Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5476
search results - page 21 / 1096
»
Resettably Secure Computation
Sort
relevance
views
votes
recent
update
View
thumb
title
143
click to vote
IASTEDSE
2004
147
views
Software Engineering
»
more
IASTEDSE 2004
»
An authorization and access control scheme for pervasive computing
15 years 4 months ago
Download
www.nokia.com
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
claim paper
Read More »
92
Voted
SAC
2002
ACM
68
views
Applied Computing
»
more
SAC 2002
»
Using UMLsec and goal trees for secure systems development
15 years 3 months ago
Download
www4.in.tum.de
Jan Jürjens
claim paper
Read More »
63
click to vote
SAC
2002
ACM
82
views
Applied Computing
»
more
SAC 2002
»
Certificates for mobile code security
15 years 3 months ago
Download
users.ecs.soton.ac.uk
Hock Kim Tan, Luc Moreau
claim paper
Read More »
70
Voted
PERVASIVE
2007
Springer
71
views
Applied Computing
»
more
PERVASIVE 2007
»
Multichannel Security Protocols
15 years 3 months ago
Download
www.cl.cam.ac.uk
Ford-Long Wong, Frank Stajano
claim paper
Read More »
106
Voted
SAC
2008
ACM
111
views
Applied Computing
»
more
SAC 2008
»
Universal concurrent constraint programing: symbolic semantics and applications to security
15 years 2 months ago
Download
www.lix.polytechnique.fr
Carlos Olarte, Frank D. Valencia
claim paper
Read More »
« Prev
« First
page 21 / 1096
Last »
Next »