Sciweavers

5476 search results - page 13 / 1096
» Resettably Secure Computation
Sort
View
96
Voted
CSFW
1994
IEEE
15 years 6 months ago
A Model of Computation for the NRL Protocol Analyzer
Catherine Meadows
75
Voted
CCS
2010
ACM
15 years 2 months ago
Computationally sound verification of source code
Michael Backes, Matteo Maffei, Dominique Unruh
74
Voted
ISI
2008
Springer
15 years 1 months ago
Social Computing: Fundamentals and applications
Fei-Yue Wang