Sciweavers

5665 search results - page 35 / 1133
» Introduction to Computer Security
Sort
View
ESORICS
2007
Springer
15 years 10 months ago
Inductive Proofs of Computational Secrecy
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
CCS
2003
ACM
15 years 9 months ago
Automatic generation of two-party computations
Philip D. MacKenzie, Alina Oprea, Michael K. Reite...
OOPSLA
2010
Springer
15 years 2 months ago
Patterns and statistical analysis for understanding reduced resource computing
Martin C. Rinard, Henry Hoffmann, Sasa Misailovic,...
SIGCSE
2004
ACM
95views Education» more  SIGCSE 2004»
15 years 10 months ago
Cryptography and computer security for undergraduates
The panel discusses solutions to the problem of computer security education. Categories and Subject Descriptors C.2.0 [Computer-Communication Networks]: security and protection. E...
Paul De Palma, Charles Frank, Suzanne E. Gladfelte...