Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
14824
search results - page 127 / 2965
»
Security - Introduction
Sort
relevance
views
votes
recent
update
View
thumb
title
88
click to vote
AGENTS
1997
Springer
92
views
Security Privacy
»
more
AGENTS 1997
»
Hide-and-Seek: Effective Use of Memory in Perception/Action Systems
15 years 6 months ago
Download
www.cs.virginia.edu
Glenn S. Wasson, Gabriel J. Ferrer, Worthy N. Mart...
claim paper
Read More »
96
click to vote
CSFW
1996
IEEE
101
views
Security Privacy
»
more
CSFW 1996
»
A Logic of Composition for Information Flow Predicates
15 years 6 months ago
Download
www.cs.virginia.edu
Ramesh V. Peri, William A. Wulf, Darrell M. Kienzl...
claim paper
Read More »
94
click to vote
CSFW
1996
IEEE
93
views
Security Privacy
»
more
CSFW 1996
»
Towards a model of storage jamming
15 years 6 months ago
Download
www.cs.fsu.edu
John P. McDermott, David M. Goldschlag
claim paper
Read More »
63
click to vote
CCS
1997
ACM
81
views
Security Privacy
»
more
CCS 1997
»
Proactive Public Key and Signature Systems
15 years 6 months ago
Download
www.informatics.indiana.edu
Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki...
claim paper
Read More »
89
click to vote
OOPSLA
1997
Springer
114
views
Security Privacy
»
more
OOPSLA 1997
»
Adding Type Parameterization to the Java Language
15 years 6 months ago
Download
www.cs.williams.edu
Ole Agesen, Stephen N. Freund, John C. Mitchell
claim paper
Read More »
« Prev
« First
page 127 / 2965
Last »
Next »