Sciweavers

5119 search results - page 19 / 1024
» Security Privacy
Sort
View
IEEEARES
2009
IEEE
15 years 10 months ago
Protecting Global and Static Variables from Buffer Overflow Attacks
Yves Younan, Frank Piessens, Wouter Joosen
108
Voted
IDTRUST
2009
ACM
15 years 10 months ago
Identity, credential, and access management at NASA, from Zachman to attributes
Corinne S. Irwin, Dennis C. Taylor
104
Voted
CCS
2009
ACM
15 years 10 months ago
Oblivious transfer with access control
Jan Camenisch, Maria Dubovitskaya, Gregory Neven
95
Voted
CCS
2009
ACM
15 years 10 months ago
The fable of the bees: incentivizing robust revocation decision making in ad hoc networks
Steffen Reidt, Mudhakar Srivatsa, Shane Balfe
119
Voted
ESORICS
2009
Springer
15 years 10 months ago
Using SAT-Solvers to Compute Inference-Proof Database Instances
Cornelia Tadros, Lena Wiese