-
1
-
-
84937257562
-
Economies and Security in Statecraft and Scholarship
-
Mastanduno, M.: Economies and Security in Statecraft and Scholarship. International Organization 52(4) (1998)
-
(1998)
International Organization
, vol.52
, Issue.4
-
-
Mastanduno, M.1
-
2
-
-
0028532579
-
Why Cryptosystems Fail
-
Anderson, R.J.: Why Cryptosystems Fail. Communications of the ACM 37(11), 32-40 (1994)
-
(1994)
Communications of the ACM
, vol.37
, Issue.11
, pp. 32-40
-
-
Anderson, R.J.1
-
3
-
-
38149018804
-
-
Ayres, I., Levitt, S.: Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack, NBER Working Paper no W5928; also in The Quarterly Journal of Economics. 113, 43-77
-
Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack, NBER Working Paper no W5928; also in The Quarterly Journal of Economics
, vol.113
, pp. 43-77
-
-
Ayres, I.1
Levitt, S.2
-
5
-
-
38149082970
-
-
Economic Science Column, The New York Times June 1
-
Varian, H.: Managing Online Security Risks, Economic Science Column, The New York Times (June 1, 2000)
-
(2000)
Managing Online Security Risks
-
-
Varian, H.1
-
6
-
-
38149070498
-
-
Böhm, N., Brown, I., Gladman, B.: Electronic Commerce: Who Carries the Risk of Fraud? Journal of Information, Law and Technology 3 (2000)
-
(2000)
Electronic Commerce: Who Carries the Risk of Fraud? Journal of Information, Law and Technology
, vol.3
-
-
Böhm, N.1
Brown, I.2
Gladman, B.3
-
7
-
-
79953844957
-
Closing the Phishing Hole - Fraud, Risk and Nonbanks
-
Santa Fe May
-
Anderson, R. J.: Closing the Phishing Hole - Fraud, Risk and Nonbanks. In: Nonbanks in the Payment System, Santa Fe (May 2007)
-
(2007)
Nonbanks in the Payment System
-
-
Anderson, R.J.1
-
9
-
-
0001495881
-
The Eternity Service
-
Anderson, R.J.: The Eternity Service. In: Pragocrypt 96 (1996)
-
(1996)
Pragocrypt
, vol.96
-
-
Anderson, R.J.1
-
10
-
-
14744271851
-
The Economics of Resisting Censorship
-
Danezis, G., Anderson, R.J.: The Economics of Resisting Censorship. IEEE Security & Privacy 3(1), 45-50 (2005)
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.1
, pp. 45-50
-
-
Danezis, G.1
Anderson, R.J.2
-
11
-
-
38149020963
-
-
Goodhart, D.: Too Diverse? In: Prospect (February 2004) at http://www.guardian.co.uk/race/story/0,11374,1154684,00.html
-
Goodhart, D.: Too Diverse? In: Prospect (February 2004) at http://www.guardian.co.uk/race/story/0,11374,1154684,00.html
-
-
-
-
12
-
-
84925838576
-
-
Anderson, R.J.: Why Information Security is Hard - An Economic Perspective. In: 17th Annual Computer Security Applications Conference, December 2001 (2001), and at http://www.cl.cam.ac.uk/users/rjal4/Papers/econ.pdf
-
Anderson, R.J.: Why Information Security is Hard - An Economic Perspective. In: 17th Annual Computer Security Applications Conference, December 2001 (2001), and at http://www.cl.cam.ac.uk/users/rjal4/Papers/econ.pdf
-
-
-
-
13
-
-
0000071449
-
From weakest-link to best-shot: The voluntary provision of public goods
-
Hirshleifer, J.: From weakest-link to best-shot: the voluntary provision of public goods. Public Choice 41, 371-386 (1983)
-
(1983)
Public Choice
, vol.41
, pp. 371-386
-
-
Hirshleifer, J.1
-
14
-
-
33750482906
-
System Reliability and Free Riding
-
Kluwer, Dordrecht
-
Varian, H.: System Reliability and Free Riding. In: Economics of Information Security, pp. 1-15. Kluwer, Dordrecht (2004)
-
(2004)
Economics of Information Security
, pp. 1-15
-
-
Varian, H.1
-
16
-
-
85020616309
-
Network Externalities, Competition, and Compatibility
-
Katz, M., Shapiro, C.: Network Externalities, Competition, and Compatibility. The American Economic Review 75(3), 424-440 (1985)
-
(1985)
The American Economic Review
, vol.75
, Issue.3
, pp. 424-440
-
-
Katz, M.1
Shapiro, C.2
-
17
-
-
82755164747
-
Bootstrapping the Adoption of Internet Security Protocols
-
Cambridge, UK, June 26-28
-
Ozment, J.A., Schechter, S.E.: Bootstrapping the Adoption of Internet Security Protocols. In: Fifth Workshop on the Economics of Information Security, Cambridge, UK, June 26-28,
-
Fifth Workshop on the Economics of Information Security
-
-
Ozment, J.A.1
Schechter, S.E.2
-
18
-
-
38149114332
-
-
Anderson, R.J.: Open and Closed Systems are Equivalent (that is, in an ideal world. In: Perspectives on Free and Open Source Software, pp. 127-142. MIT Press, Cambridge (2005)
-
Anderson, R.J.: Open and Closed Systems are Equivalent (that is, in an ideal world. In: Perspectives on Free and Open Source Software, pp. 127-142. MIT Press, Cambridge (2005)
-
-
-
-
19
-
-
38149095281
-
-
Rescorla, E.: Is Finding Security Holes a Good Idea? In: Third Workshop on the Economics of Information Security (2004)
-
Rescorla, E.: Is Finding Security Holes a Good Idea? In: Third Workshop on the Economics of Information Security (2004)
-
-
-
-
20
-
-
67650336989
-
The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting
-
Ozment, J.A.: The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting. In: Fourth Workshop on the Economics of Information Security (2005)
-
(2005)
Fourth Workshop on the Economics of Information Security
-
-
Ozment, J.A.1
-
22
-
-
33646141892
-
Optimal Policy for Software Vulnerability Disclosure
-
Minneapolis, MN, May
-
Arora, A., Telang, R., Xu, H.: Optimal Policy for Software Vulnerability Disclosure. In: Third Workshop on the Economics of Information Security, Minneapolis, MN, May 2004 (2004)
-
(2004)
Third Workshop on the Economics of Information Security
-
-
Arora, A.1
Telang, R.2
Xu, H.3
-
23
-
-
38149097274
-
Impact of Vulnerability Disclosure and Patch Availability - An Empirical Analysis
-
Arora, A., Krishnan, R., Nandkumar, A., Telang, R., Yang, Y.: Impact of Vulnerability Disclosure and Patch Availability - An Empirical Analysis. In: Third Workshop on the Economics of Information Security (2004)
-
(2004)
Third Workshop on the Economics of Information Security
-
-
Arora, A.1
Krishnan, R.2
Nandkumar, A.3
Telang, R.4
Yang, Y.5
-
24
-
-
0024105910
-
A Field Study of the Software Design Process for Large Systems
-
Curtis, B., Krasner, H., Iscoe, N.: A Field Study of the Software Design Process for Large Systems. Communications of the ACM 31(11), 1268-1287 (1988)
-
(1988)
Communications of the ACM
, vol.31
, Issue.11
, pp. 1268-1287
-
-
Curtis, B.1
Krasner, H.2
Iscoe, N.3
-
26
-
-
85005305538
-
The Market for 'Lemons: Quality Uncertainty and the Market Mechanism
-
Akerlof, G.: The Market for 'Lemons: Quality Uncertainty and the Market Mechanism. The Quarterly Journal of Economics 84(3), 488-500 (1970)
-
(1970)
The Quarterly Journal of Economics
, vol.84
, Issue.3
, pp. 488-500
-
-
Akerlof, G.1
-
31
-
-
33746613622
-
A Comparison of Market Approaches to Software Vulnerability Disclosure
-
Müller, G, ed, ETRICS 2006, Springer, Heidelberg
-
Böhme, R.: A Comparison of Market Approaches to Software Vulnerability Disclosure. In: Müller, G. (ed.) ETRICS 2006. LNCS, vol. 3995, pp. 298-311. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3995
, pp. 298-311
-
-
Böhme, R.1
-
35
-
-
0038086632
-
An Economic Theory of Privacy
-
Posner, R.: An Economic Theory of Privacy. Regulation, 19-26 (1978)
-
(1978)
Regulation
, vol.19-26
-
-
Posner, R.1
-
36
-
-
84938052547
-
Privacy, Secrecy and Reputation
-
Posner, R.: Privacy, Secrecy and Reputation. Buffalo Law Review 28(1) (1979)
-
(1979)
Buffalo Law Review
, vol.28
, Issue.1
-
-
Posner, R.1
-
37
-
-
0013229314
-
Privacy: Its Origin, Function and Future
-
Hirshleifer, J.: Privacy: its Origin, Function and Future. Journal of Legal Studies 9, 649-664 (1980)
-
(1980)
Journal of Legal Studies
, vol.9
, pp. 649-664
-
-
Hirshleifer, J.1
-
38
-
-
1142268291
-
Economic Apects of Personal Privacy
-
National Telecommunications and Information Administration report
-
Varian, H.: Economic Apects of Personal Privacy. In: Privacy and Self-Regulation in the Information Age, National Telecommunications and Information Administration report (1996)
-
(1996)
Privacy and Self-Regulation in the Information Age
-
-
Varian, H.1
-
40
-
-
14744280530
-
Conditioning Prices on Purchase History
-
Acquisti, A., Varian, H.: Conditioning Prices on Purchase History. Marketing Science 24(3) (2005)
-
(2005)
Marketing Science
, vol.24
, Issue.3
-
-
Acquisti, A.1
Varian, H.2
-
42
-
-
14744272698
-
Why we can't be bothered to read privacy policies
-
Kluwer, Dordrecht
-
Vila, T., Greenstadt, R., Moinar, D.: Why we can't be bothered to read privacy policies. In: Economics of Information Security, pp. 143-154. Kluwer, Dordrecht (2004)
-
(2004)
Economics of Information Security
, pp. 143-154
-
-
Vila, T.1
Greenstadt, R.2
Moinar, D.3
-
43
-
-
33645241822
-
Efficient Confidentiality for Privacy, Security, and Confidential Business Information. Brookings-Wharton
-
Papers on Financial Services Brookings
-
Swire, P.: Efficient Confidentiality for Privacy, Security, and Confidential Business Information. Brookings-Wharton Papers on Financial Services Brookings (2003)
-
(2003)
-
-
Swire, P.1
-
44
-
-
0037599474
-
The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
-
Campbell, K., Gordon, L.A., Loeb, M., Zhou, L.: The economic cost of publicly announced information security breaches: empirical evidence from the stock market. Journal of Computer Security 11(3), 431-448 (2003)
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 431-448
-
-
Campbell, K.1
Gordon, L.A.2
Loeb, M.3
Zhou, L.4
-
47
-
-
14744270031
-
The Demographics of the Do-Not-Call List
-
Varian, H., Wallenberg, F., Woroch, G.: The Demographics of the Do-Not-Call List. IEEE Security & Privacy 3(1), 34-39 (2005)
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.1
, pp. 34-39
-
-
Varian, H.1
Wallenberg, F.2
Woroch, G.3
-
49
-
-
38149025851
-
-
http://tor.eff.org
-
-
-
-
50
-
-
0346256488
-
New chips and keep a tight rein on consumers, even after they buy a product
-
July 4
-
Varian, H.: New chips and keep a tight rein on consumers, even after they buy a product. New York Times (July 4, 2002)
-
(2002)
New York Times
-
-
Varian, H.1
-
52
-
-
33749179451
-
Open Source Software Projects as User Innovation Networks
-
Toulouse
-
von Hippel, E.: Open Source Software Projects as User Innovation Networks. Open Source Software Economics (Toulouse) (2002)
-
(2002)
Open Source Software Economics
-
-
von Hippel, E.1
-
53
-
-
12344337862
-
Security and Lock-In: The Case of the U.S. Cable Industry
-
Kluwer, Dordrecht
-
Lookabaugh, T., Sicker, D.: Security and Lock-In: The Case of the U.S. Cable Industry. In: Workshop on the Economics of Information Security, also in Economics of Information Security. Advances in Information Security, vol. 12, pp. 225-246. Kluwer, Dordrecht (2003)
-
(2003)
Workshop on the Economics of Information Security, also in Economics of Information Security. Advances in Information Security
, vol.12
, pp. 225-246
-
-
Lookabaugh, T.1
Sicker, D.2
-
56
-
-
76749149151
-
The Economics of Spam
-
Cobb, S.: The Economics of Spam. ePrivacy Group (2003), http://www.spamhelp.org/articles/economics_of_spam.pdf
-
(2003)
ePrivacy Group
-
-
Cobb, S.1
-
59
-
-
18144409187
-
Selfish Behavior and Stability of the Internet: A Game-Theoretic Analysis of TCP
-
Akella, A., Seshan, S., Karp, R., Shenker, S., Papadimitriou, C.: Selfish Behavior and Stability of the Internet: A Game-Theoretic Analysis of TCP. ACM SIGCOMM, 117-130
-
ACM SIGCOMM
, pp. 117-130
-
-
Akella, A.1
Seshan, S.2
Karp, R.3
Shenker, S.4
Papadimitriou, C.5
-
60
-
-
84864657941
-
Worst-case equilibria
-
Meinel, C, Tison, S, eds, STACS, 1563, pp, Springer, Heidelberg
-
Koutsoupias, E., Papadimitriou, C.: Worst-case equilibria. In: Meinel, C., Tison, S. (eds.) STACS 99. LNCS, vol. 1563, pp. 387-396. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.99
, pp. 387-396
-
-
Koutsoupias, E.1
Papadimitriou, C.2
-
62
-
-
1142293089
-
On a network creation game
-
Fabrikant, A., Luthra, A., Maneva, E., Papadimitriou, C, Shenker, S.: On a network creation game. In: 22nd PODC, pp. 347-351 (2003)
-
(2003)
22nd PODC
, pp. 347-351
-
-
Fabrikant, A.1
Luthra, A.2
Maneva, E.3
Papadimitriou, C.4
Shenker, S.5
-
63
-
-
0037770004
-
Near-optimal network design with selfish agents
-
Anshelevich, E., Dasgupta, A., Tardos, E., Wexler, T.: Near-optimal network design with selfish agents. In: 35th STOC, pp. 511-520(2003)
-
(2003)
35th STOC
, pp. 511-520
-
-
Anshelevich, E.1
Dasgupta, A.2
Tardos, E.3
Wexler, T.4
-
64
-
-
17744366213
-
The price of stability for network design with fair cost allocation
-
Anshelevich, E., Dasgupta, A., Kleinberg, J., Tardos, E., Wexler, T., Roughgarden, T.: The price of stability for network design with fair cost allocation. In: 45th FOCS, pp. 295-304 (2004)
-
(2004)
45th FOCS
, pp. 295-304
-
-
Anshelevich, E.1
Dasgupta, A.2
Kleinberg, J.3
Tardos, E.4
Wexler, T.5
Roughgarden, T.6
-
65
-
-
10444254599
-
On spectrum sharing games
-
Halldórsson, M.M., Halpern, J., Li, L., Mirrokni, V.: On spectrum sharing games. In: 23rd PODC, pp. 107-114 (2004)
-
(2004)
23rd PODC
, pp. 107-114
-
-
Halldórsson, M.M.1
Halpern, J.2
Li, L.3
Mirrokni, V.4
-
66
-
-
20744452623
-
Inoculation strategies for victims of viruses and the sum-of-squares partition problem
-
Aspnes, J., Chang, K., Yampolskiy, A.: Inoculation strategies for victims of viruses and the sum-of-squares partition problem. In: 16th ACM-SIAM Symposium on Discrete Algorithms, pp. 43-52 (2005)
-
(2005)
16th ACM-SIAM Symposium on Discrete Algorithms
, pp. 43-52
-
-
Aspnes, J.1
Chang, K.2
Yampolskiy, A.3
-
67
-
-
84943235829
-
Pricing via processing or combatting junk mail
-
Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Crypto 92, pp. 139-147.
-
Crypto
, vol.92
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
70
-
-
3242802867
-
Robust Incentive Techniques for Peerto-Peer Networks
-
Feldman, M., Lai, K., Stoica, I., Chuang, J.: Robust Incentive Techniques for Peerto-Peer Networks. In: Fifth ACM Conference on Electronic Commerce (2004)
-
(2004)
Fifth ACM Conference on Electronic Commerce
-
-
Feldman, M.1
Lai, K.2
Stoica, I.3
Chuang, J.4
-
71
-
-
0011921476
-
Analyzing the economic efficiency of eBay-like online reputation mechanisms
-
Dellarocas, C.: Analyzing the economic efficiency of eBay-like online reputation mechanisms. In: Third ACM Conference on Electronic Commerce (2001)
-
(2001)
Third ACM Conference on Electronic Commerce
-
-
Dellarocas, C.1
-
73
-
-
38149003294
-
Improving Information Flow in the Information Security Market
-
Kluwer, Dordrecht
-
Landwehr, C.: Improving Information Flow in the Information Security Market. In: Economics of Information Security, pp. 155-164. Kluwer, Dordrecht (2004)
-
(2004)
Economics of Information Security
, pp. 155-164
-
-
Landwehr, C.1
-
75
-
-
38149121792
-
-
European Commission proposal for a Council framework decision on attacks against information systems April 2002
-
European Commission proposal for a Council framework decision on attacks against information systems (April 2002)
-
-
-
-
76
-
-
38149018803
-
-
German Federal Government's Comments on the TCG and NGSCB in the Field of Trusted Computing , at
-
German Federal Government's Comments on the TCG and NGSCB in the Field of Trusted Computing (2004), at http://www.bsi.bund.de/sichere_plattformen/ index.htm
-
(2004)
-
-
-
77
-
-
11144344876
-
Deworming the Internet
-
Barnes, D.: Deworming the Internet. Texas Law Journal 83(279), 279-329 (2004)
-
(2004)
Texas Law Journal
, vol.83
, Issue.279
, pp. 279-329
-
-
Barnes, D.1
-
80
-
-
72249120536
-
The Economic Impact of Regulatory Information Disclosure on Information Security Investments, Competition, and Social Welfare
-
Ghose, A., Rajan, U.: The Economic Impact of Regulatory Information Disclosure on Information Security Investments, Competition, and Social Welfare. In: Fifth Workshop on the Economics of Information Security (2006)
-
(2006)
Fifth Workshop on the Economics of Information Security
-
-
Ghose, A.1
Rajan, U.2
-
82
-
-
78249276668
-
-
LISA
-
Beattie, S., Arnold, S., Cowan, C., Wagle, P., Wright, C., Shostack, A.: Timing the Application of Security Patches for Optimal Uptime. In: LISA 2002, pp. 233-242 (2002)
-
(2002)
Timing the Application of Security Patches for Optimal Uptime
, pp. 233-242
-
-
Beattie, S.1
Arnold, S.2
Cowan, C.3
Wagle, P.4
Wright, C.5
Shostack, A.6
-
83
-
-
71249108731
-
Competitive and Strategic Effects in the Timing of Patch Release
-
Arora, A., Forman, C., Nandkumar, A., Telang, R.: Competitive and Strategic Effects in the Timing of Patch Release. In: Fifth Workshop on the Economics of Information Security (2006)
-
(2006)
Fifth Workshop on the Economics of Information Security
-
-
Arora, A.1
Forman, C.2
Nandkumar, A.3
Telang, R.4
-
84
-
-
30344462995
-
Economic Consequences of Sharing Security Information
-
Gal-Or, E., Ghose, A.: Economic Consequences of Sharing Security Information. In: Information System Research, pp. 186-208 (2005)
-
(2005)
Information System Research
, pp. 186-208
-
-
Gal-Or, E.1
Ghose, A.2
-
85
-
-
0345386339
-
An Economics Perspective on the Sharing of Information Related to Security Breaches
-
Berkeley, CA, May 16-17
-
Gordon, L.A., Loeb, M., Lucyshyn, W.: An Economics Perspective on the Sharing of Information Related to Security Breaches. In: First Workshop on the Economics of Information Security, Berkeley, CA, May 16-17 2002, pp. 16-17 (2002)
-
(2002)
First Workshop on the Economics of Information Security
, pp. 16-17
-
-
Gordon, L.A.1
Loeb, M.2
Lucyshyn, W.3
-
86
-
-
0032686324
-
-
Nisan, N., Ronen, A.: Algorithmic mechanism design (extended abstract). In: STOC '99, pp. 129-140 (1999)
-
Nisan, N., Ronen, A.: Algorithmic mechanism design (extended abstract). In: STOC '99, pp. 129-140 (1999)
-
-
-
-
87
-
-
38149094607
-
The communication complexity of efficient allocation problems. Draft
-
March 5
-
Nisan, N., Segal, I.: The communication complexity of efficient allocation problems. Draft. Second version (March 5, 2002)
-
(2002)
Second version
-
-
Nisan, N.1
Segal, I.2
-
88
-
-
0036957186
-
-
Feigenbaum, J., Papadimitriou, C., Sami, R., Shenker, S.: A BGP-based mechanism for lowest-cost routing. In: PODC '02, pp. 173-182 (2002)
-
Feigenbaum, J., Papadimitriou, C., Sami, R., Shenker, S.: A BGP-based mechanism for lowest-cost routing. In: PODC '02, pp. 173-182 (2002)
-
-
-
-
89
-
-
11244261310
-
-
Shneidman, J., Parkes, D.C., Massouli, L.: Faithfulness in internet algorithms. In: PINS '04: Proceedings of the ACM SIGCOMM workshop on Practice and theory of Incentives in Networked Systems (2004)
-
Shneidman, J., Parkes, D.C., Massouli, L.: Faithfulness in internet algorithms. In: PINS '04: Proceedings of the ACM SIGCOMM workshop on Practice and theory of Incentives in Networked Systems (2004)
-
-
-
-
90
-
-
0038718854
-
The structure and function of complex networks
-
Newman, M.: The structure and function of complex networks. SIAM Review 45, 167-256
-
SIAM Review
, vol.45
, pp. 167-256
-
-
Newman, M.1
-
91
-
-
84935436950
-
Social osmosis and patterns of crime
-
Sah, R.: Social osmosis and patterns of crime. Journal of Political Economy 99(6), 1272-1295 (1991)
-
(1991)
Journal of Political Economy
, vol.99
, Issue.6
, pp. 1272-1295
-
-
Sah, R.1
-
92
-
-
38149032001
-
Who's, who in crime networks? Wanted - The Key Player
-
Working Paper from Research Institute of Industrial Economics
-
Ballester, C., Calvó-Armengol, A., Zenou, Y.: 'Who's, who in crime networks? Wanted - The Key Player, No 617, Working Paper Series from Research Institute of Industrial Economics
-
Series
, Issue.617
-
-
Ballester, C.1
Calvó-Armengol, A.2
Zenou, Y.3
-
94
-
-
33749392771
-
The economics of social networks
-
CalTech Division of the Humanities and Social Sciences Working Paper 1237
-
Jackson, M.: The economics of social networks. CalTech Division of the Humanities and Social Sciences Working Paper 1237. In: Proceedings of the 9th World Congress of the Econometric Society CUP (2006)
-
(2006)
Proceedings of the 9th World Congress of the Econometric Society CUP
-
-
Jackson, M.1
-
96
-
-
0034721164
-
Error and attack tolerance of complex networks
-
Albert, R., Jeong, H., Barabsi, A.-L.: Error and attack tolerance of complex networks. Nature 406(1), 387-482 (2000)
-
(2000)
Nature
, vol.406
, Issue.1
, pp. 387-482
-
-
Albert, R.1
Jeong, H.2
Barabsi, A.-L.3
-
98
-
-
21144457911
-
A first-principles approach to understanding the internet's router-level topology
-
Li, L., Alderson, D., Willinger, W., Doyle, J.: A first-principles approach to understanding the internet's router-level topology. In: SIGCOMM 2004, pp. 3-14 (2004)
-
(2004)
SIGCOMM 2004
, pp. 3-14
-
-
Li, L.1
Alderson, D.2
Willinger, W.3
Doyle, J.4
-
100
-
-
38149127722
-
-
Harley, J.: keynote talk, Government UK IT Summit, (May 2007)
-
Harley, J.: keynote talk, Government UK IT Summit, (May 2007)
-
-
-
-
104
-
-
38149028724
-
-
cruel. The Courier-Journal
-
Wolfson, A.: A hoax most cruel. The Courier-Journal (2005)
-
(2005)
A hoax most
-
-
Wolfson, A.1
-
106
-
-
38149101297
-
-
Schneier, B.: The Psychology of Security. In: RSA (2007), at http ://www.schneier.com
-
Schneier, B.: The Psychology of Security. In: RSA (2007), at http ://www.schneier.com
-
-
-
-
107
-
-
38149020960
-
If only gay sex caused global warming
-
July 2
-
Gilbert, D.: If only gay sex caused global warming, LA Times (July 2, 2006)
-
(2006)
LA Times
-
-
Gilbert, D.1
|