Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5119
search results - page 126 / 1024
»
Security Privacy
Sort
relevance
views
votes
recent
update
View
thumb
title
99
click to vote
CRITIS
2007
79
views
Security Privacy
»
more
CRITIS 2007
»
An Approach to Trust Management Challenges for Critical Infrastructures
15 years 5 months ago
Download
www.grid.ucy.ac.cy
Ioanna Dionysiou, Deborah A. Frincke, David E. Bak...
claim paper
Read More »
85
click to vote
ACISP
2010
Springer
125
views
Security Privacy
»
more
ACISP 2010
»
On Multidimensional Linear Cryptanalysis
15 years 5 months ago
Download
web.science.mq.edu.au
Phuong Ha Nguyen, Lei Wei, Huaxiong Wang, San Ling
claim paper
Read More »
96
click to vote
ACISP
2010
Springer
156
views
Security Privacy
»
more
ACISP 2010
»
Adaptive and Composable Non-committing Encryptions
15 years 5 months ago
Download
itslab.csce.kyushu-u.ac.jp
Huafei Zhu, Tadashi Araragi, Takashi Nishide, Koui...
claim paper
Read More »
107
click to vote
ACISP
2010
Springer
110
views
Security Privacy
»
more
ACISP 2010
»
Proof-of-Knowledge of Representation of Committed Value and Its Applications
15 years 5 months ago
Download
web.science.mq.edu.au
Man Ho Au, Willy Susilo, Yi Mu
claim paper
Read More »
175
click to vote
CRISIS
2009
187
views
Security Privacy
»
more
CRISIS 2009
»
A reference model for risk-aware business process management
15 years 4 months ago
Download
research.securityresearch.at
The major contribution of this paper is the
Stefan Jakoubi, Simon Tjoa
claim paper
Read More »
« Prev
« First
page 126 / 1024
Last »
Next »