Sciweavers

5484 search results - page 13 / 1097
» Almost-Everywhere Secure Computation
Sort
View
CCS
2008
ACM
15 years 7 months ago
Secure control of portable images in a virtual computing utility
Ionut Constandache, Aydan R. Yumerefendi, Jeffrey ...
ISPEC
2009
Springer
15 years 11 months ago
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying...
IEEEARES
2007
IEEE
15 years 11 months ago
Self-Stabilization as a Foundation for Autonomic Computing
Olga Brukman, Shlomi Dolev, Yinnon A. Haviv, Reuve...
94
Voted
ESORICS
2007
Springer
15 years 11 months ago
Inductive Proofs of Computational Secrecy
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
88
Voted
CCS
2003
ACM
15 years 10 months ago
Automatic generation of two-party computations
Philip D. MacKenzie, Alina Oprea, Michael K. Reite...