|
Conferences in DBLP
Some thoughts on security after ten years of qmail 1.0. [Citation Graph (, )][DBLP]
Yet another MicroArchitectural Attack: : exploiting I-Cache. [Citation Graph (, )][DBLP]
A flexible security architecture to support third-party applications on mobile devices. [Citation Graph (, )][DBLP]
Protecting users from "themselves". [Citation Graph (, )][DBLP]
Analysis of three multilevel security architectures. [Citation Graph (, )][DBLP]
Implementing middleware for content filtering and information flow control. [Citation Graph (, )][DBLP]
Improving multi-tier security using redundant authentication. [Citation Graph (, )][DBLP]
A data outsourcing architecture combining cryptography and access control. [Citation Graph (, )][DBLP]
A cryptographic access control architecture secure against privileged attackers. [Citation Graph (, )][DBLP]
Non-volatile memory and disks: avenues for policy architectures. [Citation Graph (, )][DBLP]
|