Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5119
search results - page 136 / 1024
»
Security Privacy
Sort
relevance
views
votes
recent
update
View
thumb
title
84
click to vote
CRITIS
2006
87
views
Security Privacy
»
more
CRITIS 2006
»
Protection of Components Based on a Smart-Card Enhanced Security Module
15 years 7 months ago
Download
www.isac.uma.es
Joaquín García-Alfaro, Sergio Castil...
claim paper
Read More »
85
Voted
CRITIS
2006
98
views
Security Privacy
»
more
CRITIS 2006
»
Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP)
15 years 7 months ago
Download
critis06.lcc.uma.es
Daniel J. Martínez-Manzano, Gabriel L&oacut...
claim paper
Read More »
102
Voted
ACSAC
2001
IEEE
127
views
Security Privacy
»
more
ACSAC 2001
»
A Security Model for Military Message Systems: Retrospective
15 years 7 months ago
Download
www.acsac.org
Carl E. Landwehr, Constance L. Heitmeyer, John D. ...
claim paper
Read More »
82
click to vote
CCS
2010
ACM
154
views
Security Privacy
»
more
CCS 2010
»
An opportunistic authority evaluation scheme for data security in crisis management scenarios
15 years 4 months ago
Download
www.doc.ic.ac.uk
Enrico Scalavino, Giovanni Russello, Rudi Ball, Va...
claim paper
Read More »
86
Voted
CCS
2010
ACM
178
views
Security Privacy
»
more
CCS 2010
»
A methodology for empirical analysis of permission-based security models and its application to android
15 years 4 months ago
Download
www.ccsl.carleton.ca
David Barrera, Hilmi Günes Kayacik, Paul C. v...
claim paper
Read More »
« Prev
« First
page 136 / 1024
Last »
Next »