Sciweavers

14824 search results - page 133 / 2965
» Security - Introduction
Sort
View
75
Voted
CRITIS
2006
15 years 6 months ago
A Framework for Conceptualizing Social Engineering Attacks
Jose J. Gonzalez, Jose Maria Sarriegi, Alazne Gurr...
106
Voted
ETRICS
2006
15 years 6 months ago
Controlling Access to Documents: A Formal Access Control Model
Paul E. Sevinç, David A. Basin, Ernst-R&uum...
103
Voted
EUROPKI
2006
Springer
15 years 6 months ago
Efficient Conjunctive Keyword Search on Encrypted Data Storage System
Jin Wook Byun, Dong Hoon Lee, Jongin Lim
89
Voted
AGENTS
2000
Springer
15 years 6 months ago
Ant-inspired navigation in unknown environments
Stergios I. Roumeliotis, Paolo Pirjanian, Maja J. ...
87
Voted
AGENTS
2000
Springer
15 years 6 months ago
An agent architecture to fulfill real-time requirements
Ignacio Soto, Mercedes Garijo, Carlos Angel Iglesi...