Sciweavers

5119 search results - page 135 / 1024
» Security Privacy
Sort
View
100
Voted
SPW
2001
Springer
15 years 8 months ago
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols
William Aiello, Steven M. Bellovin, Matt Blaze, Ra...
104
Voted
CSFW
2000
IEEE
15 years 8 months ago
Relating Strands and Multiset Rewriting for Security Protocol Analysis
Iliano Cervesato, Nancy A. Durgin, John C. Mitchel...
CCS
2000
ACM
15 years 8 months ago
Distribution chain security
Ø Ð ÓÒØ ÒØ ×ØÖ ÙØ ÓÒ ×Ýר Ñ× Û ÐÐ Ò Ð Ù× Ò ×× ÑÓ ¹ Ð× Ò Ø Ò Ö ÙØÙÖ Ø Ø ÒÒÓØ ÔÖ Ø ØÓ ݺ ÁÒ Ø × Ô Ô Ö¸ Û ÒØ Ý Ò ...
Glenn Durfee, Matthew K. Franklin
SP
1998
IEEE
147views Security Privacy» more  SP 1998»
15 years 8 months ago
Secure Execution of Java Applets using a Remote Playground
Dahlia Malkhi, Michael K. Reiter, Aviel D. Rubin
83
Voted
SP
1990
IEEE
15 years 8 months ago
A Network Security Monitor
L. Todd Herberlein, Gihan V. Dias, Karl N. Levitt,...