ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
When Computer Security Crashes into Multimedia
Seventh IEEE International Symposium on Multimedia (ISM'05)
◽
10.1109/ism.2005.124
◽
2006
◽
Author(s):
J.D. Tygar
Keyword(s):
Computer Security
Download Full-text
Related Documents
Cited By
References
Red team performance for improved computer security
PsycEXTRA Dataset
◽
10.1037/e577102012-010
◽
2004
◽
Author(s):
Sara Kraemer
◽
Pascale Carayon
◽
Ruth Duggan
Keyword(s):
Computer Security
◽
Team Performance
Download Full-text
I Downloaded What?: An Examination of Computer Security Decisions
PsycEXTRA Dataset
◽
10.1037/e577712012-021
◽
2006
◽
Author(s):
Jefferson B. Hardee
◽
Christopher B. Mayhorn
◽
Ryan West
Keyword(s):
Computer Security
Download Full-text
2nd Aerospace Computer Security Conference
10.2514/mats86
◽
1986
◽
Keyword(s):
Computer Security
Download Full-text
Communications and Information: Computer Security
10.21236/ada405011
◽
2001
◽
Author(s):
SECRETARY OF THE AIR FORCE WASHINGTON DC
Keyword(s):
Computer Security
Download Full-text
The Reference Monitor Concept as a Unifying Principle in Computer Security Education
10.21236/ada423529
◽
1999
◽
Cited By ~ 7
Author(s):
Cynthia E. Irvine
Keyword(s):
Computer Security
◽
Security Education
Download Full-text
The Specification and Modeling of Computer Security
10.21236/ada462368
◽
1990
◽
Cited By ~ 5
Author(s):
John McLean
Keyword(s):
Computer Security
Download Full-text
The Handbook for the Computer Security Certification of Trusted Systems
10.21236/ada462362
◽
1992
◽
Cited By ~ 1
Author(s):
Judith N. Froscher
◽
Jr Payne
◽
Charles N.
Keyword(s):
Computer Security
Download Full-text
An Analysis of the Computer Security Ramifications of Weakened Asymmetric Cryptographic Algorithms
10.21236/ada562021
◽
2012
◽
Author(s):
Eric R. Bixby
Keyword(s):
Computer Security
◽
Cryptographic Algorithms
Download Full-text
Computer Security Tools and Concepts for Lawyers
SSRN Electronic Journal
◽
10.2139/ssrn.2831739
◽
2016
◽
Author(s):
Kendra Albert
Keyword(s):
Computer Security
Download Full-text
Proceedings of the 35th Annual Computer Security Applications Conference
10.1145/3359789
◽
2019
◽
Keyword(s):
Computer Security
◽
Security Applications
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close