Sciweavers

5476 search results - page 29 / 1096
» Resettably Secure Computation
Sort
View
128
Voted
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
15 years 23 days ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
146
Voted
RAID
2010
Springer
15 years 1 months ago
A Centralized Monitoring Infrastructure for Improving DNS Security
Manos Antonakakis, David Dagon, Xiapu Luo, Roberto...
92
Voted
CLOUDCOM
2010
Springer
15 years 1 months ago
Security Services Lifecycle Management in On-Demand Infrastructure Services Provisioning
Yuri Demchenko, Cees de Laat, Diego R. Lopez, Joan...
152
Voted
COMCOM
2011
14 years 10 months ago
An RFID secure authentication mechanism in WLAN
Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Ha...