Sciweavers

5476 search results - page 29 / 1096
» Resettably Secure Computation
Sort
View
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
15 years 2 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
RAID
2010
Springer
15 years 3 months ago
A Centralized Monitoring Infrastructure for Improving DNS Security
Manos Antonakakis, David Dagon, Xiapu Luo, Roberto...
CLOUDCOM
2010
Springer
15 years 3 months ago
Security Services Lifecycle Management in On-Demand Infrastructure Services Provisioning
Yuri Demchenko, Cees de Laat, Diego R. Lopez, Joan...
COMCOM
2011
15 years 12 days ago
An RFID secure authentication mechanism in WLAN
Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Ha...