Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5119
search results - page 145 / 1024
»
Security Privacy
Sort
relevance
views
votes
recent
update
View
thumb
title
104
click to vote
ETRICS
2006
124
views
Security Privacy
»
more
ETRICS 2006
»
Kleptographic Attacks on E-Voting Schemes
15 years 7 months ago
Download
www.nesc.ac.uk
Marcin Gogolewski, Marek Klonowski, Przemyslaw Kub...
claim paper
Read More »
110
Voted
ACISP
2003
Springer
89
views
Security Privacy
»
more
ACISP 2003
»
Separating Encryption and Key Issuance in Digital Rights Management Systems
15 years 7 months ago
Download
imailab-www.iis.u-tokyo.ac.jp
Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go ...
claim paper
Read More »
136
click to vote
AGENTS
2001
Springer
229
views
Security Privacy
»
more
AGENTS 2001
»
Hierarchical agent control: a framework for defining agent behavior
15 years 7 months ago
Download
ai.isi.edu
Marc S. Atkin, Gary W. King, David L. Westbrook, B...
claim paper
Read More »
109
Voted
AGENTS
1997
Springer
113
views
Security Privacy
»
more
AGENTS 1997
»
A Layered Architecture for Office Delivery Robots
15 years 7 months ago
Download
sigart.acm.org
Reid G. Simmons, Richard Goodwin, Karen Zita Haigh...
claim paper
Read More »
103
click to vote
OOPSLA
2000
Springer
85
views
Security Privacy
»
more
OOPSLA 2000
»
Practical virtual method call resolution for Java
15 years 7 months ago
Download
www.cs.tau.ac.il
Vijay Sundaresan, Laurie J. Hendren, Chrislain Raz...
claim paper
Read More »
« Prev
« First
page 145 / 1024
Last »
Next »