Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5476
search results - page 138 / 1096
»
Resettably Secure Computation
Sort
relevance
views
votes
recent
update
View
thumb
title
127
click to vote
NCA
2006
IEEE
109
views
Computer Networks
»
more
NCA 2006
»
Application-Aware Reliability and Security: The Trusted ILLIAC Approach
15 years 10 months ago
Download
csdl2.computer.org
Ravishankar K. Iyer
claim paper
Read More »
119
click to vote
CONEXT
2006
ACM
91
views
Computer Networks
»
more
CONEXT 2006
»
TinySA: a security architecture for wireless sensor networks
15 years 10 months ago
Download
conferences.sigcomm.org
Johann Großschädl
claim paper
Read More »
76
click to vote
SAC
2006
ACM
94
views
Applied Computing
»
more
SAC 2006
»
Policy-driven reflective enforcement of security policies
15 years 10 months ago
Download
www.dmi.unict.it
Ian Welch, Fan Lu
claim paper
Read More »
92
click to vote
HPDC
2005
IEEE
86
views
Distributed And Parallel Com...
»
more
HPDC 2005
»
Identity boxing: secure user-level containment for the grid
15 years 10 months ago
Download
www.cse.nd.edu
Douglas Thain
claim paper
Read More »
124
click to vote
SPC
2005
Springer
245
views
Applied Computing
»
more
SPC 2005
»
Securing Ad Hoc Networks
15 years 10 months ago
Download
www.cs.cornell.edu
Panagiotis Papadimitratos
claim paper
Read More »
« Prev
« First
page 138 / 1096
Last »
Next »