Sciweavers

14850 search results - page 140 / 2970
» The Security of
Sort
View
CCS
2010
ACM
13 years 10 months ago
Building efficient fully collusion-resilient traitor tracing and revocation schemes
Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai...
CCS
2010
ACM
13 years 10 months ago
Mimimorphism: a new approach to binary code obfuscation
Zhenyu Wu, Steven Gianvecchio, Mengjun Xie, Hainin...
IJNSEC
2007
130views more  IJNSEC 2007»
13 years 10 months ago
Central Manager: A Solution to Avoid Denial Of Service Attacks for Wireless LANs
802.1x is a security protocol based on the frame structure
Ping Ding
SP
2008
IEEE
113views Security Privacy» more  SP 2008»
13 years 10 months ago
Biological data mining
Mohammed Javeed Zaki, Naren Ramakrishnan, Srinivas...