The SCEAS System
Navigation Menu

Search the dblp DataBase


Steven J. Greenwald: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lora Kassab, Steven J. Greenwald
    Towards Formalizing the Java Security Architecture of JDK 1.2. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:191-207 [Conf]
  2. Steven J. Greenwald
    The New Security Paradigms Workshop - boom or bust?: a panel. [Citation Graph (0, 0)][DBLP]
    NSPW, 2001, pp:107-111 [Conf]
  3. Steven J. Greenwald
    Discussion Topic: What is the Old Security Paradigm? [Citation Graph (0, 0)][DBLP]
    Workshop on New Security Paradigms, 1998, pp:107-118 [Conf]
  4. Steven J. Greenwald, Kenneth G. Olthoff, Victor Raskin, Willibald Ruch
    The user non-acceptance paradigm: INFOSEC's dirty little secret. [Citation Graph (0, 0)][DBLP]
    NSPW, 2004, pp:35-43 [Conf]
  5. Ira S. Moskowitz, Steven J. Greenwald, Myong H. Kang
    An Analysis of the Timed Z-channel. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:2-11 [Conf]
  6. Ira S. Moskowitz, Steven J. Greenwald, Myong H. Kang
    An Analysis of the Timed Z-Channel. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1998, v:44, n:7, pp:3162-3168 [Journal]
  7. Steven J. Greenwald
    E-Prime for security: a new security paradigm. [Citation Graph (0, 0)][DBLP]
    NSPW, 2006, pp:87-95 [Conf]

  8. High Assurance Digital Forensics: A Panelist's Perspective. [Citation Graph (, )][DBLP]

Search in 0.071secs, Finished in 0.071secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002