Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5665
search results - page 196 / 1133
»
Introduction to Computer Security
Sort
relevance
views
votes
recent
update
View
thumb
title
25
click to vote
ICCS
2005
Springer
94
views
Applied Computing
»
more
ICCS 2005
»
GIVS: Integrity Validation for Grid Security
14 years 3 months ago
Download
home.dei.polimi.it
Abstract. In this paper we address the problem of granting the correctness of Grid computations. We introduce a Grid Integrity Validation Scheme (GIVS) that may reveal the presence...
Giuliano Casale, Stefano Zanero
claim paper
Read More »
30
click to vote
MMMACNS
2005
Springer
119
views
Information Technology
»
more
MMMACNS 2005
»
A Temporal Logic-Based Model for Forensic Investigation in Networked System Security
14 years 3 months ago
Download
www.cnas.org.tn
Slim Rekhis, Noureddine Boudriga
claim paper
Read More »
23
click to vote
GCC
2004
Springer
131
views
Distributed And Parallel Com...
»
more
GCC 2004
»
Security Architecture for Web Services
14 years 3 months ago
Download
staff.science.uva.nl
Yuan Rao, Boqin Feng, Jincang Han
claim paper
Read More »
28
click to vote
HUC
2004
Springer
105
views
Human Computer Interaction
»
more
HUC 2004
»
Security and Trust in Mobile Interactions: A Study of Users' Perceptions and Reasoning
14 years 3 months ago
Download
research.microsoft.com
Tim Kindberg, Abigail Sellen, Erik Geelhoed
claim paper
Read More »
24
click to vote
ICSOC
2004
Springer
67
views
Applied Computing
»
more
ICSOC 2004
»
Sound development of secure service-based systems
14 years 3 months ago
Download
www4.in.tum.de
Martin Deubler, Johannes Grünbauer, Jan J&uum...
claim paper
Read More »
« Prev
« First
page 196 / 1133
Last »
Next »