Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
24
search results - page 2 / 5
»
isw 2009
Sort
relevance
views
votes
recent
update
View
thumb
title
118
click to vote
ISW
2009
Springer
89
views
Information Technology
»
more
ISW 2009
»
Analysis and Optimization of Cryptographically Generated Addresses
15 years 10 months ago
Download
isc09.dti.unimi.it
Joppe W. Bos, Onur Özen, Jean-Pierre Hubaux
claim paper
Read More »
117
click to vote
ISW
2009
Springer
115
views
Information Technology
»
more
ISW 2009
»
Towards Unifying Vulnerability Information for Attack Graph Construction
15 years 10 months ago
Download
isc09.dti.unimi.it
Sebastian Roschke, Feng Cheng 0002, Robert Schuppe...
claim paper
Read More »
113
click to vote
ISW
2009
Springer
100
views
Information Technology
»
more
ISW 2009
»
On the Security of Identity Based Ring Signcryption Schemes
15 years 10 months ago
Download
isc09.dti.unimi.it
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
claim paper
Read More »
106
click to vote
ISW
2009
Springer
112
views
Information Technology
»
more
ISW 2009
»
A2M: Access-Assured Mobile Desktop Computing
15 years 10 months ago
Download
cs.gmu.edu
Angelos Stavrou, Ricardo A. Barrato, Angelos D. Ke...
claim paper
Read More »
100
Voted
ISW
2009
Springer
87
views
Information Technology
»
more
ISW 2009
»
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
15 years 10 months ago
Download
isc09.dti.unimi.it
Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. De...
claim paper
Read More »
« Prev
« First
page 2 / 5
Last »
Next »