Sort
View
JDCTA
2010
172views more  JDCTA 2010»
13 years 3 months ago
Performance Test of An Embedded Real-Time Operating System Based on A New High-Security NetWork Computer
Performance indexes of the embedded real-time operating system are not isolated but interacting with each other. Two sets of elements aiming to describe the relationship between t...
Gengxin Sun, Fengjing Shao Name, Sheng Bin
JNCA
2010
85views more  JNCA 2010»
13 years 3 months ago
Adaptive security protocol selection for mobile computing
Bruno P. S. Rocha, Daniel N. O. Costa, Rande A. Mo...
CORR
2011
Springer
331views Education» more  CORR 2011»
13 years 23 days ago
An Overview of the Security Concerns in Enterprise Cloud Computing
Anthony Bisong, Syed M. Rahman
EUROCRYPT
2011
Springer
13 years 14 days ago
Towards a Game Theoretic View of Secure Computation
Gilad Asharov, Ran Canetti, Carmit Hazay
ATAL
2011
Springer
12 years 9 months ago
Improved computational models of human behavior in security games
Rong Yang, Christopher Kiekintveld, Fernando Ord&o...