-
1
-
-
51749116452
-
-
Anti-phishing working group
-
Anti-phishing working group. http://www.antiphishing.org.
-
-
-
-
2
-
-
51749122136
-
-
Email service provider coalition
-
Email service provider coalition. http://senderid.espcoalition.org/.
-
-
-
-
5
-
-
0019529857
-
Solution of nonsymmetric linear complementarity problems by iterative methods
-
Jan
-
B. Ahn. Solution of nonsymmetric linear complementarity problems by iterative methods. Journal of Optimization Theory and Applications, 33:175-185, Jan 1981.
-
(1981)
Journal of Optimization Theory and Applications
, vol.33
, pp. 175-185
-
-
Ahn, B.1
-
6
-
-
51749089935
-
Anderson and Tyler Moore. Information security economics - and beyond
-
Technical report
-
Ross Anderson and Tyler Moore. Information security economics - and beyond. Technical report, 2007.
-
(2007)
-
-
Ross1
-
8
-
-
51749105369
-
-
Nicholas Bambos Benjamin Yolken, R. Ann Miura-Ko. Equilibria and free riding in linear influence networks. 2007.
-
Nicholas Bambos Benjamin Yolken, R. Ann Miura-Ko. Equilibria and free riding in linear influence networks. 2007.
-
-
-
-
15
-
-
85009779538
-
The theory of learning in games
-
Working Paper Archive 624, UCLA Department of Economics, December
-
Drew Fudenberg and David K. Levine. The theory of learning in games. Levine's Working Paper Archive 624, UCLA Department of Economics, December 1996.
-
(1996)
Levine's
-
-
Fudenberg, D.1
Levine, D.K.2
-
16
-
-
38949171168
-
-
Apr
-
Andrea Galeotti, Sanjeev Goyal, Matthew O Jackson, Fernando Vega-Redondo, and Leeat Yariv. Network games, Apr 2006.
-
(2006)
Network games
-
-
Galeotti, A.1
Goyal, S.2
Jackson, M.O.3
Vega-Redondo, F.4
Yariv, L.5
-
18
-
-
0004236492
-
-
3rd ed, Johns Hopkins University Press, Baltimore, MD, USA
-
Gene H. Golub and Charles F. Van Loan. Matrix computations (3rd ed.). Johns Hopkins University Press, Baltimore, MD, USA, 1996.
-
(1996)
Matrix computations
-
-
Golub, G.H.1
Van Loan, C.F.2
-
19
-
-
0141915846
-
-
NBER Working Papers 9885, National Bureau of Economic Research, Inc, August, available at
-
Geoffrey Heal and Howard Kunreuther. You only die once: Managing discrete interdependent risks. NBER Working Papers 9885, National Bureau of Economic Research, Inc, August 2003. available at http://ideas.repec. Org/p/nbr/nberwo/9885.html.
-
(2003)
You only die once: Managing discrete interdependent risks
-
-
Heal, G.1
Kunreuther, H.2
-
20
-
-
51749089242
-
-
Microsoft. Sender id. http://www.microsoft.com/mscorp/safety/ technologies/senderid/default.mspx.
-
Microsoft. Sender id
-
-
-
21
-
-
51749087619
-
-
Microsoft. Sender id framework: Protecting brands and enhancing detection of spam, phishing, and zero-day exploits, 2007. http://download. microsoft.com/download/A/6/9/A69ECA9D-6168-467E-9BEE-88358B9ED595/ Sender_ID_White_Paper.pdfx.
-
Microsoft. Sender id framework: Protecting brands and enhancing detection of spam, phishing, and zero-day exploits, 2007. http://download. microsoft.com/download/A/6/9/A69ECA9D-6168-467E-9BEE-88358B9ED595/ Sender_ID_White_Paper.pdfx.
-
-
-
-
22
-
-
33749807798
-
Multi-sweep asynchronous parallel successive overrelaxation for the nonsymmetric linear complementarity problem
-
T. Shiau R. DeLoene, O. Mangasarian. Multi-sweep asynchronous parallel successive overrelaxation for the nonsymmetric linear complementarity problem. Annals of Operations Research, 22:43-54, 1990.
-
(1990)
Annals of Operations Research
, vol.22
, pp. 43-54
-
-
Shiau, T.1
DeLoene, R.2
Mangasarian, O.3
-
23
-
-
84863469085
-
Stronger password authentication using browser extensions
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell. Stronger password authentication using browser extensions. In Proc. Usenix, 2005.
-
(2005)
Proc. Usenix
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.5
-
26
-
-
51749101644
-
-
Ken Y-N. How to hack a quarter of all Japanese web user accounts, 2006. http: //whatjapanthinks.com/2006/08/08/how-to-hack-a-quarter-of-all-Japanese- web-users-accounts/.
-
Ken Y-N. How to hack a quarter of all Japanese web user accounts, 2006. http: //whatjapanthinks.com/2006/08/08/how-to-hack-a-quarter-of-all-Japanese- web-users-accounts/.
-
-
-
|