Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
3452
search results - page 77 / 691
»
Secure Data Outsourcing
Sort
relevance
views
votes
recent
update
View
thumb
title
112
click to vote
TMC
2010
138
views
more
TMC 2010
»
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
15 years 1 months ago
Download
www2.engr.arizona.edu
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
claim paper
Read More »
61
click to vote
IJIPM
2010
77
views
more
IJIPM 2010
»
Increase honeypot security through data analysis
15 years 8 days ago
Download
www.humanpub.org
Milad Daliran, Ramin Nassiri
claim paper
Read More »
109
click to vote
COMCOM
2011
152
views
Computational Linguistics
»
more
COMCOM 2011
»
Securing the data path of next-generation router systems
14 years 10 months ago
Download
www.ecs.umass.edu
Tilman Wolf, Russell Tessier, Gayatri Prabhu
claim paper
Read More »
118
click to vote
ISCI
2011
201
views
Natural Language Processing
»
more
ISCI 2011
»
Space efficient secret sharing for implicit data security
14 years 9 months ago
Download
cs.okstate.edu
Abhishek Parakh, Subhash Kak
claim paper
Read More »
101
click to vote
CHI
2011
ACM
252
views
Human Computer Interaction
»
more
CHI 2011
»
Data type based security alert dialogs
14 years 6 months ago
Download
www.medien.ifi.lmu.de
Max-Emanuel Maurer, Alexander De Luca, Heinrich Hu...
claim paper
Read More »
« Prev
« First
page 77 / 691
Last »
Next »