Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
1564
search results - page 5 / 313
»
Security in Practice - Security-Usability Chasm
Sort
relevance
views
votes
recent
update
View
thumb
title
12
click to vote
CCS
1998
ACM
92
views
Security Privacy
»
more
CCS 1998
»
A Practical Secure Physical Random Bit Generator
13 years 11 months ago
Download
www.informatics.indiana.edu
Markus Jakobsson, Elizabeth A. M. Shriver, Bruce H...
claim paper
Read More »
16
click to vote
SP
2006
IEEE
74
views
Security Privacy
»
more
SP 2006
»
New Constructions and Practical Applications for Private Stream Searching (Extended Abstract)
14 years 1 months ago
Download
www.cs.berkeley.edu
John Bethencourt, Dawn Xiaodong Song, Brent Waters
claim paper
Read More »
13
click to vote
SP
2006
IEEE
129
views
Security Privacy
»
more
SP 2006
»
Practical Inference Control for Data Cubes (Extended Abstract)
14 years 1 months ago
Download
cimic.rutgers.edu
Yingjiu Li, Haibing Lu, Robert H. Deng
claim paper
Read More »
18
click to vote
ACSAC
1999
IEEE
81
views
Security Privacy
»
more
ACSAC 1999
»
SCR: A Practical Approach to Building a High Assurance COMSEC System
13 years 11 months ago
Download
www.acsac.org
James Kirby, Myla Archer, Constance L. Heitmeyer
claim paper
Read More »
25
click to vote
ESORICS
2011
Springer
178
views
Security Privacy
»
more
ESORICS 2011
»
Remote Timing Attacks Are Still Practical
12 years 7 months ago
Download
eprint.iacr.org
For over two decades, timing attacks have been an active area of research within applied cryptography. These attacks exploit cryptosystem or protocol implementations that do not ru...
Billy Bob Brumley, Nicola Tuveri
claim paper
Read More »
« Prev
« First
page 5 / 313
Last »
Next »