Sciweavers

14824 search results - page 48 / 2965
» Security - Introduction
Sort
View
59
Voted
AGENTS
2000
Springer
15 years 4 months ago
The RETSINA communicator
Onn Shehory, Katia P. Sycara
68
Voted
CCS
2000
ACM
15 years 4 months ago
An authorization model for temporal data
Avigdor Gal, Vijayalakshmi Atluri
81
Voted
CCS
2000
ACM
15 years 4 months ago
Simple and fault-tolerant key agreement for dynamic collaborative groups
Yongdae Kim, Adrian Perrig, Gene Tsudik
91
Voted
CCS
2000
ACM
15 years 4 months ago
A protocol for anonymous communication over the Internet
Ï Ø Ø ÖÓÛØ Ò ÔØ Ò Ó Ø ÁÒØ ÖÒ Ø¸ Ø Ö × Ò Ò Ö × ÒØ Ö ×Ø Ò Ñ ÒØ Ò Ò ÒÓÒÝÑ ØÝ Ò Ø Ò ØÛÓÖ º Ì × Ô Ô Ö ÔÖ × ÒØ× Ò Û...
Clay Shields, Brian Neil Levine
76
Voted
CCS
2000
ACM
15 years 4 months ago
An access control model for simplifying constraint expression
Jonathon Tidswell, Trent Jaeger