Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
1564
search results - page 21 / 313
»
Security in Practice - Security-Usability Chasm
Sort
relevance
views
votes
recent
update
View
thumb
title
58
click to vote
DAGSTUHL
2007
66
views
Software Engineering
»
more
DAGSTUHL 2007
»
A practical and secure coercion-resistant scheme for remote elections
15 years 5 months ago
Download
drops.dagstuhl.de
Roberto Araujo, Sébastien Foulle, Jacques T...
claim paper
Read More »
90
Voted
SECRYPT
2007
78
views
Business
»
more
SECRYPT 2007
»
Practical Secure Biometrics using Set Intersection as a Similarity Measure
15 years 5 months ago
Download
socek.net
Daniel Socek, Dubravko Culibrk, Vladimir Bozovic
claim paper
Read More »
107
Voted
ICISC
2001
74
views
Cryptology
»
more
ICISC 2001
»
Practical Security in Public-Key Cryptography
15 years 5 months ago
Download
www.di.ens.fr
David Pointcheval
claim paper
Read More »
91
Voted
ACJ
2006
105
views
more
ACJ 2006
»
Return On Security Investment (ROSI) - A Practical Quantitative Modell
15 years 3 months ago
Download
www.jrpit.acs.org.au
Wes Sonnenreich, Jason Albanese, Bruce Stout
claim paper
Read More »
48
click to vote
ISJGP
2006
82
views
more
ISJGP 2006
»
Best Practices for Building a Security Operations Center
15 years 3 months ago
Download
www.secguru.com
Diana Kelley, Ron Moritz
claim paper
Read More »
« Prev
« First
page 21 / 313
Last »
Next »