Sciweavers

5665 search results - page 25 / 1133
» Introduction to Computer Security
Sort
View
ACISP
2008
Springer
14 years 3 months ago
A Tree-Based Approach for Computing Double-Base Chains
Christophe Doche, Laurent Habsieger
CCS
2007
ACM
14 years 2 months ago
Trusted computing challenges
Leendert van Doorn
CSFW
1997
IEEE
14 years 29 days ago
Unreliable Intrusion Detection in Distributed Computations
Dahlia Malkhi, Michael K. Reiter