Sciweavers

1599 search results - page 7 / 320
» Program Analysis for Security and Privacy
Sort
View
CSREASAM
2010
14 years 11 months ago
Using Traffic Analysis to Identify Tor Usage - A Proposed Study
John Barker, Peter Hannay, Christopher Bolan
SOUPS
2009
ACM
15 years 8 months ago
Privacy stories: confidence in privacy behaviors through end user programming
Luke Church, Jonathan Anderson, Joseph Bonneau, Fr...
IEEEARES
2007
IEEE
15 years 8 months ago
On Programming Models for Service-Level High Availability
Christian Engelmann, Stephen L. Scott, Chokchai Le...