Sciweavers

14824 search results - page 54 / 2965
» Security - Introduction
Sort
View
CCS
1998
ACM
15 years 4 months ago
Public-Key Cryptography and Password Protocols
Shai Halevi, Hugo Krawczyk
74
Voted
CCS
1998
ACM
15 years 4 months ago
Temporal Sequence Learning and Data Reduction for Anomaly Detection
Terran Lane, Carla E. Brodley
79
Voted
CCS
1998
ACM
15 years 4 months ago
Key Management for Encrypted broadcast
Avishai Wool
80
Voted
CSFW
1997
IEEE
15 years 4 months ago
Mechanized proofs for a recursive authentication protocol
Lawrence C. Paulson
101
Voted
CSFW
1997
IEEE
15 years 4 months ago
Unreliable Intrusion Detection in Distributed Computations
Dahlia Malkhi, Michael K. Reiter