From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Computer Security Technology Planning Study. том 2. U.S. Air Force Electronic Systems Division, (октября 1972)Experimental study of a 1.5-MW, 110-GHz gyrotron oscillator.. Massachusetts Institute of Technology, Cambridge, MA, USA, (2005)ndltd.org (oai:dspace.mit.edu:1721.1/30158).An Approach to Indentification of Minimum TCB Requirements for Various Threat/Risk Environments.. S&P, стр. 102-106. IEEE Computer Society, (1983)Accelerating Computer Security Innovation.. S&P, стр. 91-98. IEEE Computer Society, (1982)Privacy and protection in operating systems (Panel Session)., , , , и . ACM Annual Conference (2), стр. 665-666. ACM, (1972)Computer security myths mythtakes or 'The real security problem is...'.. ACSAC, IEEE, (1992)A computer for direct execution of algorithmic languages.. AFIPS Eastern Joint Computing Conference, стр. 184-193. ACM, (1961)D825 - a multiple-computer system for command & control., , , и . AFIPS Fall Joint Computing Conference, стр. 86-96. ACM, (1962)A logic design translator., и . AFIPS Fall Joint Computing Conference, стр. 251-261. ACM, (1962)A Unification of Computer and Network Security Concepts.. S&P, стр. 77-91. IEEE Computer Society, (1985)