Sciweavers

5119 search results - page 17 / 1024
» Security Privacy
Sort
View
119
Voted
CCS
2011
ACM
14 years 3 months ago
Ciphers that securely encipher their own keys
Mihir Bellare, David Cash, Sriram Keelveedhi
98
Voted
ESORICS
2002
Springer
16 years 3 months ago
Equal To The Task?
James Heather, Steve Schneider
114
Voted
IEEEARES
2010
IEEE
15 years 10 months ago
Information Flow in Disaster Management Systems
Achim D. Brucker, Dieter Hutter
104
Voted
IDTRUST
2010
ACM
15 years 10 months ago
Efficient and privacy-preserving enforcement of attribute-based access control
Ning Shang, Federica Paci, Elisa Bertino