Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
14850
search results - page 96 / 2970
»
The Security of
Sort
relevance
views
votes
recent
update
View
thumb
title
107
click to vote
OOPSLA
2004
Springer
114
views
Security Privacy
»
more
OOPSLA 2004
»
Looking for love: (in all the wrong places)
15 years 9 months ago
Download
www.stevegilliland.com
David West
claim paper
Read More »
99
click to vote
ISI
2003
Springer
78
views
Security Privacy
»
more
ISI 2003
»
Tracking Hidden Groups Using Communications
15 years 9 months ago
Download
www.isiconference.org
Sudarshan S. Chawathe
claim paper
Read More »
129
click to vote
CANS
2008
Springer
159
views
Cryptology
»
more
CANS 2008
»
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange
15 years 6 months ago
Download
www.di.ens.fr
ded abstract of this paper appeared in Proceedings of the 7th International Conference on Cryptology and Network Security (CANS '08) December 2
Michel Abdalla, Malika Izabachène, David Po...
claim paper
Read More »
103
click to vote
CCS
2010
ACM
171
views
Security Privacy
»
more
CCS 2010
»
Computationally secure two-round authenticated message exchange
15 years 11 months ago
Download
www.informatik.uni-kiel.de
Klaas Ole Kürtz, Henning Schnoor, Thomas Wilk...
claim paper
Read More »
95
click to vote
ACSAC
2009
IEEE
108
views
Security Privacy
»
more
ACSAC 2009
»
Secure Web 2.0 Content Sharing Beyond Walled Gardens
15 years 11 months ago
Download
lersse-dl.ece.ubc.ca
San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov
claim paper
Read More »
« Prev
« First
page 96 / 2970
Last »
Next »