Sciweavers

IEEESP
2007
47views more  IEEESP 2007»
13 years 6 months ago
Trust Negotiation in Identity Management
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
IEEESP
2007
61views more  IEEESP 2007»
13 years 6 months ago
Lessons from the Norwegian ATM System
Kjell Jørgen Hole, Vebjørn Moen, And...
IEEESP
2007
59views more  IEEESP 2007»
13 years 6 months ago
Achieving Learning Objectives through E-Voting Case Studies
Matt Bishop, Deborah A. Frincke
IEEESP
2007
57views more  IEEESP 2007»
13 years 6 months ago
Who's Watching You Now?
John Morris, Jon Peterson
IEEESP
2007
57views more  IEEESP 2007»
13 years 6 months ago
An Information Security Strategy for Networkable Devices
Ilan Oshri, Julia Kotlarsky, Corey Hirsch
IEEESP
2007
48views more  IEEESP 2007»
13 years 6 months ago
Estimating Software Vulnerabilities
Jeffrey R. Jones
IEEESP
2007
65views more  IEEESP 2007»
13 years 6 months ago
Hiding Virtualization from Attackers and Malware
Matthew Carpenter, Tom Liston, Ed Skoudis
IEEESP
2007
59views more  IEEESP 2007»
13 years 6 months ago
The Cost of Free Web Tools
Edward Sobiesk, Gregory J. Conti