2006 |
8 | EE | Steven J. Greenwald:
E-Prime for security: a new security paradigm.
NSPW 2006: 87-95 |
2004 |
7 | EE | Steven J. Greenwald,
Kenneth G. Olthoff,
Victor Raskin,
Willibald Ruch:
The user non-acceptance paradigm: INFOSEC's dirty little secret.
NSPW 2004: 35-43 |
2001 |
6 | | Victor Raskin,
Steven J. Greenwald,
Brenda Timmerman,
Darrell M. Kienzle:
Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001
ACM 2001 |
5 | EE | Steven J. Greenwald:
The New Security Paradigms Workshop - boom or bust?: a panel.
NSPW 2001: 107-111 |
1998 |
4 | EE | Lora Kassab,
Steven J. Greenwald:
Towards Formalizing the Java Security Architecture of JDK 1.2.
ESORICS 1998: 191-207 |
3 | EE | Steven J. Greenwald:
Discussion Topic: What is the Old Security Paradigm?
Workshop on New Security Paradigms 1998: 107-118 |
2 | | Ira S. Moskowitz,
Steven J. Greenwald,
Myong H. Kang:
An Analysis of the Timed Z-Channel.
IEEE Transactions on Information Theory 44(7): 3162-3168 (1998) |
1996 |
1 | EE | Ira S. Moskowitz,
Steven J. Greenwald,
Myong H. Kang:
An Analysis of the Timed Z-channel.
IEEE Symposium on Security and Privacy 1996: 2-11 |