Sciweavers

5119 search results - page 91 / 1024
» Security Privacy
Sort
View
106
Voted
CCS
2006
ACM
15 years 5 months ago
Vulnerability analysis For evaluating quality of protection of security policies
Muhammad Abedin, Syeda Nessa, Ehab Al-Shaer, Latif...
CRISIS
2008
15 years 5 months ago
Formal procedural security modeling and analysis
We are involved in a project related to the evaluation
Komminist Weldemariam, Adolfo Villafiorita
102
Voted
ACISP
2010
Springer
15 years 5 months ago
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key
Jun Shao, Min Feng, Bin Zhu, Zhenfu Cao, Peng Liu
CCS
2008
ACM
15 years 4 months ago
Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries
David Dagon, Manos Antonakakis, Paul Vixie, Tatuya...
CCS
2010
ACM
15 years 3 months ago
Attacking and fixing PKCS#11 security tokens
Matteo Bortolozzo, Matteo Centenaro, Riccardo Foca...