Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5476
search results - page 137 / 1096
»
Resettably Secure Computation
Sort
relevance
views
votes
recent
update
View
thumb
title
137
click to vote
AINA
2007
IEEE
140
views
Computer Networks
»
more
AINA 2007
»
Mobile Agents and the Deus Ex Machina
15 years 10 months ago
Download
www.opentc.net
This paper aims to examine the benefits the introduction of trusted computing can bring to the mobile agent paradigm, with a specific emphasis on mobile agent security.
Shane Balfe, Eimear Gallery
claim paper
Read More »
113
click to vote
CVPR
2005
IEEE
200
views
Computer Vision
»
more
CVPR 2005
»
Interactive Montages of Sprites for Indexing and Summarizing Security Video
16 years 6 months ago
Download
www.cs.rochester.edu
Chris Pal, Nebojsa Jojic
claim paper
Read More »
122
click to vote
DSN
2009
IEEE
151
views
Computer Networks
»
more
DSN 2009
»
Using web security scanners to detect vulnerabilities in web services
15 years 11 months ago
Download
eden.dei.uc.pt
Marco Vieira, Nuno Antunes, Henrique Madeira
claim paper
Read More »
110
click to vote
ICDCSW
2008
IEEE
145
views
Computer Networks
»
more
ICDCSW 2008
»
Cyber Security: An Obtainable Goal?
15 years 10 months ago
Download
www.comp.polyu.edu.hk
David H. C. Du
claim paper
Read More »
99
click to vote
AIMS
2008
Springer
79
views
Computer Networks
»
more
AIMS 2008
»
Secure Sharing of an ICT Infrastructure through Vinci
15 years 10 months ago
Download
www.di.unipi.it
Fabrizio Baiardi, Daniele Sgandurra
claim paper
Read More »
« Prev
« First
page 137 / 1096
Last »
Next »