Sciweavers

14824 search results - page 19 / 2965
» Security - Introduction
Sort
View
IEEEARES
2009
IEEE
15 years 7 months ago
A First Step towards Characterizing Stealthy Botnets
Justin Leonard, Shouhuai Xu, Ravi S. Sandhu
152
Voted
IEEEARES
2009
IEEE
15 years 7 months ago
Privacy-Preserving Collaborative Filtering Schemes
Hiroaki Kikuchi, Hiroyasu Kizawa, Minako Tada
IEEEARES
2009
IEEE
15 years 7 months ago
Protecting Global and Static Variables from Buffer Overflow Attacks
Yves Younan, Frank Piessens, Wouter Joosen
80
Voted
IDTRUST
2009
ACM
15 years 7 months ago
Identity, credential, and access management at NASA, from Zachman to attributes
Corinne S. Irwin, Dennis C. Taylor
CCS
2009
ACM
15 years 7 months ago
Oblivious transfer with access control
Jan Camenisch, Maria Dubovitskaya, Gregory Neven