Sciweavers

14850 search results - page 101 / 2970
» The Security of
Sort
View
CCS
2008
ACM
15 years 6 months ago
Secure control of portable images in a virtual computing utility
Ionut Constandache, Aydan R. Yumerefendi, Jeffrey ...
CCS
2006
ACM
15 years 6 months ago
Vulnerability analysis For evaluating quality of protection of security policies
Muhammad Abedin, Syeda Nessa, Ehab Al-Shaer, Latif...
CRISIS
2008
15 years 6 months ago
Formal procedural security modeling and analysis
We are involved in a project related to the evaluation
Komminist Weldemariam, Adolfo Villafiorita
ACISP
2010
Springer
15 years 6 months ago
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key
Jun Shao, Min Feng, Bin Zhu, Zhenfu Cao, Peng Liu