Sciweavers

5665 search results - page 168 / 1133
» Introduction to Computer Security
Sort
View
ICDCSW
2000
IEEE
15 years 5 months ago
Secure Information Flow in Mobile Bootstrapping Process
Zhaoyu Liu, M. Dennis Mickunas, Roy H. Campbell
110
Voted
MOBISYS
2008
ACM
15 years 4 months ago
Virtualized in-cloud security services for mobile devices
Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, ...
77
Voted
DAC
2005
ACM
15 years 4 months ago
A pattern matching coprocessor for network security
Young H. Cho, William H. Mangione-Smith