Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5476
search results - page 116 / 1096
»
Resettably Secure Computation
Sort
relevance
views
votes
recent
update
View
thumb
title
156
click to vote
WETICE
2003
IEEE
195
views
Emerging Technology
»
more
WETICE 2003
»
Attack-Resistance of Computational Trust Models
15 years 9 months ago
Download
web.comlab.ox.ac.uk
The World Wide Web encourages widely-distributed, open, decentralised systems that span multiple administrative domains. Recent research has turned to trust management [4] as a fr...
Andrew Twigg, Nathan Dimmock
claim paper
Read More »
115
Voted
COMPUTER
2010
103
views
more
COMPUTER 2010
»
Interview: Software Security in the Real World
15 years 4 months ago
Download
www.cigital.com
Ann E. Kelley Sobel, Gary McGraw
claim paper
Read More »
102
click to vote
COMPUTER
2008
114
views
more
COMPUTER 2008
»
Automated Code Review Tools for Security
15 years 4 months ago
Download
www.cigital.com
Gary McGraw
claim paper
Read More »
76
click to vote
COMPUTER
2007
102
views
more
COMPUTER 2007
»
Challenges in Securing Networked J2ME Applications
15 years 4 months ago
Download
www.nowires.org
André N. Klingsheim, Vebjørn Moen, K...
claim paper
Read More »
66
click to vote
COMPUTER
2007
52
views
more
COMPUTER 2007
»
Reengineering the Internet for Better Security
15 years 4 months ago
Download
crec.mccombs.utexas.edu
Manoj Parameswaran, Xia Zhao, Andrew B. Whinston, ...
claim paper
Read More »
« Prev
« First
page 116 / 1096
Last »
Next »