Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5476
search results - page 184 / 1096
»
Resettably Secure Computation
Sort
relevance
views
votes
recent
update
View
thumb
title
112
click to vote
FOCS
1990
IEEE
63
views
Theoretical Computer Science
»
more
FOCS 1990
»
Security Preserving Amplification of Hardness
15 years 8 months ago
Download
www.busim.ee.boun.edu.tr
Oded Goldreich, Russell Impagliazzo, Leonid A. Lev...
claim paper
Read More »
116
click to vote
CIS
2006
Springer
108
views
Applied Computing
»
more
CIS 2006
»
Security and Privacy on Authentication Protocol for Low-Cost RFID
15 years 8 months ago
Download
caislab.kaist.ac.kr
Yong-Zhen Li, Young-Bok Cho, Nam-Kyoung Um, Sang H...
claim paper
Read More »
132
click to vote
AINA
2010
IEEE
144
views
Computer Networks
»
more
AINA 2010
»
Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA
15 years 8 months ago
Download
www.wsn-security.info
Hani Alzaid, DongGook Park, Juan Manuel Gonz&aacut...
claim paper
Read More »
135
click to vote
AP2PS
2009
IEEE
208
views
Computer Networks
»
more
AP2PS 2009
»
Environmental Security in P2P Networks
15 years 8 months ago
Download
ceres.ugr.es
Jesús E. Díaz-Verdejo, Pedro Garcia-...
claim paper
Read More »
103
click to vote
EUC
2008
Springer
267
views
Applied Computing
»
more
EUC 2008
»
Data Mining for Security Applications
15 years 6 months ago
Download
isi.se.cuhk.edu.hk
Bhavani M. Thuraisingham, Latifur Khan, Mohammad M...
claim paper
Read More »
« Prev
« First
page 184 / 1096
Last »
Next »