Sciweavers

1599 search results - page 7 / 320
» Program Analysis for Security and Privacy
Sort
View
CSREASAM
2010
13 years 4 months ago
Using Traffic Analysis to Identify Tor Usage - A Proposed Study
John Barker, Peter Hannay, Christopher Bolan
SOUPS
2009
ACM
14 years 1 months ago
Privacy stories: confidence in privacy behaviors through end user programming
Luke Church, Jonathan Anderson, Joseph Bonneau, Fr...
IEEEARES
2007
IEEE
14 years 1 months ago
On Programming Models for Service-Level High Availability
Christian Engelmann, Stephen L. Scott, Chokchai Le...