The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Rebecca Mercuri: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dorée D. Seligmann, Rebecca Mercuri, John T. Edmark
    Providing Assurances in a Multimedia Interactive Environment. [Citation Graph (0, 0)][DBLP]
    CHI, 1995, pp:250-256 [Conf]
  2. Maria Hristova, Ananya Misra, Megan Rutter, Rebecca Mercuri
    Identifying and correcting Java programming errors for introductory computer science students. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2003, pp:153-156 [Conf]
  3. Rebecca Mercuri
    Voting automation (early and often?). [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:11, pp:176- [Journal]
  4. Rebecca Mercuri
    Uncommon criteria. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2002, v:45, n:1, pp:172- [Journal]
  5. Rebecca Mercuri
    Computer security: quality rather than quantity. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2002, v:45, n:10, pp:11-14 [Journal]
  6. Rebecca Mercuri
    Florida 2002: sluggish systems, vanishing votes. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2002, v:45, n:11, pp:136- [Journal]
  7. Rebecca Mercuri
    On auditing trails. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:1, pp:17-20 [Journal]
  8. Rebecca Mercuri
    Analyzing security costs. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:6, pp:15-18 [Journal]
  9. Rebecca Mercuri
    Standards insecurity. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:12, pp:21-25 [Journal]
  10. Rebecca Mercuri
    Superscaled security. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:15-18 [Journal]
  11. Rebecca Mercuri
    The HIPAA-potamus in health care data security. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:7, pp:25-28 [Journal]
  12. Rebecca Mercuri
    Challenges in forensic computing. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:12, pp:17-21 [Journal]
  13. Rebecca Mercuri
    Voting-Machine Risks. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1992, v:35, n:11, pp:138- [Journal]
  14. Rebecca Mercuri
    Corrupted Polling. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1993, v:36, n:11, pp:122- [Journal]
  15. Rebecca Mercuri
    In Search of Academic Integrity. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1998, v:41, n:5, pp:136- [Journal]
  16. Rebecca Mercuri, Peter G. Neumann
    System integrity revisited. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:1, pp:160- [Journal]
  17. Rebecca Mercuri, Peter G. Neumann
    Security by obscurity. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:11, pp:160- [Journal]

Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002