Sciweavers

5476 search results - page 191 / 1096
» Resettably Secure Computation
Sort
View
HOTNETS
2010
14 years 11 months ago
How to tell an airport from a home: techniques and applications
Today's Internet services increasingly use IP-based geolocation to specialize the content and service provisioning for each user. However, these systems focus almost exclusiv...
Andreas Pitsillidis, Yinglian Xie, Fang Yu, Mart&i...
DAC
1998
ACM
16 years 5 months ago
Data Security for Web-based CAD
Scott Hauck, Stephen Knol
WISEC
2010
ACM
15 years 11 months ago
On the efficiency of secure beaconing in VANETs
Elmar Schoch, Frank Kargl
ICCS
2007
Springer
15 years 10 months ago
Energy Efficient Forwarding Scheme for Secure Wireless Ad Hoc Routing Protocols
Kwonseung Shin, Min Young Chung, Hyunseung Choo
ICSOC
2007
Springer
15 years 10 months ago
Goal-Equivalent Secure Business Process Re-engineering
Hugo A. López, Fabio Massacci, Nicola Zanno...