Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
81
search results - page 3 / 17
»
sec 2007
Sort
relevance
views
votes
recent
update
View
thumb
title
99
click to vote
SEC
1997
90
views
Security Privacy
»
more
SEC 1997
»
Individual management of personal reachability in mobile communication
15 years 4 months ago
Download
www.is-frankfurt.de
Martin Reichenbach, Herbert Damker, Hannes Federra...
claim paper
Read More »
77
click to vote
SEC
2007
96
views
Security Privacy
»
more
SEC 2007
»
Phishing in the Wireless: Implementation and Analysis
15 years 4 months ago
Download
disco.informatik.uni-kl.de
Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, ...
claim paper
Read More »
101
click to vote
SEC
2000
91
views
Security Privacy
»
more
SEC 2000
»
A Flexible Management Framework for Certificate Status Validation
15 years 4 months ago
Download
security.polito.it
Antonio Corradi, Rebecca Montanari, Cesare Stefane...
claim paper
Read More »
90
click to vote
SEC
2000
95
views
Security Privacy
»
more
SEC 2000
»
Securing Mobile Agents for Electronic Commerce: An Experiment
15 years 4 months ago
Download
www.cse.cuhk.edu.hk
Anthony H. W. Chan, Caris K. M. Wong, Tsz Yeung Wo...
claim paper
Read More »
116
click to vote
SEC
1993
119
views
Security Privacy
»
more
SEC 1993
»
Teaching Computer Security
15 years 4 months ago
Download
seclab.cs.ucdavis.edu
This paper describes three courses in computer security, and offers come comments about their appropriateness, their advantages and their disadvantages.
Matt Bishop
claim paper
Read More »
« Prev
« First
page 3 / 17
Last »
Next »