Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5119
search results - page 178 / 1024
»
Security Privacy
Sort
relevance
views
votes
recent
update
View
thumb
title
131
click to vote
ACSAC
2001
IEEE
104
views
Security Privacy
»
more
ACSAC 2001
»
The Performance Measurement of Cryptographic Primitives on Palm Devices
15 years 7 months ago
Download
www.acsac.org
We developed and evaluated several cryptographic system libraries for Palm OS
Duncan S. Wong, Hector Ho Fuentes, Agnes Hui Chan
claim paper
Read More »
118
click to vote
OOPSLA
1995
Springer
125
views
Security Privacy
»
more
OOPSLA 1995
»
Problem-Oriented Object Memory: Customizing Consistency
15 years 7 months ago
Download
www.hpl.hp.com
Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Internal Acc...
Anders Kristensen, Colin Low
claim paper
Read More »
118
Voted
CCS
2008
ACM
99
views
Security Privacy
»
more
CCS 2008
»
Verified implementations of the information card federated identity-management protocol
15 years 6 months ago
Download
www.cs.umd.edu
We describe reference implementations for selected configurations of the user authentication protocol defined by the Information Card
Karthikeyan Bhargavan, Cédric Fournet, Andr...
claim paper
Read More »
114
click to vote
SP
2002
IEEE
143
views
Security Privacy
»
more
SP 2002
»
Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards
15 years 3 months ago
Download
atrey.karlin.mff.cuni.cz
In this paper, we introduce a new class of side
Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, S...
claim paper
Read More »
127
click to vote
GIL
2010
131
views
Security Privacy
»
more
GIL 2010
»
Agribusiness 2.0
15 years 2 months ago
Download
subs.emis.de
Abstract: Die Anwendung von Web 2.0 Tools innerhalb von Unternehmen erm
Jurek Hille
claim paper
Read More »
« Prev
« First
page 178 / 1024
Last »
Next »