Sciweavers

14824 search results - page 130 / 2965
» Security - Introduction
Sort
View
PET
2010
Springer
15 years 6 months ago
Preventing Active Timing Attacks in Low-Latency Anonymous Communication
Joan Feigenbaum, Aaron Johnson, Paul F. Syverson
ESORICS
2007
Springer
15 years 6 months ago
Efficient Password-Based Authenticated Key Exchange Without Public Information
Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
305
Voted
SP
2010
IEEE
419views Security Privacy» more  SP 2010»
15 years 6 months ago
Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors
Matt Fredrikson, Somesh Jha, Mihai Christodorescu,...
133
Voted
ACSAC
2004
IEEE
15 years 6 months ago
The Cyber Enemy Within ... Countering the Threat from Malicious Insiders
Dick Brackney, Terrance Goan, Allen Ott, Lockheed ...
ACSAC
2004
IEEE
15 years 6 months ago
Detecting Kernel-Level Rootkits Through Binary Analysis
Christopher Krügel, William K. Robertson, Gio...