Sciweavers

5119 search results - page 73 / 1024
» Security Privacy
Sort
View
110
Voted
CRISIS
2009
15 years 4 months ago
Formal analysis of attacks for e-voting system
Komminist Weldemariam, Richard A. Kemmerer, Adolfo...
91
Voted
CCS
2010
ACM
15 years 3 months ago
Spectrum based fraud detection in social networks
Xiaowei Ying, Xintao Wu, Daniel Barbará
82
Voted
CCS
2010
ACM
15 years 3 months ago
An improved algorithm for tor circuit scheduling
Can Tang, Ian Goldberg
81
Voted
CCS
2010
ACM
15 years 3 months ago
Robusta: taming the native beast of the JVM
Joseph Siefers, Gang Tan, Greg Morrisett
94
Voted
CCS
2010
ACM
15 years 3 months ago
Computationally sound verification of source code
Michael Backes, Matteo Maffei, Dominique Unruh