Showing 31 - 40 results of 40 for search '"Security and protection."', tempo de consulta: 0.02s Limitar resultados
  1. 31
  2. 32

    Trustworthy software systems. por Bernstein, Larry

    Artigo
  3. 33

    Risks to the public in computers and related systems. por Neumann, Peter G.

    Artigo
  4. 34

    Controlling high bandwidth aggregates in the network. por Mahajan, Ratul

    Artigo
  5. 35

    Learning how to tell ham from spam. por Sakkis, George

    Artigo
  6. 36
  7. 37

    Engineering human trust in mobile system collaborations. por Capra, Licia

    Artigo
  8. 38

    Trajectory sampling with unreliable reporting. por Duffield, Nick

    Artigo
  9. 39

    Practical network support for IP traceback. por Savage, Stefan

    Artigo
  10. 40

    The random oracle methodology, revisited. por Canetti, Ran

    Publicado en Journal of the ACM
    Artigo