Marc Stiegler

Results: 12



#Item
1Polaris: Usable Virus Protection for Windows Ka-Ping Yee Marc D. Stiegler, Alan H. Karp, Tyler Close  Mark S. Miller

Polaris: Usable Virus Protection for Windows Ka-Ping Yee Marc D. Stiegler, Alan H. Karp, Tyler Close Mark S. Miller

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-06-21 09:58:18
2E Fundamentals… with Donuts Marc Stiegler Visiting Scholar, HP © 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice

E Fundamentals… with Donuts Marc Stiegler Visiting Scholar, HP © 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice

Add to Reading List

Source URL: www.cypherpunks.to

- Date: 2008-03-14 04:36:20
    3E Fundamentals… with Donuts Marc Stiegler Visiting Scholar, HP © 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice

    E Fundamentals… with Donuts Marc Stiegler Visiting Scholar, HP © 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice

    Add to Reading List

    Source URL: www.cypherpunks.to

    Language: English - Date: 2008-03-14 04:36:20
      4BAASNK BY FOCUSED RESEARCH TOPIC 5 MARC STIEGLER AND MARK MILLER

      BAASNK BY FOCUSED RESEARCH TOPIC 5 MARC STIEGLER AND MARK MILLER

      Add to Reading List

      Source URL: www.combex.com

      Language: English - Date: 2005-08-18 16:57:04
      5KrugmanLand by Marc Stiegler Copyright 2014, Marc Stiegler. All rights reserved.

      KrugmanLand by Marc Stiegler Copyright 2014, Marc Stiegler. All rights reserved.

      Add to Reading List

      Source URL: www.skyhunter.com

      Language: English - Date: 2014-01-25 22:24:26
      6Phishing Prevention with Hybrid Authentication/Authorization Marc Stiegler Abstract Phishing is now widely recognized as the number one threat to the enterprise.Two Factor Authentication, the supposed solution to this am

      Phishing Prevention with Hybrid Authentication/Authorization Marc Stiegler Abstract Phishing is now widely recognized as the number one threat to the enterprise.Two Factor Authentication, the supposed solution to this am

      Add to Reading List

      Source URL: skyhunter.com

      Language: English - Date: 2014-01-27 12:48:27
      7Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control by  Mark Samuel Miller

      Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control by Mark Samuel Miller

      Add to Reading List

      Source URL: www.erights.org

      Language: English - Date: 2006-09-01 02:03:44
      8Rich Sharing for the Web Marc Stiegler HP Laboratories HPLKeyword(s): secure cooperation, usable security

      Rich Sharing for the Web Marc Stiegler HP Laboratories HPLKeyword(s): secure cooperation, usable security

      Add to Reading List

      Source URL: www.hpl.hp.com

      Language: English - Date: 2009-07-21 21:46:00
      9Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control by  Mark Samuel Miller

      Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control by Mark Samuel Miller

      Add to Reading List

      Source URL: erights.org

      Language: English - Date: 2006-09-01 02:03:44
      10Polaris: Toward Virus Safe Computing for Windows XP Marc Stiegler, Alan H. Karp, Ka-Ping Yee1, Mark Miller2 Hewlett-Packard Laboratories Palo Alto, California Viruses, those nasty pieces of software that can run when you

      Polaris: Toward Virus Safe Computing for Windows XP Marc Stiegler, Alan H. Karp, Ka-Ping Yee1, Mark Miller2 Hewlett-Packard Laboratories Palo Alto, California Viruses, those nasty pieces of software that can run when you

      Add to Reading List

      Source URL: www.hpl.hp.com

      Language: English - Date: 2004-12-13 10:58:46