Index of /~tygar/papers/_vti_cnf

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory   -  
[   ]Atomicity_vs_anonymi..>2013-06-30 21:53 287  
[   ]Botnets.pdf 2013-06-30 21:53 220  
[   ]Buck.pdf 2013-06-30 21:53 217  
[   ]Building_blocks_atom..>2013-06-30 21:53 287  
[   ]Collaborative_filter..>2013-06-30 21:53 287  
[   ]Conditioned_safe.pdf 2013-06-30 21:53 217  
[   ]Creative.WSN.pdf 2013-07-01 10:42 220  
[   ]Cryptography_not_jus..>2013-06-30 21:53 287  
[   ]Cyber_defense_tech_n..>2013-06-30 21:53 287  
[   ]Distillation_code.pdf 2013-06-30 21:53 150  
[   ]ELK.pdf 2013-06-30 21:53 150  
[   ]Efficient_authentica..>2013-06-30 21:53 150  
[   ]Efficient_netlist_co..>2013-06-30 21:53 150  
[   ]Efficient_secure_sou..>2013-06-30 21:53 150  
[   ]Electronic_auctions_..>2013-06-30 21:53 150  
[   ]Expander_graphs_for_..>2013-06-30 21:53 150  
[   ]Fast_off-line_electr..>2013-06-30 21:53 150  
[   ]Flexible_scalable_cr..>2013-06-30 21:53 150  
[   ]Hierarchical_logic_c..>2013-06-30 21:53 150  
[   ]How_are_we_going.pdf 2013-06-30 21:53 150  
[   ]ISAT-final-briefing.pdf2013-06-30 21:53 150  
[   ]Japan_captcha.pdf 2013-06-30 21:53 218  
[   ]Liskov_Guttag_book_r..>2013-06-30 21:53 150  
[   ]Median_separators_in..>2013-06-30 21:53 150  
[   ]Miro_USENIX_abstract..>2013-06-30 21:53 150  
[   ]Model_check_e-comm_p..>2013-06-30 21:53 150  
[   ]Napster.web.pdf 2013-06-30 21:53 150  
[   ]Netbill_security_and..>2013-06-30 21:53 150  
[   ]Notes_2nd_USENIX_wor..>2013-06-30 21:53 150  
[   ]Open-probs_E-commerc..>2013-06-30 21:53 150  
[   ]Optimal_ROC_curve.pdf 2013-06-30 21:53 220  
[   ]Privacy_in_sensor_we..>2013-06-30 21:53 150  
[   ]Privacy_security_loc..>2013-06-30 21:53 150  
[   ]Private_matching.pdf 2013-06-30 21:53 150  
[   ]Problem_with_privacy..>2013-06-30 21:53 150  
[   ]Protecting_privacy_w..>2013-06-30 21:53 150  
[   ]Randomization_inject..>2013-06-30 21:53 220  
[   ]Safe_staging_for_com..>2013-06-30 21:53 150  
[   ]Secure_coprocessors_..>2013-06-30 21:53 150  
[   ]Security_for_NASD.pdf 2013-06-30 21:53 150  
[   ]Statistical_monitori..>2013-06-30 21:53 150  
[   ]Strongbox_USENIX_abs..>2013-06-30 21:53 150  
[   ]Strongbox_chapter.pdf 2013-06-30 21:53 150  
[   ]System_for_self_secu..>2013-06-30 21:53 150  
[   ]TESLA_broadcast_auth..>2013-06-30 21:53 150  
[   ]Technological_dimens..>2013-06-30 21:53 150  
[   ]Trust_in_Cyberspace.pdf2013-06-30 21:53 150  
[   ]WWW_e-comm_and_troja..>2013-06-30 21:53 150  
[   ]When_Computer_Securi..>2013-06-30 21:53 150  
[   ]When_are_best_fit_an..>2013-06-30 21:53 150  
[   ]madnes.pdf 2013-06-30 21:53 151