1

Zero-knowledge proofs of retrievability

Year:
2011
Language:
english
File:
PDF, 228 KB
english, 2011
8

Efficient audit service outsourcing for data integrity in clouds

Year:
2012
Language:
english
File:
PDF, 1.30 MB
english, 2012
17

dbling: Identifying extensions installed on encrypted web thin clients

Year:
2016
Language:
english
File:
PDF, 1.06 MB
english, 2016
22

CONUGA: Constrained User-Group Assignment

Year:
2001
Language:
english
File:
PDF, 180 KB
english, 2001
24

Decentralized user group assignment in Windows NT

Year:
2001
Language:
english
File:
PDF, 127 KB
english, 2001
25

Reconstructing a formal security model

Year:
2002
Language:
english
File:
PDF, 199 KB
english, 2002
26

Role-based access control in DCOM

Year:
2000
Language:
english
File:
PDF, 138 KB
english, 2000
31

Security and Privacy in Social Networks

Year:
2011
Language:
english
File:
PDF, 748 KB
english, 2011
32

Risk-Aware Mitigation for MANET Routing Attacks

Year:
2012
Language:
english
File:
PDF, 642 KB
english, 2012
33

Detecting and Resolving Firewall Policy Anomalies

Year:
2012
Language:
english
File:
PDF, 1.55 MB
english, 2012
42

[Lecture Notes in Computer Science] Data and Applications Security XXI Volume 4602 ||

Year:
2007
Language:
english
File:
PDF, 4.59 MB
english, 2007
49

Access control in collaborative systems

Year:
2005
Language:
english
File:
PDF, 242 KB
english, 2005