Search Results
2. Adding Trust to P2P Distribution of Paid Content
3. Addressing the Insider Threat
4. A Determinizing Compiler
5. A Disruptive Computer Design Idea: Architectures with Repeatable Timing
6. An Anonymous Credit Card System
7. A Network Access Control Mechanism Based on Behavior Profiles
8. Anonymity in Wireless Broadcast Networks
9. A novel analysis space for pointer analysis and its application for bug finding
10. APOD: Anonymous Physical Object Delivery
11. ASSURE: Automatic Software Self-healing Using Rescue Points
12. A Survey of Voice Over IP Security Research
13. Baiting Inside Attackers Using Decoy Documents
14. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
15. Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors
16. Brave New World: Pervasive Insecurity of Embedded Network Devices
17. Buffer Sharing in CSP-like Programs
18. Capturing Information Flow with Concatenated Dynamic Taint Analysis
19. Celling SHIM: Compiling Deterministic Concurrency to a Heterogeneous Multicore
20. Compile-Time Analysis and Specialization of Clocks in Concurrent Programs
- « Previous
- Next »
- 1
- 2
- 3