Sciweavers

41472 search results - page 319 / 8295
» or 2006
Sort
View
97
Voted
IEEESP
2007
48views more  IEEESP 2007»
15 years 4 months ago
Estimating Software Vulnerabilities
Jeffrey R. Jones
NETWORKS
2006
15 years 4 months ago
An improved deniable authentication protocol
Jun Shao, Zhenfu Cao, Rongxing Lu
IEEESP
2007
57views more  IEEESP 2007»
15 years 4 months ago
An Information Security Strategy for Networkable Devices
Ilan Oshri, Julia Kotlarsky, Corey Hirsch
IEEESP
2007
57views more  IEEESP 2007»
15 years 4 months ago
Who's Watching You Now?
John Morris, Jon Peterson
NETWORKS
2006
15 years 4 months ago
The approach-dependent, time-dependent, label-constrained shortest path problem
Hanif D. Sherali, Chawalit Jeenanunta, Antoine G. ...