Sciweavers

5119 search results - page 144 / 1024
» Security Privacy
Sort
View
101
Voted
SP
2010
IEEE
161views Security Privacy» more  SP 2010»
15 years 7 months ago
Towards Static Flow-Based Declassification for Legacy and Untrusted Programs
Bruno P. S. Rocha, Sruthi Bandhakavi, Jerry den Ha...
125
Voted
CSFW
2004
IEEE
15 years 7 months ago
Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols
The A-GDH.2 and SA-GDH.2 authenticated group key
Olivier Pereira, Jean-Jacques Quisquater
106
Voted
CCS
2006
ACM
15 years 7 months ago
Supporting location-based conditions in access control policies
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
CCS
2006
ACM
15 years 7 months ago
Fourth-factor authentication: somebody you know
John G. Brainard, Ari Juels, Ronald L. Rivest, Mic...
CCS
2006
ACM
15 years 7 months ago
A protocol for property-based attestation
Liqun Chen, Rainer Landfermann, Hans Löhr, Ma...