Session details: Computer security
Abstract
No abstract available.
Recommendations
Session details: Volume II: Software development, system software & security: computer security track
SAC '14: Proceedings of the 29th Annual ACM Symposium on Applied ComputingSession details: Volume II: Software development, system software and security: Computer security track
SAC '15: Proceedings of the 30th Annual ACM Symposium on Applied ComputingSession details: Security II (Computer and Network Security symposium)
IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Copyright © 2004 Copyright is held by the owner/author(s).
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Published: 01 March 2004
Published in SIGCSE Volume 36, Issue 1
Check for updates
Qualifiers
- Section
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in