Biblio

Export 12686 results:
1996
Jutla C, Yung M.  1996.  PayTree: "Amortized-Signature'}}}}' for Flexible MicroPayments. 2nd USENIX Workshop on Electronic Commerce (EC 96).
Trocki J.  1996.  PC Administration Tools: Using Linux to Manage Personal Computers. USENIX 10th Systems Administration Conference (LISA 96).
Schneier B, Kelsey J.  1996.  A Peer-to-Peer Software Metering System. 2nd USENIX Workshop on Electronic Commerce (EC 96).
Lai K, Baker M.  1996.  A Performance Comparison of UNIX Operating Systems on the Pentium. USENIX 1996 Annual Technical Conference (USENIX ATC 96).
Zhou Y, Iftode L, Li L.  1996.  Performance Evaluation of Two Home-Based Lazy Release Consistency Protocols for Shared Virtual Memory Systems. USENIX 2nd Symposium on OS Design and Implementation (OSDI 96).
Rose G.  1996.  The PGP Moose - Implementation and Experience. USENIX 10th Systems Administration Conference (LISA 96).
[Anonymous].  1996.  Pickling State in the Java(tm) System . 2nd USENIX Conference on Object-Oriented Technologies (COOTS 96).
Kroeger TM, Long DDE.  1996.  Predicting Future File-System Actions From Prior Events. USENIX 1996 Annual Technical Conference (USENIX ATC 96).
Viswanadha SRao.  1996.  Preliminary Design of ADL/C++ -- A Specification Language for C++. 2nd USENIX Conference on Object-Oriented Technologies (COOTS 96).
Hill BC.  1996.  Priv: Secure and Flexible Privileged Access Dissemination. USENIX 10th Systems Administration Conference (LISA 96).
Bellovin S.  1996.  Problem Areas for the IP Security Protocols. 6th USENIX Security Symposium (USENIX Security 96).
Nishioka S, Kawaguchi A, Motoda H.  1996.  Process Labeled Kernel Profiling: A New Facility to Profile System Activities. USENIX 1996 Annual Technical Conference (USENIX ATC 96).
Box D.  1996.  Programming Distributed Components Using Network OLE and C++. 2nd USENIX Conference on Object-Oriented Technologies (COOTS 96).
Sah A, Brewer E, Brown K.  1996.  Programming the Internet from the Server-Side with Tcl and Audience1. Fourth Annual USENIX Tcl/Tk Workshop (Fourth Annual USENIX Tcl/Tk Workshop).
Steves DH, Edmondson-Yurkanan C, Gouda M.  1996.  A Protocol for Secure Transactions. 2nd USENIX Workshop on Electronic Commerce (EC 96).
Galvin JM.  1996.  Public Key Distribution with Secure DNS. 6th USENIX Security Symposium (USENIX Security 96).
Grady S, Madhusudan G.S, Sugiyama M.  1996.  QuaSR: A Large-Scale Automated, Distributed Testing Environment. Fourth Annual USENIX Tcl/Tk Workshop (Fourth Annual USENIX Tcl/Tk Workshop).
Lear E, Katinsky J, Coffin J, Tharp D.  1996.  Renumbering: Threat or Menace. USENIX 10th Systems Administration Conference (LISA 96).
Boneh D, Lipton RJ.  1996.  A Revocable Backup System. 6th USENIX Security Symposium (USENIX Security 96).
Ruefenacht C.  1996.  RUST: Managing Problem Reports and To-Do Lists. USENIX 10th Systems Administration Conference (LISA 96).
Necula GC, Lee P.  1996.  Safe Kernel Extensions Without Run-Time Checking. USENIX 2nd Symposium on OS Design and Implementation (OSDI 96).
Sweeney A.  1996.  Scalability in the XFS File System. USENIX 1996 Annual Technical Conference (USENIX ATC 96).
Heintze N.  1996.  Scalable Document Fingerprinting. 2nd USENIX Workshop on Electronic Commerce (EC 96).
Gutmann P.  1996.  Secure Deletion of Data from Magnetic and Solid-State Memory. 6th USENIX Security Symposium (USENIX Security 96).
Goldberg I, Wagner D, Thomas R, Brewer EA.  1996.  A Secure Environment for Untrusted Helper Applications. 6th USENIX Security Symposium (USENIX Security 96).

Pages