Sciweavers

14824 search results - page 30 / 2965
» Security - Introduction
Sort
View
95
Voted
CCS
2007
ACM
15 years 8 months ago
Trusted computing challenges
Leendert van Doorn
93
Voted
ESORICS
2007
Springer
15 years 8 months ago
A Logic for State-Modifying Authorization Policies
Moritz Y. Becker, Sebastian Nanz
ESORICS
2007
Springer
15 years 8 months ago
Generalized Key Delegation for Hierarchical Identity-Based Encryption
Michel Abdalla, Eike Kiltz, Gregory Neven
EUROPKI
2007
Springer
15 years 8 months ago
Universally Composable Signcryption
Kristian Gjøsteen, Lillian Kråkmo
EUROPKI
2007
Springer
15 years 8 months ago
Anonymous k -Show Credentials
Mohamed Layouni, Hans Vangheluwe