Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5665
search results - page 235 / 1133
»
Introduction to Computer Security
Sort
relevance
views
votes
recent
update
View
thumb
title
38
click to vote
POLICY
2009
Springer
147
views
Computer Networks
»
more
POLICY 2009
»
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
14 years 5 months ago
Download
seclab.uiuc.edu
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...
Carl A. Gunter
claim paper
Read More »
14
click to vote
DAC
2002
ACM
67
views
Computer Architecture
»
more
DAC 2002
»
System design methodologies for a wireless security processing platform
14 years 11 months ago
Download
palms.ee.princeton.edu
Srivaths Ravi, Anand Raghunathan, Nachiketh R. Pot...
claim paper
Read More »
31
click to vote
MOBIHOC
2006
ACM
152
views
Computer Networks
»
more
MOBIHOC 2006
»
SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks
14 years 10 months ago
Download
mcn.cse.psu.edu
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
claim paper
Read More »
21
click to vote
P2P
2008
IEEE
90
views
Communications
»
more
P2P 2008
»
Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks
14 years 4 months ago
Download
www.p2p08.org
Ruichuan Chen, Eng Keong Lua, Jon Crowcroft, Wenji...
claim paper
Read More »
18
click to vote
EDOC
2006
IEEE
104
views
Distributed And Parallel Com...
»
more
EDOC 2006
»
An Ontology-based Approach to the Formalization of Information Security Policies
14 years 4 months ago
Download
www.pms.ifi.lmu.de
Fernando Náufel do Amaral, Carlos Baz&iacut...
claim paper
Read More »
« Prev
« First
page 235 / 1133
Last »
Next »