Sciweavers

14824 search results - page 104 / 2965
» Security - Introduction
Sort
View
108
Voted
ISPEC
2010
Springer
15 years 9 months ago
Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles
Harikrishna Narasimhan, Venkatanathan Varadarajan,...
ACSAC
2009
IEEE
15 years 9 months ago
Active Botnet Probing to Identify Obscure Command and Control Channels
Guofei Gu, Vinod Yegneswaran, Phillip A. Porras, J...
EUROSEC
2009
ACM
15 years 9 months ago
Preventing identity theft with electronic identity cards and the trusted platform module
Andreas Klenk, Holger Kinkelin, Christoph Eunicke,...
CCS
2009
ACM
15 years 9 months ago
SMILE: encounter-based trust for mobile social services
Justin Manweiler, Ryan Scudellari, Landon P. Cox
ISPEC
2009
Springer
15 years 9 months ago
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying...