Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5665
search results - page 141 / 1133
»
Introduction to Computer Security
Sort
relevance
views
votes
recent
update
View
thumb
title
109
click to vote
NCA
2006
IEEE
109
views
Computer Networks
»
more
NCA 2006
»
Application-Aware Reliability and Security: The Trusted ILLIAC Approach
15 years 8 months ago
Download
csdl2.computer.org
Ravishankar K. Iyer
claim paper
Read More »
96
Voted
CONEXT
2006
ACM
91
views
Computer Networks
»
more
CONEXT 2006
»
TinySA: a security architecture for wireless sensor networks
15 years 8 months ago
Download
conferences.sigcomm.org
Johann Großschädl
claim paper
Read More »
61
click to vote
SAC
2006
ACM
94
views
Applied Computing
»
more
SAC 2006
»
Policy-driven reflective enforcement of security policies
15 years 8 months ago
Download
www.dmi.unict.it
Ian Welch, Fan Lu
claim paper
Read More »
80
Voted
HPDC
2005
IEEE
86
views
Distributed And Parallel Com...
»
more
HPDC 2005
»
Identity boxing: secure user-level containment for the grid
15 years 7 months ago
Download
www.cse.nd.edu
Douglas Thain
claim paper
Read More »
102
click to vote
SPC
2005
Springer
245
views
Applied Computing
»
more
SPC 2005
»
Securing Ad Hoc Networks
15 years 7 months ago
Download
www.cs.cornell.edu
Panagiotis Papadimitratos
claim paper
Read More »
« Prev
« First
page 141 / 1133
Last »
Next »