Sciweavers

3299 search results - page 65 / 660
» Privacy and Trusted Computing
Sort
View
87
Voted
CCS
2010
ACM
15 years 9 months ago
Computationally secure two-round authenticated message exchange
Klaas Ole Kürtz, Henning Schnoor, Thomas Wilk...
70
Voted
IEEEARES
2007
IEEE
15 years 9 months ago
Self-Stabilization as a Foundation for Autonomic Computing
Olga Brukman, Shlomi Dolev, Yinnon A. Haviv, Reuve...
77
Voted
ESORICS
2007
Springer
15 years 9 months ago
Inductive Proofs of Computational Secrecy
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
67
Voted
CCS
2003
ACM
15 years 8 months ago
Automatic generation of two-party computations
Philip D. MacKenzie, Alina Oprea, Michael K. Reite...
CCS
2008
ACM
15 years 4 months ago
Secure control of portable images in a virtual computing utility
Ionut Constandache, Aydan R. Yumerefendi, Jeffrey ...