Sciweavers

65
Voted
IEEESP
2007
47views more  IEEESP 2007»
15 years 1 months ago
Trust Negotiation in Identity Management
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
69
Voted
IEEESP
2007
61views more  IEEESP 2007»
15 years 1 months ago
Lessons from the Norwegian ATM System
Kjell Jørgen Hole, Vebjørn Moen, And...
65
Voted
IEEESP
2007
59views more  IEEESP 2007»
15 years 1 months ago
Achieving Learning Objectives through E-Voting Case Studies
Matt Bishop, Deborah A. Frincke
60
Voted
IEEESP
2007
72views more  IEEESP 2007»
15 years 1 months ago
The New Front Line: Estonia under Cyberassault
Michael Lesk
69
Voted
IEEESP
2007
57views more  IEEESP 2007»
15 years 1 months ago
Who's Watching You Now?
John Morris, Jon Peterson
61
Voted
IEEESP
2007
57views more  IEEESP 2007»
15 years 1 months ago
An Information Security Strategy for Networkable Devices
Ilan Oshri, Julia Kotlarsky, Corey Hirsch
71
Voted
IEEESP
2007
48views more  IEEESP 2007»
15 years 1 months ago
Estimating Software Vulnerabilities
Jeffrey R. Jones
70
Voted
IEEESP
2007
65views more  IEEESP 2007»
15 years 1 months ago
Hiding Virtualization from Attackers and Malware
Matthew Carpenter, Tom Liston, Ed Skoudis
60
Voted
IEEESP
2007
59views more  IEEESP 2007»
15 years 1 months ago
The Cost of Free Web Tools
Edward Sobiesk, Gregory J. Conti