Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5476
search results - page 182 / 1096
»
Resettably Secure Computation
Sort
relevance
views
votes
recent
update
View
thumb
title
93
click to vote
CHI
2008
ACM
112
views
Human Computer Interaction
»
more
CHI 2008
»
Human, organizational, and technological factors of IT security
16 years 5 months ago
Download
lersse-dl.ece.ubc.ca
André Gagné, David Botta, Kasia Muld...
claim paper
Read More »
110
click to vote
DCC
2004
IEEE
111
views
Computer Graphics
»
more
DCC 2004
»
On the Security of Two Public Key Cryptosystems Using Non-Abelian Groups
16 years 4 months ago
Download
homepages.cwi.nl
Maria Isabel Gonzalez Vasco, Dennis Hofheinz, Cons...
claim paper
Read More »
109
click to vote
AINA
2008
IEEE
126
views
Computer Networks
»
more
AINA 2008
»
WiMax Security
15 years 11 months ago
Download
www.mindcommerce.com
Mahmoud Nasreldin, Heba Kamal Aslan, Magdy El-Henn...
claim paper
Read More »
100
Voted
ICPP
2007
IEEE
157
views
Distributed And Parallel Com...
»
more
ICPP 2007
»
Designing NFS with RDMA for Security, Performance and Scalability
15 years 11 months ago
Download
nowlab.cse.ohio-state.edu
Ranjit Noronha, Lei Chai, Thomas Talpey, Dhabalesw...
claim paper
Read More »
106
click to vote
AINA
2005
IEEE
152
views
Computer Networks
»
more
AINA 2005
»
Automatic Generation of the C# Code for Security Protocols Verified with Casper/FDR
15 years 10 months ago
Download
www.irisa.fr
Chul-Wuk Jeon, Il-Gon Kim, Jin-Young Choi
claim paper
Read More »
« Prev
« First
page 182 / 1096
Last »
Next »