Sciweavers

3395 search results - page 10 / 679
» Computational Differential Privacy
Sort
View
68
Voted
ACISP
2008
Springer
15 years 8 months ago
A Tree-Based Approach for Computing Double-Base Chains
Christophe Doche, Laurent Habsieger
CCS
2007
ACM
15 years 8 months ago
Trusted computing challenges
Leendert van Doorn
108
Voted
CSFW
1997
IEEE
15 years 6 months ago
Unreliable Intrusion Detection in Distributed Computations
Dahlia Malkhi, Michael K. Reiter
96
Voted
CSFW
1994
IEEE
15 years 6 months ago
A Model of Computation for the NRL Protocol Analyzer
Catherine Meadows