Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5476
search results - page 185 / 1096
»
Resettably Secure Computation
Sort
relevance
views
votes
recent
update
View
thumb
title
135
click to vote
EUROPAR
2008
Springer
131
views
Distributed And Parallel Com...
»
more
EUROPAR 2008
»
Towards a Security Model to Bridge Internet Desktop Grids and Service Grids
15 years 6 months ago
Download
www-lipn.univ-paris13.fr
Gabriel Caillat, Oleg Lodygensky, Etienne Urbah, G...
claim paper
Read More »
105
click to vote
PERVASIVE
2008
Springer
65
views
Applied Computing
»
more
PERVASIVE 2008
»
Security and Privacy for Implantable Medical Devices
15 years 4 months ago
Download
www.cs.umass.edu
Daniel Halperin, Thomas S. Heydt-Benjamin, Kevin F...
claim paper
Read More »
115
click to vote
CHI
2011
ACM
252
views
Human Computer Interaction
»
more
CHI 2011
»
Data type based security alert dialogs
14 years 8 months ago
Download
www.medien.ifi.lmu.de
Max-Emanuel Maurer, Alexander De Luca, Heinrich Hu...
claim paper
Read More »
182
click to vote
COORDINATION
2011
Springer
199
views
Distributed And Parallel Com...
»
more
COORDINATION 2011
»
Combining Static Analysis and Runtime Checking in Security Aspects for Distributed Tuple Spaces
14 years 8 months ago
Download
www.graco.c.u-tokyo.ac.jp
Fan Yang, Tomoyuki Aotani, Hidehiko Masuhara, Flem...
claim paper
Read More »
147
click to vote
WS
2006
ACM
135
views
Computer Networks
»
more
WS 2006
»
Modeling Ad-hoc rushing attack in a negligibility-based security framework
15 years 10 months ago
Download
netlab.cs.ucla.edu
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla
claim paper
Read More »
« Prev
« First
page 185 / 1096
Last »
Next »