The SCEAS System
Navigation Menu

Search the dblp DataBase


John Viega: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John Viega
    Practical Random Number Generation in Software. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:129-141 [Conf]
  2. John Viega, J. T. Bloch, Y. Kohno, Gary McGraw
    ITS4: A Static Vulnerability Scanner for C and C++ Code. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:257-0 [Conf]
  3. Crispin Cowan, Seth Arnold, Steve Beattie, Chris Wright, John Viega
    Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:120-129 [Conf]
  4. Tadayoshi Kohno, John Viega, Doug Whiting
    CWC: A High-Performance Conventional Authenticated Encryption Mode. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:408-426 [Conf]
  5. David A. McGrew, John Viega
    The Security and Performance of the Galois/Counter Mode (GCM) of Operation. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:343-355 [Conf]
  6. John Viega, Barry Warsaw, Ken Manheimer
    Mailman: The GNU Mailing List Manager. [Citation Graph (0, 0)][DBLP]
    LISA, 1998, pp:309-316 [Conf]
  7. John Viega, Matthew Conway, George H. Williams, Randy F. Pausch
    3D Magic Lenses. [Citation Graph (0, 0)][DBLP]
    ACM Symposium on User Interface Software and Technology, 1996, pp:51-58 [Conf]
  8. John Viega, Paul Reynolds, Reimer Behrends
    Automating Delegation in Class-Based Languages. [Citation Graph (0, 0)][DBLP]
    TOOLS (34), 2000, pp:171-0 [Conf]
  9. John Viega, Tadayoshi Kohno, Bruce Potter
    Trust (and mistrust) in secure applications. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:31-36 [Journal]
  10. Roger T. Alexander, James M. Bieman, John Viega
    Coping with Java Programming Stress. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2000, v:33, n:4, pp:30-38 [Journal]
  11. John Viega
    Security---problem solved? [Citation Graph (0, 0)][DBLP]
    ACM Queue, 2005, v:3, n:5, pp:40-50 [Journal]
  12. John Viega, Matt Messier
    Security is Harder than You Think. [Citation Graph (0, 0)][DBLP]
    ACM Queue, 2004, v:2, n:5, pp:60-65 [Journal]
  13. John Viega, Tom Mutdosch, Gary McGraw, Edward W. Felten
    Statically Scanning Java Code: Finding Security Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  14. John Viega, Jeffrey M. Voas
    Quality Time - Can Aspect-Oriented Programming Lead to More Reliable Software? [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:6, pp:- [Journal]
  15. John Viega, J. T. Bloch, Tadayoshi Kohno, Gary McGraw
    Token-based scanning of source code for security problems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2002, v:5, n:3, pp:238-261 [Journal]

  16. Cloud Computing and the Common Man. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002