|
Search the dblp DataBase
John Viega:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- John Viega
Practical Random Number Generation in Software. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:129-141 [Conf]
- John Viega, J. T. Bloch, Y. Kohno, Gary McGraw
ITS4: A Static Vulnerability Scanner for C and C++ Code. [Citation Graph (0, 0)][DBLP] ACSAC, 2000, pp:257-0 [Conf]
- Crispin Cowan, Seth Arnold, Steve Beattie, Chris Wright, John Viega
Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack. [Citation Graph (0, 0)][DBLP] DISCEX (1), 2003, pp:120-129 [Conf]
- Tadayoshi Kohno, John Viega, Doug Whiting
CWC: A High-Performance Conventional Authenticated Encryption Mode. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:408-426 [Conf]
- David A. McGrew, John Viega
The Security and Performance of the Galois/Counter Mode (GCM) of Operation. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:343-355 [Conf]
- John Viega, Barry Warsaw, Ken Manheimer
Mailman: The GNU Mailing List Manager. [Citation Graph (0, 0)][DBLP] LISA, 1998, pp:309-316 [Conf]
- John Viega, Matthew Conway, George H. Williams, Randy F. Pausch
3D Magic Lenses. [Citation Graph (0, 0)][DBLP] ACM Symposium on User Interface Software and Technology, 1996, pp:51-58 [Conf]
- John Viega, Paul Reynolds, Reimer Behrends
Automating Delegation in Class-Based Languages. [Citation Graph (0, 0)][DBLP] TOOLS (34), 2000, pp:171-0 [Conf]
- John Viega, Tadayoshi Kohno, Bruce Potter
Trust (and mistrust) in secure applications. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2001, v:44, n:2, pp:31-36 [Journal]
- Roger T. Alexander, James M. Bieman, John Viega
Coping with Java Programming Stress. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2000, v:33, n:4, pp:30-38 [Journal]
- John Viega
Security---problem solved? [Citation Graph (0, 0)][DBLP] ACM Queue, 2005, v:3, n:5, pp:40-50 [Journal]
- John Viega, Matt Messier
Security is Harder than You Think. [Citation Graph (0, 0)][DBLP] ACM Queue, 2004, v:2, n:5, pp:60-65 [Journal]
- John Viega, Tom Mutdosch, Gary McGraw, Edward W. Felten
Statically Scanning Java Code: Finding Security Vulnerabilities. [Citation Graph (0, 0)][DBLP] IEEE Software, 2000, v:17, n:5, pp:- [Journal]
- John Viega, Jeffrey M. Voas
Quality Time - Can Aspect-Oriented Programming Lead to More Reliable Software? [Citation Graph (0, 0)][DBLP] IEEE Software, 2000, v:17, n:6, pp:- [Journal]
- John Viega, J. T. Bloch, Tadayoshi Kohno, Gary McGraw
Token-based scanning of source code for security problems. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2002, v:5, n:3, pp:238-261 [Journal]
Cloud Computing and the Common Man. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|