Author:
Carroll John,Carroll John
Subject
Computer Science Applications,Information Systems,Signal Processing
Reference16 articles.
1. J. D. Babcock, “A brief description of privacy measures in the RUSH time-sharing system,” Proc. AFiPS 1967, sjcc.
2. P. Baran, “On distributed communications: IX. Security, secrecy and taniper-free considerations,” Rand Corp., August 1964.
3. D. F. Booth, “File security for a shared file, remote terminal system,” Conf. on Computers, Queen's University, May 1970.
4. J. M. Carroll, “Bugging the big brains,” Executive, December 1969, 46.
5. J. M. Carroll and P. M. McLellan, “Fast infinite-key privacy transformation for resourcesharing systems,” Proc. AFIPS 1970, FJCC.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Trading off usability and security in user interface design through mental models;Behaviour & Information Technology;2016-12-07
2. Easy entry;ACM SIGOPS Operating Systems Review;1978-07