Biblio

Export 12686 results:
1995
Golding R, Bosch P, Staelin C, Sullivan T, Wilkes J.  1995.  Idleness is Not Sloth. USENIX 1995 Technical Conference (USENIX 1995 Technical Conference).
Bellare M, Garay JA, Hauser R, Herzberg A, Krawczyk H, Steiner M, Tsudik G, Waidner M.  1995.  iKP - A Family of Secure Electronic Payment Protocols. First USENIX Workshop on Electronic Commerce ( First USENIX Workshop on Electronic Commerce).
Kim GH, Orman H, O'Malley S.  1995.  Implementing a Secure rlogin Environment: A Case Study of Using a Secure Network Layer Protocol. 5th USENIX UNIX Security Symposium (USENIX Security 95).
Wakeman I, Ghosh A, Crowcroft J, Jacobson V, Floyd S.  1995.  Implementing Real Time Packet Forwarding Policies Using Streams. USENIX 1995 Technical Conference (USENIX 1995 Technical Conference).
Pozzetti E, Vetland V.  1995.  Improving the Trustworthiness of Evidence Derived from Security Trace Files. 5th USENIX UNIX Security Symposium (USENIX Security 95).
Ulferts ML.  1995.  [incr Widgets] An Object-Oriented Mega-Widget Set. USENIX Third Annual Tcl/Tk Workshop ( USENIX Third Annual Tcl/Tk Workshop).
Rubin AD.  1995.  Independent One-Time Passwords. 5th USENIX UNIX Security Symposium (USENIX Security 95).
Winkler IS, Dealy B.  1995.  Information Security Technology? Don't Rely on It. A Case Study in Social Engineering 5th USENIX UNIX Security Symposium (USENIX Security 95).
Baquero C, Oliveira R, Moura F.  1995.  Integration of Concurrency Control in a Language with Subtyping and Subclassing. USENIX Conference on Object-Oriented Technologies (COOTS 95).
New D.  1995.  Internet Information Commerce: The First Virtual® Approach. First USENIX Workshop on Electronic Commerce ( First USENIX Workshop on Electronic Commerce).
Sheehan D.  1995.  Interpreted C++, Object Oriented Tcl, What next? USENIX Third Annual Tcl/Tk Workshop ( USENIX Third Annual Tcl/Tk Workshop).
Adamson WA, Rees J, Honeyman P.  1995.  Joining Security Realms: A Single Login for NetWare and Kerberos. 5th USENIX UNIX Security Symposium (USENIX Security 95).
Davis D.  1995.  Kerberos Plus RSA for World Wide Web Security. First USENIX Workshop on Electronic Commerce ( First USENIX Workshop on Electronic Commerce).
Davis D, Geer DE.  1995.  Kerberos Security with Clocks Adrift. 5th USENIX UNIX Security Symposium (USENIX Security 95).
Leiner BM.  1995.  Keynote Address. Second USENIX Symposium on Mobile and Location-Independent Computing ( Second USENIX Symposium on Mobile and Location-Independent Computing).
Sedayao J, Akita K.  1995.  LACHESIS: A Tool for Benchmarking Internet Service Providers. 9th System Administration Conference (LISA 95).
Schemers, III RJ.  1995.  lbnamed: A Load Balancing Name Server in Perl. 9th System Administration Conference (LISA 95).
Plank JS, Beck M, Kingsley G, Li K.  1995.  Libckpt: Transparent Checkpointing under UNIX. USENIX 1995 Technical Conference (USENIX 1995 Technical Conference).
Muckelbauer P, Russo VF.  1995.  Lingua-Franca: An IDL for Structural Subtyping Distributed Object Systems. USENIX Conference on Object-Oriented Technologies (COOTS 95).
Powell P, Mason J.  1995.  LPRng - An Enhanced Printer Spooler System. 9th System Administration Conference (LISA 95).
J. Stevenson M, Julin DP.  1995.  Mach-US: Unix On Generic OS Object Servers. USENIX 1995 Technical Conference (USENIX 1995 Technical Conference).
Rajagopalan R, Venkatesan S., Alagar S.  1995.  MCE: An Integrated Mobile Computing Environment and Simulation Testbed. Second USENIX Symposium on Mobile and Location-Independent Computing ( Second USENIX Symposium on Mobile and Location-Independent Computing).
Arnold K, Hinckley K, Sheinbrood E.  1995.  Media-Independent Interfaces in a Media-Dependent World. USENIX Conference on Object-Oriented Technologies (COOTS 95).
Jaeger S.  1995.  Mega-widgets in Tcl/Tk: Evaluation and Analysis. USENIX Third Annual Tcl/Tk Workshop ( USENIX Third Annual Tcl/Tk Workshop).
Vahalia U, Gray CG, Ting D.  1995.  Metadata Logging in an NFS Server. USENIX 1995 Technical Conference (USENIX 1995 Technical Conference).

Pages