Search

Your search keyword '"Doug Tygar"' showing total 224 results

Search Constraints

Start Over You searched for: Author "Doug Tygar" Remove constraint Author: "Doug Tygar"
224 results on '"Doug Tygar"'

Search Results

8. Adversarial Active Learning.

21. Cyber defense technology networking and evaluation.

23. SWOON: A Testbed for Secure Wireless Overlay Networks.

36. Micro tools.

38. Advances in Software Engineering Techniques

40. Panel: Authentication in Constrained Environments

41. Computer Security in the 21st Century

42. Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371)

43. Computer Security in the 21st Century

44. Randomly Partitioned Encryption for Cloud Databases

45. Incremental Analysis of Evolving Administrative Role Based Access Control Policies

46. Integrity Assurance for Outsourced Databases without DBMS Modification

47. Optimizing Integrity Checks for Join Queries in the Cloud

48. Mining Attribute-Based Access Control Policies from Logs

49. GreenBrowsing: Towards Energy Efficiency in Browsing Experience

50. Scalable and Accurate Causality Tracking for Eventually Consistent Stores

Catalog

Books, media, physical & digital resources