Sciweavers

5119 search results - page 92 / 1024
» Security Privacy
Sort
View
97
Voted
CCS
2011
ACM
14 years 3 months ago
Unicorn: two-factor attestation for data security
Mohammad Mannan, Beom Heyn Kim, Afshar Ganjali, Da...
ESORICS
2009
Springer
16 years 4 months ago
Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones
Thorsten Holz, Markus Engelberth, Felix C. Freilin...
82
Voted
CCS
2009
ACM
16 years 4 months ago
An integrated approach to detection of fast and slow scanning worms
Frank Akujobi, Ioannis Lambadaris, Evangelos Krana...
136
Voted
WISTP
2010
Springer
15 years 10 months ago
Attribute-Based Encryption with Break-Glass
Achim D. Brucker, Helmut Petritsch, Stefan G. Webe...
96
Voted
IEEEARES
2010
IEEE
15 years 10 months ago
Katana: A Hot Patching Framework for ELF Executables
Ashwin Ramaswamy, Sergey Bratus, Sean W. Smith, Mi...