Author of the publication

Epilogue for RFC 1281, Guidelines for the Secure Operation of the Internet.

, and . ACSAC, page 405-417. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Epilogue for RFC 1281, Guidelines for the Secure Operation of the Internet., and . ACSAC, page 405-417. IEEE Computer Society, (2008)The Greenblatt chess program., , and . AFIPS Fall Joint Computing Conference, volume 31 of AFIPS Conference Proceedings, page 801-810. AFIPS / ACM / Thomson Book Company, Washington D.C., (1967)A Proposal for a Verification-Based Virus Filter., and . S&P, page 319-324. IEEE Computer Society, (1989)Precise Information Flow Analysis by Program Verification., and . S&P, page 74-80. IEEE Computer Society, (1982)Verification of Concurrent Systems: Function and Timing., and . PSTV, page 401-409. North-Holland, (1982)A multiprocessor description language., , and . AFIPS National Computer Conference, volume 50 of AFIPS Conference Proceedings, page 19-25. AFIPS Press, (1981)Learning to Network.. IEEE Ann. Hist. Comput., 41 (2): 42-47 (2019)Snuper computer: a computer in instrumentation automaton., , , and . AFIPS Spring Joint Computing Conference, volume 30 of AFIPS Conference Proceedings, page 645-656. AFIPS / ACM / Thomson Book Company, Washington D.C., (1967)Software methodology for development of a trusted BMS: identification of critical problems., and . ACSAC, page 148-165. IEEE, (1989)Unwinding and the LOCK Proof Referees Study., , and . CSFW, page 9-21. IEEE Computer Society, (1992)