Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5476
search results - page 29 / 1096
»
Resettably Secure Computation
Sort
relevance
views
votes
recent
update
View
thumb
title
117
click to vote
EUROCRYPT
2010
Springer
134
views
Cryptology
»
more
EUROCRYPT 2010
»
Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography
15 years 8 months ago
Download
crypto.rd.francetelecom.com
Ivan Damgård, Yuval Ishai, Mikkel Krø...
claim paper
Read More »
128
Voted
IJACTAICIT
2010
192
views
more
IJACTAICIT 2010
»
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
15 years 23 days ago
Download
www.aicit.org
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
claim paper
Read More »
146
Voted
RAID
2010
Springer
264
views
Computer Networks
»
more
RAID 2010
»
A Centralized Monitoring Infrastructure for Improving DNS Security
15 years 1 months ago
Download
www.raid2010.org
Manos Antonakakis, David Dagon, Xiapu Luo, Roberto...
claim paper
Read More »
92
Voted
CLOUDCOM
2010
Springer
143
views
Distributed And Parallel Com...
»
more
CLOUDCOM 2010
»
Security Services Lifecycle Management in On-Demand Infrastructure Services Provisioning
15 years 1 months ago
Download
www.ogf.org
Yuri Demchenko, Cees de Laat, Diego R. Lopez, Joan...
claim paper
Read More »
152
Voted
COMCOM
2011
238
views
Computational Linguistics
»
more
COMCOM 2011
»
An RFID secure authentication mechanism in WLAN
14 years 10 months ago
Download
hcc.dormv6.niu.edu.tw
Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Ha...
claim paper
Read More »
« Prev
« First
page 29 / 1096
Last »
Next »