Sciweavers

3299 search results - page 65 / 660
» Privacy and Trusted Computing
Sort
View
103
Voted
CCS
2010
ACM
15 years 11 months ago
Computationally secure two-round authenticated message exchange
Klaas Ole Kürtz, Henning Schnoor, Thomas Wilk...
IEEEARES
2007
IEEE
15 years 10 months ago
Self-Stabilization as a Foundation for Autonomic Computing
Olga Brukman, Shlomi Dolev, Yinnon A. Haviv, Reuve...
ESORICS
2007
Springer
15 years 10 months ago
Inductive Proofs of Computational Secrecy
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
CCS
2003
ACM
15 years 9 months ago
Automatic generation of two-party computations
Philip D. MacKenzie, Alina Oprea, Michael K. Reite...
CCS
2008
ACM
15 years 6 months ago
Secure control of portable images in a virtual computing utility
Ionut Constandache, Aydan R. Yumerefendi, Jeffrey ...