USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 11928 results:
Compliance Defects in Public Key Cryptography. 6th {USENIX} Security Symposium ({USENIX} Security 96).
.
1996. Compliance Defects in Public Key Cryptography. 6th USENIX Security Symposium (USENIX Security 96).
.
1996. Composing Special Memory Allocators in C++. 2nd USENIX Conference on Object-Oriented Technologies (COOTS 96).
.
1996. Confining Root Programs with Domain and Type Enforcement. 6th USENIX Security Symposium (USENIX Security 96).
.
1996. CPU Inheritance Scheduling. USENIX 2nd Symposium on OS Design and Implementation (OSDI 96).
.
1996. Cut-and-Paste File-Systems: Integrating Simulators and File-Systems. USENIX 1996 Annual Technical Conference (USENIX ATC 96).
.
1996. Dealing With Disaster: Surviving Misbehaved Kernel Extensions. USENIX 2nd Symposium on OS Design and Implementation (OSDI 96).
.
1996. The Design and Implementation of a Network Account Management System. USENIX 10th Systems Administration Conference (LISA 96).
.
1996. Design and Performance of an Object-Oriented Framework for High-Performance Electronic Medical Imaging. 2nd USENIX Conference on Object-Oriented Technologies (COOTS 96).
.
1996. Design Patterns for Dealing with Dual Inheritance Hierarchies in C++. 2nd USENIX Conference on Object-Oriented Technologies (COOTS 96).
.
1996. Designing New Rules of the Road for Electronic Commerce in Digital Information. 2nd {USENIX} Workshop on Electronic Commerce ({EC} 96).
.
1996. Digital Currency and Public Networks: So What If It Is Secure, Is It Money? 2nd USENIX Workshop on Electronic Commerce (EC 96).
.
1996. Distributed Object Computing on the Internet . 2nd USENIX Conference on Object-Oriented Technologies (COOTS 96).
.
1996. A Distributed Object Model for the Java System. 2nd USENIX Conference on Object-Oriented Technologies (COOTS 96).
.
1996. A DNS Filter and Switch for Packet-filtering Gateways. 6th USENIX Security Symposium (USENIX Security 96).
.
1996. Dual-workfactor Encrypted Key Exchange: Efficiently Preventing Password Chaining and Dictionary Attacks. 6th USENIX Security Symposium (USENIX Security 96).
.
1996. Dynamic Binding for an Extensible System. USENIX 2nd Symposium on OS Design and Implementation (OSDI 96).
.
1996. Effects of Buffering Semantics on I/O Performance. USENIX 2nd Symposium on OS Design and Implementation (OSDI 96).
.
1996. Efficient Cooperative Caching Using Hints. USENIX 2nd Symposium on OS Design and Implementation (OSDI 96).
.
1996. Eliminating Receive Livelock in an Interrupt-driven Kernel. USENIX 1996 Annual Technical Conference (USENIX ATC 96).
.
1996. Enclaves: Enabling Secure Collaboration over the Internet. 6th USENIX Security Symposium (USENIX Security 96).
.
1996. Establishing Identity Without Certification Authorities. 6th USENIX Security Symposium (USENIX Security 96).
.
1996. Experiences on the Road to Object Utopia: An Industrial Research and Development Perspective. 2nd USENIX Conference on Object-Oriented Technologies (COOTS 96).
.
1996. Extending a Traditional OS Using Object-Oriented Techniques. 2nd USENIX Conference on Object-Oriented Technologies (COOTS 96).
.
1996. An Extensible Protocol Architecture for Application-Specific Networking. USENIX 1996 Annual Technical Conference (USENIX ATC 96).
.
1996.