Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
14850
search results - page 24 / 2970
»
The Security of
Sort
relevance
views
votes
recent
update
View
thumb
title
115
click to vote
CSFW
2008
IEEE
119
views
Security Privacy
»
more
CSFW 2008
»
Tractable Enforcement of Declassification Policies
15 years 11 months ago
Download
www-sop.inria.fr
Gilles Barthe, Salvador Cavadini, Tamara Rezk
claim paper
Read More »
111
click to vote
CSFW
2008
IEEE
118
views
Security Privacy
»
more
CSFW 2008
»
Access-Control Policies via Belnap Logic: Effective and Efficient Composition and Analysis
15 years 11 months ago
Download
pubs.doc.ic.ac.uk
Glenn Bruns, Michael Huth
claim paper
Read More »
111
Voted
CSFW
2008
IEEE
110
views
Security Privacy
»
more
CSFW 2008
»
Cryptographically-Sound Protocol-Model Abstractions
15 years 11 months ago
Download
www.zisc.ethz.ch
Christoph Sprenger, David A. Basin
claim paper
Read More »
126
click to vote
CSFW
2008
IEEE
91
views
Security Privacy
»
more
CSFW 2008
»
Formal Analysis of PKCS#11
15 years 11 months ago
Download
www.lsv.ens-cachan.fr
Stéphanie Delaune, Steve Kremer, Graham Ste...
claim paper
Read More »
117
click to vote
HOST
2008
IEEE
164
views
Security Privacy
»
more
HOST 2008
»
Reassessing the TCG Specifications for Trusted Computing in Mobile and Embedded Systems
15 years 11 months ago
Download
www.cs.bris.ac.uk
Johann Großschädl, Tobias Vejda, Dan Pa...
claim paper
Read More »
« Prev
« First
page 24 / 2970
Last »
Next »