Sciweavers

6137 search results - page 139 / 1228
» Securing Collaborative Applications
Sort
View
ITPRO
2010
56views more  ITPRO 2010»
13 years 7 months ago
Web-Application Security: From Reactive to Proactive
John R. Maguire, H. Gilbert Miller
JIPS
2011
62views more  JIPS 2011»
13 years 4 months ago
Security Framework for RFID-based Applications in Smart Home Environment
Divyan M. Konidala, Daeyoung Kim, Chan Yeob Yeun, ...
SACMAT
2011
ACM
12 years 12 months ago
An approach to modular and testable security models of real-world health-care applications
t http://www.brucker.ch/bibliography/abstract/ brucker.ea-model-based-2011 by permission of ACM for your personal use. Not for redistribution. The definitive version was published...
Achim D. Brucker, Lukas Brügger, Paul Kearney...
CRYPTO
2012
Springer
217views Cryptology» more  CRYPTO 2012»
11 years 11 months ago
Multi-instance Security and Its Application to Password-Based Cryptography
Mihir Bellare, Thomas Ristenpart, Stefano Tessaro
CHI
2004
ACM
14 years 9 months ago
One-hundred days in an activity-centric collaboration environment based on shared objects
This paper describes a new collaboration technology that is carefully poised between informal, ad hoc, easy-to-initiate collaborative tools, vs. more formal, structured, and higho...
Michael J. Muller, Werner Geyer, Beth Brownholtz, ...