Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
783
search results - page 3 / 157
»
On security proof of McCullagh
Sort
relevance
views
votes
recent
update
View
thumb
title
128
click to vote
CCS
2011
ACM
231
views
Security Privacy
»
more
CCS 2011
»
Proofs of ownership in remote storage systems
14 years 3 months ago
Download
eprint.iacr.org
Cloud storage systems are becoming increasingly popular. A promising technology that keeps their cost down is deduplication, which stores only a single copy of repeating data. Cli...
Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra...
claim paper
Read More »
77
click to vote
CCS
2003
ACM
77
views
Security Privacy
»
more
CCS 2003
»
Security proofs for an efficient password-based key exchange
15 years 9 months ago
Download
www.di.ens.fr
Emmanuel Bresson, Olivier Chevassut, David Pointch...
claim paper
Read More »
100
click to vote
SP
1997
IEEE
112
views
Security Privacy
»
more
SP 1997
»
Research on Proof-Carrying Code for Untrusted-Code Security
15 years 8 months ago
Download
www.cs.cmu.edu
George C. Necula, Peter Lee
claim paper
Read More »
111
click to vote
PROVSEC
2010
Springer
154
views
Security Privacy
»
more
PROVSEC 2010
»
A Calculus for Game-Based Security Proofs
15 years 2 months ago
Download
nicosia.is.s.u-tokyo.ac.jp
David Nowak, Yu Zhang
claim paper
Read More »
123
Voted
ESORICS
2009
Springer
153
views
Security Privacy
»
more
ESORICS 2009
»
Using SAT-Solvers to Compute Inference-Proof Database Instances
15 years 10 months ago
Download
wiese.free.fr
Cornelia Tadros, Lena Wiese
claim paper
Read More »
« Prev
« First
page 3 / 157
Last »
Next »