-
1
-
2
-
3
-
4
Hacking exposed J2EE and Java developing secure applications with Java technology
Julkaistu 2002Kirja -
5
-
6
A survey of customizability in operating systems research.
Julkaisussa ACM computing surveys.Artikkeli -
7
A secure multicast protocol with copyright protection.
Julkaisussa Computer communication review.Artikkeli -
8
-
9
-
10
Stack and queue integrity on hostile platforms.
Julkaisussa IEEE Transactions on software engineeringArtikkeli