Sciweavers

5119 search results - page 17 / 1024
» Security Privacy
Sort
View
112
Voted
CCS
2011
ACM
14 years 2 months ago
Ciphers that securely encipher their own keys
Mihir Bellare, David Cash, Sriram Keelveedhi
91
Voted
ESORICS
2002
Springer
16 years 2 months ago
Equal To The Task?
James Heather, Steve Schneider
105
Voted
IEEEARES
2010
IEEE
15 years 9 months ago
Information Flow in Disaster Management Systems
Achim D. Brucker, Dieter Hutter
97
Voted
IDTRUST
2010
ACM
15 years 9 months ago
Efficient and privacy-preserving enforcement of attribute-based access control
Ning Shang, Federica Paci, Elisa Bertino