Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
3452
search results - page 73 / 691
»
Secure Data Outsourcing
Sort
relevance
views
votes
recent
update
View
thumb
title
100
Voted
GECCO
2005
Springer
100
views
Optimization
»
more
GECCO 2005
»
Improving network applications security: a new heuristic to generate stress testing data
15 years 8 months ago
Download
www.cs.bham.ac.uk
Concettina Del Grosso, Giuliano Antoniol, Massimil...
claim paper
Read More »
77
click to vote
FPL
2004
Springer
67
views
Hardware
»
more
FPL 2004
»
A Key Management Architecture for Securing Off-Chip Data Transfers
15 years 8 months ago
Download
scholar.lib.vt.edu
Jonathan Graf, Peter M. Athanas
claim paper
Read More »
100
click to vote
VLDB
2004
ACM
100
views
Database
»
more
VLDB 2004
»
Secure XML Publishing without Information Leakage in the Presence of Data Inference
15 years 8 months ago
Download
www.vldb.org
Xiaochun Yang, Chen Li
claim paper
Read More »
103
Voted
ICTCS
2003
Springer
71
views
Theoretical Computer Science
»
more
ICTCS 2003
»
Compositional Verification of Secure Streamed Data: A Case Study with EMSS
15 years 8 months ago
Download
wwwold.iit.cnr.it
Fabio Martinelli, Marinella Petrocchi, Anna Vaccar...
claim paper
Read More »
91
Voted
ISSS
2002
IEEE
106
views
Hardware
»
more
ISSS 2002
»
Securing Wireless Data: System Architecture Challenges
15 years 7 months ago
Download
mnet.cs.nthu.edu.tw
Anand Raghunathan, Nachiketh R. Potlapally, Srivat...
claim paper
Read More »
« Prev
« First
page 73 / 691
Last »
Next »