Sciweavers

5119 search results - page 127 / 1024
» Security Privacy
Sort
View
79
Voted
CCS
2010
ACM
15 years 4 months ago
Survivable key compromise in software update systems
Justin Samuel, Nick Mathewson, Justin Cappos, Roge...
CCS
2010
ACM
15 years 4 months ago
Building efficient fully collusion-resilient traitor tracing and revocation schemes
Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai...
115
Voted
CCS
2010
ACM
15 years 4 months ago
Mimimorphism: a new approach to binary code obfuscation
Zhenyu Wu, Steven Gianvecchio, Mengjun Xie, Hainin...
SP
2008
IEEE
113views Security Privacy» more  SP 2008»
15 years 3 months ago
Biological data mining
Mohammed Javeed Zaki, Naren Ramakrishnan, Srinivas...