Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
6861
search results - page 189 / 1373
»
Security for Ubiquitous Computing
Sort
relevance
views
votes
recent
update
View
thumb
title
105
click to vote
TISSEC
2008
104
views
more
TISSEC 2008
»
Toward a Usage-Based Security Framework for Collaborative Computing Systems
15 years 4 months ago
Download
profsandhu.com
Xinwen Zhang, Masayuki Nakae, Michael J. Covington...
claim paper
Read More »
81
click to vote
CACM
2002
103
views
more
CACM 2002
»
Computer security: quality rather than quantity
15 years 4 months ago
Download
www.notablesoftware.com
Rebecca Mercuri
claim paper
Read More »
103
click to vote
CORR
1999
Springer
78
views
Education
»
more
CORR 1999
»
Multiparty computation unconditionally secure against Q^2 adversary structures
15 years 4 months ago
Download
www.instantlogic.net
Adam Smith, Anton Stiglic
claim paper
Read More »
110
click to vote
MONET
2007
75
views
more
MONET 2007
»
MONET Special Issue on Next Generation Hardware Architectures for Secure Mobile Computing
15 years 4 months ago
Download
www.nsklavos.gr
Nicolas Sklavos, Máire McLoone, Xinmiao Zha...
claim paper
Read More »
135
click to vote
ASIACRYPT
2010
Springer
113
views
Cryptology
»
more
ASIACRYPT 2010
»
Computationally Secure Pattern Matching in the Presence of Malicious Adversaries
15 years 2 months ago
Download
www.spms.ntu.edu.sg
Carmit Hazay, Tomas Toft
claim paper
Read More »
« Prev
« First
page 189 / 1373
Last »
Next »