Sciweavers

IEEESP
2007
47views more  IEEESP 2007»
13 years 11 months ago
Trust Negotiation in Identity Management
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
IEEESP
2007
61views more  IEEESP 2007»
13 years 11 months ago
Lessons from the Norwegian ATM System
Kjell Jørgen Hole, Vebjørn Moen, And...
IEEESP
2007
59views more  IEEESP 2007»
13 years 11 months ago
Achieving Learning Objectives through E-Voting Case Studies
Matt Bishop, Deborah A. Frincke
IEEESP
2007
57views more  IEEESP 2007»
13 years 11 months ago
Who's Watching You Now?
John Morris, Jon Peterson
IEEESP
2007
57views more  IEEESP 2007»
13 years 11 months ago
An Information Security Strategy for Networkable Devices
Ilan Oshri, Julia Kotlarsky, Corey Hirsch
IEEESP
2007
48views more  IEEESP 2007»
13 years 11 months ago
Estimating Software Vulnerabilities
Jeffrey R. Jones
IEEESP
2007
65views more  IEEESP 2007»
13 years 11 months ago
Hiding Virtualization from Attackers and Malware
Matthew Carpenter, Tom Liston, Ed Skoudis
IEEESP
2007
59views more  IEEESP 2007»
13 years 11 months ago
The Cost of Free Web Tools
Edward Sobiesk, Gregory J. Conti