Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
14850
search results - page 34 / 2970
»
The Security of
Sort
relevance
views
votes
recent
update
View
thumb
title
95
click to vote
ISPEC
2005
Springer
96
views
Security Privacy
»
more
ISPEC 2005
»
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures
15 years 10 months ago
Download
nds.hgi.rub.de
André Adelsbach, Sebastian Gajek, Jörg...
claim paper
Read More »
107
click to vote
SPW
2005
Springer
145
views
Security Privacy
»
more
SPW 2005
»
Authorisation Subterfuge by Delegation in Decentralised Networks
15 years 10 months ago
Download
www.cs.ucc.ie
Simon N. Foley, Hongbin Zhou
claim paper
Read More »
127
click to vote
SPW
2005
Springer
140
views
Security Privacy
»
more
SPW 2005
»
Alice and Bob
15 years 10 months ago
Download
www.maths.qmul.ac.uk
John Gordon
claim paper
Read More »
131
click to vote
SPW
2005
Springer
114
views
Security Privacy
»
more
SPW 2005
»
The Initial Costs and Maintenance Costs of Protocols
15 years 10 months ago
Download
www.cl.cam.ac.uk
Ross Anderson
claim paper
Read More »
143
click to vote
SPW
2005
Springer
115
views
Security Privacy
»
more
SPW 2005
»
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable)
15 years 10 months ago
Download
www.cl.cam.ac.uk
Richard Clayton
claim paper
Read More »
« Prev
« First
page 34 / 2970
Last »
Next »