Sciweavers

5665 search results - page 35 / 1133
» Introduction to Computer Security
Sort
View
ESORICS
2007
Springer
14 years 3 months ago
Inductive Proofs of Computational Secrecy
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
CCS
2003
ACM
14 years 2 months ago
Automatic generation of two-party computations
Philip D. MacKenzie, Alina Oprea, Michael K. Reite...
OOPSLA
2010
Springer
13 years 6 months ago
Patterns and statistical analysis for understanding reduced resource computing
Martin C. Rinard, Henry Hoffmann, Sasa Misailovic,...
SIGCSE
2004
ACM
95views Education» more  SIGCSE 2004»
14 years 2 months ago
Cryptography and computer security for undergraduates
The panel discusses solutions to the problem of computer security education. Categories and Subject Descriptors C.2.0 [Computer-Communication Networks]: security and protection. E...
Paul De Palma, Charles Frank, Suzanne E. Gladfelte...