Sciweavers

2560 search results - page 44 / 512
» Securing VO Management
Sort
View
144
Voted
COMPSEC
2004
105views more  COMPSEC 2004»
15 years 3 months ago
Rico: a security proxy for mobile code
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch
103
Voted
EEE
2005
IEEE
15 years 9 months ago
E-Voting: A Scalable Approach using XML and Hardware Security Modules
Thomas Rössler, Herbert Leitold, Reinhard Pos...
87
Voted
IH
1999
Springer
15 years 8 months ago
Secure Steganographic Methods for Palette Images
Jiri Fridrich, Rui Du
68
Voted
CAISE
2006
Springer
15 years 7 months ago
Choosing a Prioritization Method-Case of IS Security Improvement
Camille Salinesi, Elena Kornyshova