|
Search the dblp DataBase
Steven J. Greenwald:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Lora Kassab, Steven J. Greenwald
Towards Formalizing the Java Security Architecture of JDK 1.2. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:191-207 [Conf]
- Steven J. Greenwald
The New Security Paradigms Workshop - boom or bust?: a panel. [Citation Graph (0, 0)][DBLP] NSPW, 2001, pp:107-111 [Conf]
- Steven J. Greenwald
Discussion Topic: What is the Old Security Paradigm? [Citation Graph (0, 0)][DBLP] Workshop on New Security Paradigms, 1998, pp:107-118 [Conf]
- Steven J. Greenwald, Kenneth G. Olthoff, Victor Raskin, Willibald Ruch
The user non-acceptance paradigm: INFOSEC's dirty little secret. [Citation Graph (0, 0)][DBLP] NSPW, 2004, pp:35-43 [Conf]
- Ira S. Moskowitz, Steven J. Greenwald, Myong H. Kang
An Analysis of the Timed Z-channel. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1996, pp:2-11 [Conf]
- Ira S. Moskowitz, Steven J. Greenwald, Myong H. Kang
An Analysis of the Timed Z-Channel. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1998, v:44, n:7, pp:3162-3168 [Journal]
- Steven J. Greenwald
E-Prime for security: a new security paradigm. [Citation Graph (0, 0)][DBLP] NSPW, 2006, pp:87-95 [Conf]
High Assurance Digital Forensics: A Panelist's Perspective. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.001secs
|