Complete bibliography

Complete bibliography as a single HTML page

Selection by year

2018 2017 2016 2015 2014 2013 2012 2011 2010
2009 2008 2007 2006 2005 2004 2003 2002 2001
2000 1999 1998 1997 1996 1995 1994 1993 no year

Selection by author

A B C D E F G H I J K L M
N O P Q R S T U V W X Y Z

A Jacob Abbott
B Kevin Benton Omkar Bhide Warigia Bowman
C Kelly Caine L. Jean Camp
D Sanchari Das Jayati Dev Andrew Dingman
Zheng Dong John DUNCAN
G Vaibhav Garg Shakthidhar Gopavaram
H Hilda Hadan Nathaniel Husted
K Timothy Kelley Olivia Kenny DongInn Kim
L Debin Liu
M Pablo Moriano
R Prashanth Rajivan Gianpaolo Russo
S Jonathan Schubauer Joshua Streiff
T Alex Tsow
W Rui Wang
Z Xiaoyong Zhou

Selection by category

Books and proceedings Thesis Articles in journals or book chapters
Conference articles Internal reports Posters and Presentations

Selection by keyword

A B C D E F G H I J K L M
N O P Q R S T U V W X Y Z

2 2FA
A Aging Anonymized Data Authentication
B Broadside Antenna Array
C cluster Crowdsourcing of Security
D Design for Trust
E E-Crime Economics of Information Security
F FNBW Expression
G Gender Online
H Health high performance computing Human-Centered Security
I Information Security Internet Governance IT Governance
M Mental Models
N Net Trust Network Engineering
O OSCAR
P Passwords Peer Production Permission
Phishing Policies Privacy
R Rare Diseases Requirements Reuse
S SDN Security Social Network Privacy
T Taylor Distribution
U Usability User Study




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Sat Mar 23 01:00:07 2019
Author: teamhats.


This document was translated from BibTEX by bibtex2html