Search the dblp DataBase
Andre Zuquete :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Andre Zuquete Improving the functionality of syn cookies. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:57-77 [Conf ] Andre Zuquete STACKFENCES: A Run-Time Approach for Detecting Stack Overflows. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:76-84 [Conf ] Carlos Ribeiro , Andre Zuquete , Paulo Ferreira Enforcing Obligation with Security Monitors. [Citation Graph (0, 0)][DBLP ] ICICS, 2001, pp:172-176 [Conf ] Andre Zuquete , Paulo Guedes Efficient Error-Propagating Block Chaining. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1997, pp:323-334 [Conf ] Carlos Ribeiro , Andre Zuquete , Paulo Ferreira , Paulo Guedes SPL: An Access Control Language for Security Policies and Complex Constraints. [Citation Graph (0, 0)][DBLP ] NDSS, 2001, pp:- [Conf ] Charlott Eliasson , Andre Zuquete An Electronic Voting System Supporting VoteWeights. [Citation Graph (0, 0)][DBLP ] WOSIS, 2006, pp:246-255 [Conf ] Carlos Ribeiro , Fernando Silva , Andre Zuquete A Roaming Authentication Solution for WiFi Using IPSec VPNs With Client Certificates. [Citation Graph (0, 0)][DBLP ] TERENA Networking Conference, 2004, pp:- [Conf ] Pedro Sousa , Andre Zuquete , Nuno Neves , José Alves Marques Orthogonal Persistence in a Heterogeneous Distributed Object-Oriented Environment. [Citation Graph (0, 0)][DBLP ] Comput. J., 1994, v:37, n:6, pp:531-541 [Journal ] Carlos Ribeiro , Andre Zuquete , Paulo Ferreira , Paulo Guedes Security Policy Consistency [Citation Graph (0, 0)][DBLP ] CoRR, 2000, v:0, n:, pp:- [Journal ] Pedro Sousa , Manuel Sequeira , Andre Zuquete , Paulo Ferreira , Cristina Videira Lopes , José Pereira , Paulo Guedes , José Alves Marques Distribution and Persistence in the IK Platform: Overview and Evaluation. [Citation Graph (0, 0)][DBLP ] Computing Systems, 1993, v:6, n:4, pp:391-424 [Journal ] Andre Zuquete An efficient high quality random number generator for multi-programmed systems. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2005, v:13, n:2, pp:243-263 [Journal ] Search in 0.002secs, Finished in 0.002secs