Year | DOI | Venue |
---|---|---|
2013 | 10.1007/978-3-642-41717-7_4 | Security Protocols Workshop |
Field | DocType | Citations |
Parity game,Software deployment,Principle of least privilege,Appeal,Application security,Computer security,Computer science,Software,Event loop,Vulnerability | Conference | 0 |
PageRank | References | Authors |
0.34 | 16 | 6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Robert N. M. Watson | 1 | 488 | 36.14 |
Steven J. Murdoch | 2 | 806 | 57.90 |
Khilan Gudka | 3 | 103 | 6.99 |
Jonathan Anderson | 4 | 231 | 14.68 |
Peter G. Neumann | 5 | 633 | 175.98 |
Ben Laurie | 6 | 297 | 14.00 |