Cited By
View all- Hoffmann JUellenbeck SHolz T(2012)SMARTPROXYProceedings of the 9th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment10.1007/978-3-642-37300-8_11(184-203)Online publication date: 26-Jul-2012
- Buccafurri FCaminiti GLax G(2011)Threats to legal electronic storageProceedings of the Second international conference on Electronic government and the information systems perspective10.5555/2033665.2033674(68-77)Online publication date: 29-Aug-2011
- Fang CChang EGates CFranz MMcDermott J(2010)Securing interactive sessions using mobile device through visual channel and visual inspectionProceedings of the 26th Annual Computer Security Applications Conference10.1145/1920261.1920272(69-78)Online publication date: 6-Dec-2010
- Show More Cited By