Sciweavers

14824 search results - page 96 / 2965
» Security - Introduction
Sort
View
CCS
2010
ACM
15 years 7 months ago
Computationally secure two-round authenticated message exchange
Klaas Ole Kürtz, Henning Schnoor, Thomas Wilk...
ACSAC
2009
IEEE
15 years 7 months ago
Secure Web 2.0 Content Sharing Beyond Walled Gardens
San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov
ISPEC
2009
Springer
15 years 7 months ago
An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems
Ruishan Zhang, Xinyuan Wang, Xiaohui Yang, Ryan Fa...
69
Voted
ESORICS
2007
Springer
15 years 6 months ago
Security Evaluation of Scenarios Based on the TCG's TPM Specification
Sigrid Gürgens, Carsten Rudolph, Dirk Scheuer...
68
Voted
CSFW
2006
IEEE
15 years 6 months ago
Managing Policy Updates in Security-Typed Languages
Nikhil Swamy, Michael Hicks, Stephen Tse, Steve Zd...