Sciweavers

5119 search results - page 138 / 1024
» Security Privacy
Sort
View
99
Voted
EUROSEC
2009
ACM
15 years 10 months ago
Breaking the memory secrecy assumption
Raoul Strackx, Yves Younan, Pieter Philippaerts, F...
IDTRUST
2009
ACM
15 years 10 months ago
Privacy-preserving management of transactions' receipts for mobile environments
Federica Paci, Ning Shang, Sam Kerr, Kevin Steuer ...
73
Voted
CCS
2009
ACM
15 years 10 months ago
Mapping kernel objects to enable systematic integrity checking
Martim Carbone, Weidong Cui, Long Lu, Wenke Lee, M...
105
Voted
ISPEC
2009
Springer
15 years 10 months ago
Analysing Protocol Implementations
Anders Moen Hagalisletto, Lars Strand, Wolfgang Le...
WISTP
2009
Springer
15 years 10 months ago
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks
Christian Lederer, Roland Mader, Manuel Koschuch, ...