Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
2560
search results - page 44 / 512
»
Securing VO Management
Sort
relevance
views
votes
recent
update
View
thumb
title
140
Voted
COMPSEC
2004
105
views
more
COMPSEC 2004
»
Rico: a security proxy for mobile code
15 years 2 months ago
Download
www.brettfleisch.com
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch
claim paper
Read More »
96
click to vote
EEE
2005
IEEE
117
views
Information Technology
»
more
EEE 2005
»
E-Voting: A Scalable Approach using XML and Hardware Security Modules
15 years 8 months ago
Download
www.a-sit.at
Thomas Rössler, Herbert Leitold, Reinhard Pos...
claim paper
Read More »
98
click to vote
ISW
2001
Springer
98
views
Information Technology
»
more
ISW 2001
»
Securing Elliptic Curve Point Multiplication against Side-Channel Attacks
15 years 7 months ago
Download
www.cdc.informatik.tu-darmstadt.de
Bodo Möller
claim paper
Read More »
82
Voted
IH
1999
Springer
82
views
Information Technology
»
more
IH 1999
»
Secure Steganographic Methods for Palette Images
15 years 6 months ago
Download
www.ws.binghamton.edu
Jiri Fridrich, Rui Du
claim paper
Read More »
61
click to vote
CAISE
2006
Springer
117
views
Information Technology
»
more
CAISE 2006
»
Choosing a Prioritization Method-Case of IS Security Improvement
15 years 6 months ago
Download
sunsite.informatik.rwth-aachen.de
Camille Salinesi, Elena Kornyshova
claim paper
Read More »
« Prev
« First
page 44 / 512
Last »
Next »