History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 189 total

Crowdshare: secure mobile resource sharing. (English)
Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25‒28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 432-440 (2013).
WorldCat.org
1
Client-controlled cryptography-as-a-service in the cloud. (English)
Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25‒28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 19-36 (2013).
WorldCat.org
2
On the effectiveness of the remanence decay side-channel to clone memory-based pufs. (English)
Bertoni, Guido (ed.) et al., Cryptographic hardware and embedded systems ‒ CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20‒23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40348-4/pbk). Lecture Notes in Computer Science 8086, 107-125 (2013).
WorldCat.org
3
Financial cryptography and data security. 17th international conference, FC 2013, Okinawa, Japan, April 1‒5, 2013. Revised selected papers. (English)
Lecture Notes in Computer Science 7859. Berlin: Springer (ISBN 978-3-642-39883-4/pbk). xv, 406~p. EUR~66.34 (2013).
WorldCat.org
4
A note on solving the fuzzy Sylvester matrix equation. (English)
J. Comput. Anal. Appl. 15, No. 1, 10-22 (2013).
WorldCat.org
5
A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design. (English)
Journal of Computer SecurityJournal of Computer Security 21, N0. 2, 283-315(2013)
WorldCat.org
6
Do I know you?: efficient and privacy-preserving common friend-finder protocols and applications. (English)
ACSAC, 159-168(2013)
WorldCat.org
7
CyCAR’2013: first international academic workshop on security, privacy and dependability for cybervehicles. (English)
ACM Conference on Computer and Communications Security, 1481-1482(2013)
WorldCat.org
8
Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM. (English)
ASIACCS, 299-310(2013)
WorldCat.org
9
Mobile security and privacy: the quest for the mighty access control. (English)
SACMAT, 1-2(2013)
WorldCat.org
10
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets. (English)
RAID, 62-81(2013)
WorldCat.org
11
Embodied Behavior of Plant Roots in Obstacle Avoidance. (English)
Living Machines, 431-433(2013)
WorldCat.org
12
Robotic mechanism for soil penetration inspired by plant root. (English)
ICRA, 3457-3462(2013)
WorldCat.org
13
PSiOS: bring your own privacy & security to iOS devices. (English)
ASIACCS, 13-24(2013)
WorldCat.org
14
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization. (English)
IEEE Symposium on Security and Privacy, 574-588(2013)
WorldCat.org
15
Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer. (English)
CODASPY, 233-242(2013)
WorldCat.org
16
Plant Root Strategies for Robotic Soil Penetration. (English)
Living Machines, 447-449(2013)
WorldCat.org
17
Memristor PUFs: a new generation of memory-based physically unclonable functions. (English)
DATE, 428-431(2013)
WorldCat.org
18
The silence of the lans: Efficient leakage resilience for IPsec VPNs. (English)
Foresti, Sara (ed.) et al., Computer security ‒ ESORICS 2012. 17th European symposium on research in computer security, Pisa, Italy, September 10‒12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33166-4/pbk). Lecture Notes in Computer Science 7459, 253-270 (2012).
WorldCat.org
19
Smarttokens: delegable access control with NFC-enabled smartphones. (English)
Katzenbeisser, Stefan (ed.) et al., Trust and trustworthy computing. 5th international conference, TRUST 2012, Vienna, Austria, June 13‒15, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30920-5/pbk). Lecture Notes in Computer Science 7344, 219-238 (2012).
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 189 total

Valid XHTML 1.0 Transitional Valid CSS!