Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
3451
search results - page 67 / 691
»
Security of Backup Data
Sort
relevance
views
votes
recent
update
View
thumb
title
93
Voted
TISSEC
2002
63
views
more
TISSEC 2002
»
An authorization model for temporal and derived data: securing information portals
15 years 3 months ago
Download
www.cacs.louisiana.edu
Vijayalakshmi Atluri, Avigdor Gal
claim paper
Read More »
124
Voted
TMC
2010
138
views
more
TMC 2010
»
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
15 years 2 months ago
Download
www2.engr.arizona.edu
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
claim paper
Read More »
68
click to vote
IJIPM
2010
77
views
more
IJIPM 2010
»
Increase honeypot security through data analysis
15 years 1 months ago
Download
www.humanpub.org
Milad Daliran, Ramin Nassiri
claim paper
Read More »
120
click to vote
COMCOM
2011
152
views
Computational Linguistics
»
more
COMCOM 2011
»
Securing the data path of next-generation router systems
14 years 10 months ago
Download
www.ecs.umass.edu
Tilman Wolf, Russell Tessier, Gayatri Prabhu
claim paper
Read More »
127
Voted
ISCI
2011
201
views
Natural Language Processing
»
more
ISCI 2011
»
Space efficient secret sharing for implicit data security
14 years 10 months ago
Download
cs.okstate.edu
Abhishek Parakh, Subhash Kak
claim paper
Read More »
« Prev
« First
page 67 / 691
Last »
Next »