Sciweavers

5119 search results - page 145 / 1024
» Security Privacy
Sort
View
ETRICS
2006
15 years 7 months ago
Kleptographic Attacks on E-Voting Schemes
Marcin Gogolewski, Marek Klonowski, Przemyslaw Kub...
110
Voted
ACISP
2003
Springer
15 years 7 months ago
Separating Encryption and Key Issuance in Digital Rights Management Systems
Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go ...
AGENTS
2001
Springer
15 years 7 months ago
Hierarchical agent control: a framework for defining agent behavior
Marc S. Atkin, Gary W. King, David L. Westbrook, B...
109
Voted
AGENTS
1997
Springer
15 years 7 months ago
A Layered Architecture for Office Delivery Robots
Reid G. Simmons, Richard Goodwin, Karen Zita Haigh...
OOPSLA
2000
Springer
15 years 7 months ago
Practical virtual method call resolution for Java
Vijay Sundaresan, Laurie J. Hendren, Chrislain Raz...