Sciweavers

14824 search results - page 132 / 2965
» Security - Introduction
Sort
View
79
Voted
CCS
2006
ACM
15 years 6 months ago
NETRA: : seeing through access control
Prasad Naldurg, Stefan Schwoon, Sriram K. Rajamani...
CCS
2006
ACM
15 years 6 months ago
Forward-secure signatures with untrusted update
Xavier Boyen, Hovav Shacham, Emily Shen, Brent Wat...
69
Voted
CCS
2006
ACM
15 years 6 months ago
A natural language approach to automated cryptanalysis of two-time pads
Joshua Mason, Kathryn Watkins, Jason Eisner, Adam ...
75
Voted
CRITIS
2006
15 years 6 months ago
Intelligent Network-Based Early Warning Systems
Karsten Bsufka, Olaf Kroll-Peters, Sahin Albayrak
77
Voted
CRITIS
2006
15 years 6 months ago
Enforcing Trust in Pervasive Computing with Trusted Computing Technology
Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen