The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Daniel E. Geer Jr.: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Aviel D. Rubin, Daniel E. Geer Jr.
    A Survey of Web Security. [Citation Graph (1, 0)][DBLP]
    IEEE Computer, 1998, v:31, n:9, pp:34-41 [Journal]
  2. Daniel E. Geer Jr., Moti Yung
    Split-and-Delegate: Threshold Cryptography for the Masses. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:220-237 [Conf]
  3. Bob Blakley, Ellen McDermott, Dan Geer
    Information security is information risk management. [Citation Graph (0, 0)][DBLP]
    NSPW, 2001, pp:97-104 [Conf]
  4. Rob Kolstad, Daniel E. Geer Jr.
    Software and Intellectual Property - Who Owns Your Work? [Citation Graph (0, 0)][DBLP]
    USENIX Summer, 1991, pp:453-454 [Conf]
  5. Mark A. Rosenstein, Daniel E. Geer Jr., Peter J. Levine
    The Athena Service Management System. [Citation Graph (0, 0)][DBLP]
    USENIX Winter, 1988, pp:203-211 [Conf]
  6. Dan Geer
    Metrics, Economics, and Shared Risk at the National Scale. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:- [Conf]
  7. George Champine, Daniel E. Geer Jr., William Ruh
    Project Athena as a Distributed Computer System. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1990, v:23, n:9, pp:40-51 [Journal]
  8. Daniel E. Geer Jr.
    Risk Management Is Still Where the Money Is. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2003, v:36, n:12, pp:129-131 [Journal]
  9. Donald T. Davis, Daniel E. Geer Jr.
    Kerberos with Clocks Adrift: History, Protocols, and Implementation. [Citation Graph (0, 0)][DBLP]
    Computing Systems, 1996, v:9, n:1, pp:29-46 [Journal]
  10. Daniel E. Geer Jr.
    The Problem Statement is the Problem. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:80- [Journal]
  11. Daniel E. Geer Jr., David Aucsmith, James A. Whittaker
    Monoculture. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:14-19 [Journal]
  12. Aviel D. Rubin, Daniel E. Geer Jr.
    Mobile Code Security. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:6, pp:30-34 [Journal]

Search in 0.012secs, Finished in 0.013secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002