Sciweavers

14824 search results - page 75 / 2965
» Security - Introduction
Sort
View
98
Voted
CRISIS
2009
15 years 3 months ago
Formal analysis of attacks for e-voting system
Komminist Weldemariam, Richard A. Kemmerer, Adolfo...
CCS
2010
ACM
15 years 2 months ago
Spectrum based fraud detection in social networks
Xiaowei Ying, Xintao Wu, Daniel Barbará
73
Voted
CCS
2010
ACM
15 years 2 months ago
An improved algorithm for tor circuit scheduling
Can Tang, Ian Goldberg
CCS
2010
ACM
15 years 2 months ago
Robusta: taming the native beast of the JVM
Joseph Siefers, Gang Tan, Greg Morrisett
CCS
2010
ACM
15 years 2 months ago
Computationally sound verification of source code
Michael Backes, Matteo Maffei, Dominique Unruh