Billy G. Claybrook Using Views in a Multilevel Secure Database Management System. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1983, pp:4-17 [Conf]
Marvin C. Wunderlich Recent Advances in the Design and Implementation of Large Integer Factorization Algorithms. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1983, pp:67-71 [Conf]
Roger R. Schell Evaluating Security Properties of Computer Systems. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1983, pp:89-95 [Conf]
Paul Woodie Security Enhancement through Product Evaluation. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1983, pp:96-101 [Conf]
James P. Anderson An Approach to Indentification of Minimum TCB Requirements for Various Threat/Risk Environments. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1983, pp:102-106 [Conf]
D. Barnes The Provision of Security for User Data on Packet Switched Networks. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1983, pp:121-126 [Conf]
Whitfield Diffie Securing Networks: End-to-End Encrpytion vs. Link Encryption and Trusted Systems. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1983, pp:136-138 [Conf]