Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
2560
search results - page 44 / 512
»
Securing VO Management
Sort
relevance
views
votes
recent
update
View
thumb
title
144
Voted
COMPSEC
2004
105
views
more
COMPSEC 2004
»
Rico: a security proxy for mobile code
15 years 3 months ago
Download
www.brettfleisch.com
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch
claim paper
Read More »
103
Voted
EEE
2005
IEEE
117
views
Information Technology
»
more
EEE 2005
»
E-Voting: A Scalable Approach using XML and Hardware Security Modules
15 years 9 months ago
Download
www.a-sit.at
Thomas Rössler, Herbert Leitold, Reinhard Pos...
claim paper
Read More »
110
Voted
ISW
2001
Springer
98
views
Information Technology
»
more
ISW 2001
»
Securing Elliptic Curve Point Multiplication against Side-Channel Attacks
15 years 8 months ago
Download
www.cdc.informatik.tu-darmstadt.de
Bodo Möller
claim paper
Read More »
87
Voted
IH
1999
Springer
82
views
Information Technology
»
more
IH 1999
»
Secure Steganographic Methods for Palette Images
15 years 8 months ago
Download
www.ws.binghamton.edu
Jiri Fridrich, Rui Du
claim paper
Read More »
68
Voted
CAISE
2006
Springer
117
views
Information Technology
»
more
CAISE 2006
»
Choosing a Prioritization Method-Case of IS Security Improvement
15 years 7 months ago
Download
sunsite.informatik.rwth-aachen.de
Camille Salinesi, Elena Kornyshova
claim paper
Read More »
« Prev
« First
page 44 / 512
Last »
Next »