Sciweavers

6195 search results - page 110 / 1239
» Cloud Computing Security
Sort
View
115
Voted
CCS
2008
ACM
15 years 5 months ago
Computationally sound mechanized proofs for basic and public-key Kerberos
Bruno Blanchet, Aaron D. Jaggard, Andre Scedrov, J...
ISI
2006
Springer
15 years 3 months ago
A Flexible and Scalable Access Control for Ubiquitous Computing Environments
Hung Le Xuan, Nguyen Ngoc Diep, Yonil Zhung, Sungy...
OOPSLA
2010
Springer
15 years 1 months ago
What can the GC compute efficiently?: a language for heap assertions at GC time
Christoph Reichenbach, Neil Immerman, Yannis Smara...
WISA
2010
Springer
15 years 1 months ago
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
Rafael Dowsley, Jeroen van de Graaf, Davidson Marq...
COMPGEOM
2009
ACM
15 years 10 months ago
High resolution surface reconstruction from overlapping multiple-views
Extracting a computer model of a real scene from a sequence of views, is one of the most challenging and fundamental problems in computer vision. Stereo vision algorithms allow us...
Nader Salman, Mariette Yvinec