Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
6555
search results - page 37 / 1311
»
Secure attribute-based systems
Sort
relevance
views
votes
recent
update
View
thumb
title
82
Voted
ACSAC
2005
IEEE
129
views
Security Privacy
»
more
ACSAC 2005
»
Survivability Architecture of a Mission Critical System: The DPASA Example
15 years 8 months ago
Download
www.bbn.com
Jennifer Chong, Partha Pratim Pal, Michael Atighet...
claim paper
Read More »
102
Voted
WISA
2004
Springer
91
views
Security Privacy
»
more
WISA 2004
»
Vulnerability of a Mobile Payment System Proposed at WISA 2002
15 years 8 months ago
Download
dasan.sejong.ac.kr
SangCheol Hwang, Dong Hoon Lee 0002, Daewan Han, J...
claim paper
Read More »
99
click to vote
ACISP
2003
Springer
89
views
Security Privacy
»
more
ACISP 2003
»
Separating Encryption and Key Issuance in Digital Rights Management Systems
15 years 6 months ago
Download
imailab-www.iis.u-tokyo.ac.jp
Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go ...
claim paper
Read More »
94
Voted
CRITIS
2008
118
views
Security Privacy
»
more
CRITIS 2008
»
Critical Infrastructures as Complex Systems: A Multi-level Protection Architecture
15 years 4 months ago
Download
paoluzzi.dia.uniroma3.it
Pierluigi Assogna, Glauco Bertocchi, Antonio DiCar...
claim paper
Read More »
91
Voted
ACSAC
2010
IEEE
241
views
Security Privacy
»
more
ACSAC 2010
»
Hardware assistance for trustworthy systems through 3-D integration
15 years 23 days ago
Download
cseweb.ucsd.edu
Jonathan Valamehr, Mohit Tiwari, Timothy Sherwood,...
claim paper
Read More »
« Prev
« First
page 37 / 1311
Last »
Next »