Sciweavers

5119 search results - page 68 / 1024
» Security Privacy
Sort
View
106
Voted
SP
1991
IEEE
15 years 7 months ago
Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels
Phillip A. Porras, Richard A. Kemmerer
94
Voted
OOPSLA
1987
Springer
15 years 6 months ago
Teaching Object-Oriented Programming with the KEE System
Renate Kempf, Marilyn Stelzner
106
Voted
CSFW
2010
IEEE
15 years 6 months ago
Quantitative Information Flow - Verification Hardness and Possibilities
Hirotoshi Yasuoka, Tachio Terauchi
91
Voted
CCS
2008
ACM
15 years 5 months ago
Personalized access control for a personally controlled health record
Lillian Røstad, Øystein Nytrø
74
Voted
CCS
2008
ACM
15 years 5 months ago
A low-cost attack on a Microsoft captcha
Jeff Yan, Ahmad Salah El Ahmad