Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
6861
search results - page 182 / 1373
»
Security for Ubiquitous Computing
Sort
relevance
views
votes
recent
update
View
thumb
title
298
click to vote
POPL
2001
ACM
224
views
Programming Languages
»
more
POPL 2001
»
Programming language methods in computer security
16 years 4 months ago
Download
theory.stanford.edu
traction
John C. Mitchell
claim paper
Read More »
146
click to vote
ICICS
2009
Springer
165
views
Communications
»
more
ICICS 2009
»
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks
15 years 11 months ago
Download
icsd.i2r.a-star.edu.sg
Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng...
claim paper
Read More »
95
click to vote
ASIAN
2007
Springer
92
views
Algorithms
»
more
ASIAN 2007
»
Modeling and Virtualization for Secure Computing Environments
15 years 10 months ago
Download
www.qatar.cmu.edu
Kazuhiko Kato
claim paper
Read More »
119
click to vote
ADAEUROPE
2006
Springer
98
views
Software Engineering
»
more
ADAEUROPE 2006
»
Secure Execution of Computations in Untrusted Hosts
15 years 10 months ago
Download
www.hurray.isep.ipp.pt
Sri Hari Krishna Narayanan, Mahmut T. Kandemir, Ri...
claim paper
Read More »
148
click to vote
SIGCSE
2006
ACM
178
views
Education
»
more
SIGCSE 2006
»
A laboratory based capstone course in computer security for undergraduates
15 years 10 months ago
Download
pages.towson.edu
Mike O'Leary
claim paper
Read More »
« Prev
« First
page 182 / 1373
Last »
Next »