Sciweavers

3299 search results - page 82 / 660
» Privacy and Trusted Computing
Sort
View
130
Voted
MOC
2010
14 years 11 months ago
Computing a lower bound for the canonical height on elliptic curves over number fields
Computing a lower bound for the canonical height is a crucial step in determining a Mordell
Thotsaphon Thongjunthug
ETRICS
2006
15 years 8 months ago
Transitive Trust in Mobile Scenarios
rorizontl integrtion of ess tehnologies to networks nd servies should e ompnied y some kind of onvergene of uthentiE tion tehnologiesF he missing link for the federtion of user ide...
Nicolai Kuntze, Andreas U. Schmidt
CCS
2008
ACM
15 years 6 months ago
Computationally sound mechanized proofs for basic and public-key Kerberos
Bruno Blanchet, Aaron D. Jaggard, Andre Scedrov, J...
ISI
2006
Springer
15 years 4 months ago
A Flexible and Scalable Access Control for Ubiquitous Computing Environments
Hung Le Xuan, Nguyen Ngoc Diep, Yonil Zhung, Sungy...
132
Voted
OOPSLA
2010
Springer
15 years 2 months ago
What can the GC compute efficiently?: a language for heap assertions at GC time
Christoph Reichenbach, Neil Immerman, Yannis Smara...