Number of items: 5.
G
Garg, Deepak and Rezk, Tamara and Rajani, Vineet
(2016)
On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks.
Grishchenko, Ilya and Maffei, Matteo and Calzavara, Stefano
(2016)
HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving.
M
Maffei, Matteo
(2016)
Security & Privacy Column.
SIGLOG News.
Maffei, Matteo and Grimm, Niklas and Focardi, Riccardo and Calzavara, Stefano
(2016)
Micro-Policies for Web Session Security.
V
Venkatadri, Giridhari and Goga, Oana and Zhong, Changtao and Viswanath, Bimal and Gummadi, Krishna P. and Sastry, Nishanth R
(2016)
Strengthening Weak Identities Through Inter-Domain Trust Transfer.
This list was generated on Tue Dec 3 18:21:24 2024 CET.