Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5476
search results - page 139 / 1096
»
Resettably Secure Computation
Sort
relevance
views
votes
recent
update
View
thumb
title
122
click to vote
ICCSA
2004
Springer
112
views
Applied Computing
»
more
ICCSA 2004
»
A Security Proxy Based Protocol for Authenticating the Mobile IPv6 Binding Updates
15 years 9 months ago
Download
isyou.hosting.paran.com
Il-Sun You, Kyungsan Cho
claim paper
Read More »
101
click to vote
DSN
2003
IEEE
80
views
Computer Networks
»
more
DSN 2003
»
HEALERS: A Toolkit for Enhancing the Robustness and Security of Existing Applications
15 years 9 months ago
Download
net.pku.edu.cn
Christof Fetzer, Zhen Xiao
claim paper
Read More »
98
click to vote
IPPS
2002
IEEE
130
views
Distributed And Parallel Com...
»
more
IPPS 2002
»
Using Compatible Keys for Secure Multicasting in E-Commerce
15 years 9 months ago
Download
www.cs.odu.edu
Indrakshi Ray, Indrajit Ray
claim paper
Read More »
85
click to vote
HUC
2009
Springer
98
views
Human Computer Interaction
»
more
HUC 2009
»
SessionMagnifier: a simple approach to secure and convenient kiosk browsing
15 years 9 months ago
Download
www.cs.wm.edu
Chuan Yue, Haining Wang
claim paper
Read More »
106
click to vote
RAID
2001
Springer
118
views
Computer Networks
»
more
RAID 2001
»
Application-Integrated Data Collection for Security Monitoring
15 years 8 months ago
Download
www.raid-symposium.org
Magnus Almgren, Ulf Lindqvist
claim paper
Read More »
« Prev
« First
page 139 / 1096
Last »
Next »