Sciweavers

5476 search results - page 12 / 1096
» Resettably Secure Computation
Sort
View
ESORICS
2009
Springer
15 years 11 months ago
Using SAT-Solvers to Compute Inference-Proof Database Instances
Cornelia Tadros, Lena Wiese
97
Voted
ACISP
2008
Springer
15 years 11 months ago
A Tree-Based Approach for Computing Double-Base Chains
Christophe Doche, Laurent Habsieger
CCS
2007
ACM
15 years 11 months ago
Trusted computing challenges
Leendert van Doorn
142
Voted
CSFW
1997
IEEE
15 years 9 months ago
Unreliable Intrusion Detection in Distributed Computations
Dahlia Malkhi, Michael K. Reiter