From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Personal Computing in an Insecure Network.. Commun. ACM, 22 (8): 476-482 (1979)Certification of Programs for Secure Information Flow., и . Commun. ACM, 20 (7): 504-513 (1977)Digital Signatures with RSA and Other Public-Key Cryptosystems.. Commun. ACM, 27 (4): 388-392 (1984)The United States vs. Craig Neidorf: A Debate on Electronic Publishing, Constitutional Rights and Hacking.. Commun. ACM, 34 (3): 22-43 (1991)An Intrusion-Detection Model. IEEE Transactions on Software Engineering, SE-13 (2): 222--232 (февраля 1987)Cyber Security as an Emergent Infrastructure.. World Conference on Information Security Education, том 253 из IFIP Conference Proceedings, стр. 1-2. Kluwer, (2003)Securing Data Bases under Linear Queries., , и . IFIP Congress, стр. 395-398. (1977)Corrigenda: Linear Queries in Statistical Databases.. ACM Trans. Database Syst., 5 (3): 383 (1980)Master Keys for Group Sharing., и . Inf. Process. Lett., 12 (1): 23-25 (1981)Framework and principles for active cyber defense.. Comput. Secur., (2014)