ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings 12th Annual Computer Security Applications Conference CSAC-96
Latest Publications
TOTAL DOCUMENTS
30
(FIVE YEARS 0)
H-INDEX
5
(FIVE YEARS 0)
Published By IEEE
081867606x
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Sse-CMM Pilot Results
Proceedings 12th Annual Computer Security Applications Conference CSAC-96
◽
10.1109/csac.1996.569671
◽
2005
◽
Author(s):
M. Schanken
Download Full-text
Security And The National Telecommunications Infrastructure
Proceedings 12th Annual Computer Security Applications Conference CSAC-96
◽
10.1109/csac.1996.569685
◽
2005
◽
Author(s):
T. Lunt
◽
J. Kimmins
◽
B. McKosky
Keyword(s):
Telecommunications Infrastructure
Download Full-text
Common Criteria Activities And Alternative Assurance
Proceedings 12th Annual Computer Security Applications Conference CSAC-96
◽
10.1109/csac.1996.569670
◽
2005
◽
Author(s):
H. Hosy
◽
M. Schanken
◽
G. Troy
Keyword(s):
Common Criteria
Download Full-text
Implementing security policy in a large defence procurement
Proceedings 12th Annual Computer Security Applications Conference CSAC-96
◽
10.1109/csac.1996.569665
◽
2002
◽
Cited By ~ 1
Author(s):
M.J. Nash
◽
R.J. Kennett
Keyword(s):
Security Policy
◽
Defence Procurement
Download Full-text
An authenticated camera
Proceedings 12th Annual Computer Security Applications Conference CSAC-96
◽
10.1109/csac.1996.569666
◽
2002
◽
Cited By ~ 6
Author(s):
J. Kelsey
◽
B. Schneier
◽
C. Hall
Download Full-text
Asymmetric isolation
Proceedings 12th Annual Computer Security Applications Conference CSAC-96
◽
10.1109/csac.1996.569668
◽
2002
◽
Cited By ~ 4
Author(s):
J.A. Davidson
Download Full-text
A comparison of multilevel structured query language (SQL) implementations
Proceedings 12th Annual Computer Security Applications Conference CSAC-96
◽
10.1109/csac.1996.569698
◽
2002
◽
Author(s):
R.K. Burns
◽
Y. Koh
Keyword(s):
Query Language
◽
Structured Query Language
Download Full-text
Proxies for anonymous routing
Proceedings 12th Annual Computer Security Applications Conference CSAC-96
◽
10.1109/csac.1996.569678
◽
2002
◽
Cited By ~ 24
Author(s):
M.G. Reed
◽
P.F. Syverson
◽
D.M. Goldschlag
Keyword(s):
Anonymous Routing
Download Full-text
Security measures for the Austrian "PAYCHIP" electronic purse application
Proceedings 12th Annual Computer Security Applications Conference CSAC-96
◽
10.1109/csac.1996.569672
◽
2002
◽
Author(s):
A.M. Holzbach
Keyword(s):
Security Measures
Download Full-text
SIGMA: security for distributed object interoperability between trusted and untrusted systems
Proceedings 12th Annual Computer Security Applications Conference CSAC-96
◽
10.1109/csac.1996.569690
◽
2002
◽
Cited By ~ 1
Author(s):
E.J. Sebes
◽
T.C. Vickers Benzel
Keyword(s):
Distributed Object
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close