Sciweavers

14824 search results - page 30 / 2965
» Security - Introduction
Sort
View
86
Voted
CCS
2007
ACM
15 years 6 months ago
Trusted computing challenges
Leendert van Doorn
83
Voted
ESORICS
2007
Springer
15 years 6 months ago
A Logic for State-Modifying Authorization Policies
Moritz Y. Becker, Sebastian Nanz
84
Voted
ESORICS
2007
Springer
15 years 6 months ago
Generalized Key Delegation for Hierarchical Identity-Based Encryption
Michel Abdalla, Eike Kiltz, Gregory Neven
EUROPKI
2007
Springer
15 years 6 months ago
Universally Composable Signcryption
Kristian Gjøsteen, Lillian Kråkmo
74
Voted
EUROPKI
2007
Springer
15 years 6 months ago
Anonymous k -Show Credentials
Mohamed Layouni, Hans Vangheluwe