Paul A. Karger Limiting the Damage Potential of Discretionary Trojan Horses. [Citation Graph (1, 0)][DBLP] IEEE Symposium on Security and Privacy, 1987, pp:32-37 [Conf]
Paul A. Karger The Lattice Security Model In A Public Computing Network. [Citation Graph (0, 0)][DBLP] ACM Annual Conference (1), 1978, pp:453-459 [Conf]
Paul A. Karger New Methods for Immediate Revocation. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1989, pp:48-55 [Conf]
Paul A. Karger, A. J. Herbert An Augmented Capability Architecture to Support Lattice Security and Traceability of Access. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1984, pp:2-12 [Conf]
Paul A. Karger Authentication and Discretionary Access Control in Computer Networks. [Citation Graph (0, 0)][DBLP] Computer Networks, 1986, v:10, n:, pp:27-37 [Journal]
Paul A. Karger Performance and security lessons learned from virtualizing the alpha processor. [Citation Graph (0, 0)][DBLP] ISCA, 2007, pp:392-401 [Conf]
Designing a Side Channel Resistant Random Number Generator. [Citation Graph (, )][DBLP]
Securing virtual machine monitors: what is needed? [Citation Graph (, )][DBLP]
Implementing a High-Assurance Smart-Card OS. [Citation Graph (, )][DBLP]
The Feasibility of Automated Feedback-Directed Specification-Based Test Generation: A Case Study of a High-Assurance Operating System. [Citation Graph (, )][DBLP]
Privacy and security threat analysis of the federal employee personal identity verification (PIV) program. [Citation Graph (, )][DBLP]
Search in 0.046secs, Finished in 0.047secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP