2004 |
9 | EE | Warren Harrison,
George Heuston,
Sarah Mocas,
Mark Morrissey,
John Richardson:
High-tech forensics.
Commun. ACM 47(7): 49-52 (2004) |
8 | EE | Sarah Mocas:
Building theoretical underpinnings for digital forensics research.
Digital Investigation 1(1): 61-68 (2004) |
2002 |
7 | EE | Warren Harrison,
George Heuston,
Mark Morrissey,
David Aucsmith,
Sarah Mocas,
Steve Russelle:
A Lessons Learned Repository for Computer Forensics.
IJDE 1(3): (2002) |
1996 |
6 | EE | Sarah Mocas:
Separating Classes in the Exponential-Time Hierarchy From Classes in PH.
Theor. Comput. Sci. 158(1&2): 221-231 (1996) |
1995 |
5 | | Steven Homer,
Sarah Mocas:
Nonuniform Lower Bounds for Exponential Time Classes.
MFCS 1995: 159-168 |
4 | | E. Thomas Schubert,
Sarah Mocas:
A Mechanized Logic for Secure Key Escrow Protocol Verification.
TPHOLs 1995: 308-323 |
1994 |
3 | | Sarah Mocas:
Using Bounded Query Classes to Separate Classes in the Exponential Time Hierarchy from Classes in PH.
Structure in Complexity Theory Conference 1994: 53-58 |
1993 |
2 | | Luc Longpré,
Sarah Mocas:
Symmetry of Information and One-Way Functions.
Inf. Process. Lett. 46(2): 95-100 (1993) |
1991 |
1 | | Luc Longpré,
Sarah Mocas:
Symmetry of Information and One-Way Functions.
ISA 1991: 308-315 |