Name | Last modified | Size | Description | |
---|---|---|---|---|
Parent Directory | - | |||
Anonymous_atomic_tra..> | 2013-06-30 21:55 | - | ||
Atomicity_in_E-comme..> | 2013-06-30 21:55 | - | ||
Berkshire_Encycloped..> | 2013-06-30 21:55 | - | ||
Certified_Electronic..> | 2013-06-30 21:55 | - | ||
Completely_Asynchron..> | 2013-06-30 21:55 | - | ||
Computability_and_co..> | 2013-06-30 21:55 | - | ||
Computer_Security_21..> | 2013-06-30 21:55 | - | ||
Constraining_Picture..> | 2013-06-30 21:55 | - | ||
Cryptographic_Postag..> | 2013-06-30 21:55 | - | ||
Dyad/ | 2013-06-30 21:55 | - | ||
Efficient_parallel_p..> | 2013-06-30 21:55 | - | ||
Geometric_characteri..> | 2013-06-30 21:55 | - | ||
How_to_Make_Replicat..> | 2013-06-30 21:55 | - | ||
IBIP/ | 2013-06-30 21:55 | - | ||
IETF/ | 2013-06-30 21:55 | - | ||
ITOSS/ | 2013-06-30 21:55 | - | ||
Image_Recognition_CA..> | 2013-06-30 21:55 | - | ||
Implement_capabilities/ | 2013-06-30 21:55 | - | ||
Japanese/ | 2013-06-30 21:55 | - | ||
Karlof/ | 2013-06-30 21:55 | - | ||
Keyboard_Acoustic_Em..> | 2013-06-30 21:55 | - | ||
Letters_to_the_editor/ | 2013-06-30 21:55 | - | ||
Machine_Learning_Sec..> | 2013-06-30 21:55 | - | ||
Miro_tools/ | 2013-06-30 21:55 | - | ||
Miro_visual_specific..> | 2013-06-30 21:55 | - | ||
Model_for_Secure_Pro..> | 2013-06-30 21:55 | - | ||
Multi-round_anonymou..> | 2013-06-30 21:55 | - | ||
NetBill_Internet_com..> | 2013-06-30 21:55 | - | ||
Optimal_sampling_str..> | 2013-06-30 21:55 | - | ||
Patents/ | 2013-06-30 21:55 | - | ||
Phishing/ | 2013-06-30 21:55 | - | ||
SAM/ | 2013-06-30 21:56 | - | ||
SML/ | 2013-06-30 21:56 | - | ||
SML2/ | 2013-06-30 21:56 | - | ||
SPINS/ | 2013-06-30 21:56 | - | ||
Secure_Broadcast_Com..> | 2013-06-30 21:56 | - | ||
Security_privacy_par..> | 2013-06-30 21:56 | - | ||
Semantics_of_Miro/ | 2013-06-30 21:56 | - | ||
Side_effects_are_not..> | 2013-06-30 21:56 | - | ||
Smart_cards_in_hosti..> | 2013-06-30 21:56 | - | ||
Specifying_UNIX_secu..> | 2013-06-30 21:56 | - | ||
Taiwan/ | 2013-06-30 21:56 | - | ||
Token_Notational_Money/ | 2013-06-30 21:56 | - | ||
Visual_Specfication_..> | 2013-06-30 21:56 | - | ||
Why_Johnny_Cant_Encr..> | 2013-06-30 21:56 | - | ||
Why_isnt_the_Interne..> | 2013-06-30 21:56 | - | ||
_vti_cnf/ | 2013-06-30 21:56 | - | ||
papers_by_other_people/ | 2013-06-30 21:55 | - | ||
Napster.web.pdf | 2005-08-30 04:17 | 158K | ||
Building_blocks_atom..> | 2009-09-11 09:12 | 221K | ||
Netbill_security_and..> | 2005-08-30 04:17 | 243K | ||
Privacy_security_loc..> | 2005-08-30 04:19 | 245K | ||
Strongbox_USENIX_abs..> | 2005-08-30 04:24 | 255K | ||
Open-probs_E-commerc..> | 2005-08-30 04:18 | 257K | ||
Privacy_in_sensor_we..> | 2005-08-30 04:19 | 267K | ||
Cyber_defense_tech_n..> | 2009-09-11 09:14 | 273K | ||
When_Computer_Securi..> | 2006-02-13 18:25 | 275K | ||
madnes.pdf | 2009-09-11 11:57 | 284K | ||
ISAT-final-briefing.pdf | 2005-08-30 04:13 | 295K | ||
Optimal_ROC_curve.pdf | 2009-09-11 13:17 | 305K | ||
Liskov_Guttag_book_r..> | 2005-08-30 04:14 | 309K | ||
Security_for_NASD.pdf | 2005-08-30 04:21 | 316K | ||
Cryptography_not_jus..> | 2009-09-11 09:14 | 317K | ||
Safe_staging_for_com..> | 2005-08-30 04:20 | 325K | ||
Efficient_secure_sou..> | 2005-08-30 04:11 | 330K | ||
Secure_coprocessors_..> | 2005-08-30 04:21 | 342K | ||
ELK.pdf | 2005-08-30 04:11 | 353K | ||
Private_matching.pdf | 2005-08-30 04:19 | 366K | ||
System_for_self_secu..> | 2005-08-30 04:24 | 368K | ||
Flexible_scalable_cr..> | 2005-08-30 04:12 | 373K | ||
Statistical_monitori..> | 2005-08-30 04:23 | 383K | ||
Botnets.pdf | 2009-09-11 13:10 | 384K | ||
Hierarchical_logic_c..> | 2005-08-30 04:12 | 400K | ||
Model_check_e-comm_p..> | 2005-08-30 04:15 | 400K | ||
Miro_USENIX_abstract..> | 2005-08-30 04:15 | 413K | ||
Notes_2nd_USENIX_wor..> | 2005-08-30 04:17 | 413K | ||
TESLA_broadcast_auth..> | 2005-08-30 04:24 | 416K | ||
Collaborative_filter..> | 2009-09-11 09:13 | 421K | ||
WWW_e-comm_and_troja..> | 2005-08-30 04:26 | 443K | ||
Expander_graphs_for_..> | 2005-08-30 04:11 | 445K | ||
How_are_we_going.pdf | 2005-08-30 04:12 | 450K | ||
Distillation_code.pdf | 2005-08-30 04:10 | 453K | ||
Technological_dimens..> | 2005-08-30 04:24 | 483K | ||
Randomization_inject..> | 2009-09-11 10:28 | 489K | ||
Efficient_authentica..> | 2005-08-30 04:10 | 496K | ||
Electronic_auctions_..> | 2005-08-30 04:11 | 598K | ||
Creative.WSN.pdf | 2013-07-01 10:41 | 613K | ||
Buck.pdf | 2013-06-30 20:02 | 634K | ||
Efficient_netlist_co..> | 2005-08-30 04:11 | 790K | ||
Conditioned_safe.pdf | 2013-06-30 20:34 | 815K | ||
Fast_off-line_electr..> | 2005-08-30 04:11 | 822K | ||
Trust_in_Cyberspace.pdf | 2005-08-30 04:24 | 851K | ||
When_are_best_fit_an..> | 2005-08-30 04:25 | 927K | ||
Protecting_privacy_w..> | 2005-08-30 04:20 | 962K | ||
Atomicity_vs_anonymi..> | 2009-09-11 09:12 | 1.2M | ||
Median_separators_in..> | 2005-08-30 04:14 | 1.5M | ||
Strongbox_chapter.pdf | 2005-08-30 04:24 | 1.5M | ||
Japan_captcha.pdf | 2013-06-30 20:21 | 1.7M | ||
Problem_with_privacy..> | 2005-08-30 04:20 | 4.9M | ||