Sciweavers

5119 search results - page 24 / 1024
» Security Privacy
Sort
View
116
Voted
CSFW
2008
IEEE
15 years 10 months ago
Formal Analysis of PKCS#11
Stéphanie Delaune, Steve Kremer, Graham Ste...
111
Voted
HOST
2008
IEEE
15 years 10 months ago
Reassessing the TCG Specifications for Trusted Computing in Mobile and Embedded Systems
Johann Großschädl, Tobias Vejda, Dan Pa...
95
Voted
IEEEARES
2008
IEEE
15 years 10 months ago
Fuzzy Private Matching (Extended Abstract)
Lukasz Chmielewski, Jaap-Henk Hoepman
97
Voted
IEEEARES
2008
IEEE
15 years 10 months ago
Adaptive Data Integrity through Dynamically Redundant Data Structures
Vincenzo De Florio, Chris Blondia
105
Voted
IEEEARES
2008
IEEE
15 years 10 months ago
Context-based Profiling for Anomaly Intrusion Detection with Diagnosis
Salem Benferhat, Karim Tabia