Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5119
search results - page 92 / 1024
»
Security Privacy
Sort
relevance
views
votes
recent
update
View
thumb
title
97
Voted
CCS
2011
ACM
177
views
Security Privacy
»
more
CCS 2011
»
Unicorn: two-factor attestation for data security
14 years 3 months ago
Download
www.eecg.toronto.edu
Mohammad Mannan, Beom Heyn Kim, Afshar Ganjali, Da...
claim paper
Read More »
83
click to vote
ESORICS
2009
Springer
138
views
Security Privacy
»
more
ESORICS 2009
»
Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones
16 years 4 months ago
Download
honeyblog.org
Thorsten Holz, Markus Engelberth, Felix C. Freilin...
claim paper
Read More »
82
Voted
CCS
2009
ACM
142
views
Security Privacy
»
more
CCS 2009
»
An integrated approach to detection of fast and slow scanning worms
16 years 4 months ago
Download
people.scs.carleton.ca
Frank Akujobi, Ioannis Lambadaris, Evangelos Krana...
claim paper
Read More »
136
Voted
WISTP
2010
Springer
220
views
Security Privacy
»
more
WISTP 2010
»
Attribute-Based Encryption with Break-Glass
15 years 10 months ago
Download
www.brucker.ch
Achim D. Brucker, Helmut Petritsch, Stefan G. Webe...
claim paper
Read More »
96
Voted
IEEEARES
2010
IEEE
148
views
Security Privacy
»
more
IEEEARES 2010
»
Katana: A Hot Patching Framework for ELF Executables
15 years 10 months ago
Download
www.cs.dartmouth.edu
Ashwin Ramaswamy, Sergey Bratus, Sean W. Smith, Mi...
claim paper
Read More »
« Prev
« First
page 92 / 1024
Last »
Next »