Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

Introduction: Virtually Perfect Security (Transcript of Discussion)
Caught in the Maze of Security Standards
Caught in the Maze of Security Standards (Transcript of Discussion)
Blood in the Water: Are There Honeymoon Effects Outside Software?
Blood in the Water (Transcript of Discussion)
Digital Immolation: New Directions for Online Protest
Digital Immolation (Transcript of Discussion)
Relay-Proof Channels Using UWB Lasers
Relay-Proof Channels Using UWB Lasers (Transcript of Discussion)
Using Dust Clouds to Enhance Anonymous Communication
Using Dust Clouds to Enhance Anonymous Communication (Transcript of Discussion)
Generating Channel Ids in Virtual World Operating Systems (Extended Abstract)
Generating Channel Ids in Virtual World Operating Systems (Transcript of Discussion)
Censorship-Resilient Communications through Information Scattering
Censorship-Resilient Communications through Information Scattering (Transcript of Discussion)
On Storing Private Keys in the Cloud
On Storing Private Keys in the Cloud (Transcript of Discussion)
More Security or Less Insecurity
More Security or Less Insecurity (Transcript of Discussion)
It's the Anthropology, Stupid!
It's the Anthropology, Stupid! (Transcript of Discussion)
Security Design in Human Computation Games
Security Design in Human Computation Games (Transcript of Discussion)
Virtually Perfect Democracy
Virtually Perfect Democracy (Transcript of Discussion)
Security Protocols for Secret Santa
Security Protocols for Secret Santa (Transcript of Discussion)
Censorship of eBooks (Extended Abstract)
Censorship of eBooks (Transcript of Discussion)
On the Value of Hybrid Security Testing
On the Value of Hybrid Security Testing (Transcript of Discussion)
Security Made, Not Perfect, But Automatic
Security Made, Not Perfect, But Automatic (Transcript of Discussion)
Security Limitations of Virtualization and How to Overcome Them
Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion)
Recapitulation

Browse Subjects

Show more subjects...

Statistics

from
to
Export