Biblio

Export 11928 results:
1996
Davis D.  1996.  Compliance Defects in Public Key Cryptography. 6th {USENIX} Security Symposium ({USENIX} Security 96).
Davis D.  1996.  Compliance Defects in Public Key Cryptography. 6th USENIX Security Symposium (USENIX Security 96).
Loepere K.  1996.  Composing Special Memory Allocators in C++. 2nd USENIX Conference on Object-Oriented Technologies (COOTS 96).
Walker KM, Sterne DF, M. Badger L, Petkac MJ, Sherman DL, Oostendorp KA.  1996.  Confining Root Programs with Domain and Type Enforcement. 6th USENIX Security Symposium (USENIX Security 96).
Ford B, Susarla SR.  1996.  CPU Inheritance Scheduling. USENIX 2nd Symposium on OS Design and Implementation (OSDI 96).
Bosch P, Mullender SJ.  1996.  Cut-and-Paste File-Systems: Integrating Simulators and File-Systems. USENIX 1996 Annual Technical Conference (USENIX ATC 96).
Seltzer MI, Endo Y, Small C, Smith KA.  1996.  Dealing With Disaster: Surviving Misbehaved Kernel Extensions. USENIX 2nd Symposium on OS Design and Implementation (OSDI 96).
J. Harris A, Gingerich G.  1996.  The Design and Implementation of a Network Account Management System. USENIX 10th Systems Administration Conference (LISA 96).
Pyarali I., Harrison T., Schmidt D..  1996.  Design and Performance of an Object-Oriented Framework for High-Performance Electronic Medical Imaging. 2nd USENIX Conference on Object-Oriented Technologies (COOTS 96).
Martin R.  1996.  Design Patterns for Dealing with Dual Inheritance Hierarchies in C++. 2nd USENIX Conference on Object-Oriented Technologies (COOTS 96).
Samuelson P.  1996.  Designing New Rules of the Road for Electronic Commerce in Digital Information. 2nd {USENIX} Workshop on Electronic Commerce ({EC} 96).
Gauntt Jdu Pre.  1996.  Digital Currency and Public Networks: So What If It Is Secure, Is It Money? 2nd USENIX Workshop on Electronic Commerce (EC 96).
[Anonymous].  1996.  Distributed Object Computing on the Internet . 2nd USENIX Conference on Object-Oriented Technologies (COOTS 96).
Wollrath A, Riggs R, Waldo J.  1996.  A Distributed Object Model for the Java System. 2nd USENIX Conference on Object-Oriented Technologies (COOTS 96).
Cheswick B, Bellovin SM.  1996.  A DNS Filter and Switch for Packet-filtering Gateways. 6th USENIX Security Symposium (USENIX Security 96).
Jaspan B.  1996.  Dual-workfactor Encrypted Key Exchange: Efficiently Preventing Password Chaining and Dictionary Attacks. 6th USENIX Security Symposium (USENIX Security 96).
Pardyak P, Bershad B.  1996.  Dynamic Binding for an Extensible System. USENIX 2nd Symposium on OS Design and Implementation (OSDI 96).
Brustoloni JCarlos, Steenkiste P.  1996.  Effects of Buffering Semantics on I/O Performance. USENIX 2nd Symposium on OS Design and Implementation (OSDI 96).
Sarkar P, Hartman J.  1996.  Efficient Cooperative Caching Using Hints. USENIX 2nd Symposium on OS Design and Implementation (OSDI 96).
Mogul J, Ramakrishnan K.K.  1996.  Eliminating Receive Livelock in an Interrupt-driven Kernel. USENIX 1996 Annual Technical Conference (USENIX ATC 96).
Gong L.  1996.  Enclaves: Enabling Secure Collaboration over the Internet. 6th USENIX Security Symposium (USENIX Security 96).
Ellison C.  1996.  Establishing Identity Without Certification Authorities. 6th USENIX Security Symposium (USENIX Security 96).
Thomas D.  1996.  Experiences on the Road to Object Utopia: An Industrial Research and Development Perspective. 2nd USENIX Conference on Object-Oriented Technologies (COOTS 96).
Bernabeu J, Matena V, Khalidi Y.  1996.  Extending a Traditional OS Using Object-Oriented Techniques. 2nd USENIX Conference on Object-Oriented Technologies (COOTS 96).
Fiuczynski ME, Bershad BN.  1996.  An Extensible Protocol Architecture for Application-Specific Networking. USENIX 1996 Annual Technical Conference (USENIX ATC 96).

Pages