Sciweavers

14824 search results - page 70 / 2965
» Security - Introduction
Sort
View
85
Voted
SP
1991
IEEE
15 years 4 months ago
Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels
Phillip A. Porras, Richard A. Kemmerer
72
Voted
OOPSLA
1987
Springer
15 years 4 months ago
Teaching Object-Oriented Programming with the KEE System
Renate Kempf, Marilyn Stelzner
65
Voted
CCS
2008
ACM
15 years 2 months ago
Personalized access control for a personally controlled health record
Lillian Røstad, Øystein Nytrø
59
Voted
CCS
2008
ACM
15 years 2 months ago
A low-cost attack on a Microsoft captcha
Jeff Yan, Ahmad Salah El Ahmad