2005 | ||
---|---|---|
5 | EE | Peter Gutmann, David Naccache, Charles C. Palmer: When Hashes Collide. IEEE Security & Privacy 3(3): 68-71 (2005) |
2004 | ||
4 | EE | Charles C. Palmer: Can We Win the Security Game? IEEE Security & Privacy 2(1): 10-12 (2004) |
2003 | ||
3 | EE | David M. Chess, Charles C. Palmer, Steve R. White: Security in an autonomic computing environment. IBM Systems Journal 42(1): 107-118 (2003) |
2001 | ||
2 | EE | Charles C. Palmer: Ethical hacking. IBM Systems Journal 40(3): 769-780 (2001) |
1994 | ||
1 | Charles C. Palmer, Aaron Kershenbaum: Representing Trees in Genetic Algorithms. International Conference on Evolutionary Computation 1994: 379-384 |
1 | David M. Chess | [3] |
2 | Peter Gutmann | [5] |
3 | Aaron Kershenbaum | [1] |
4 | David Naccache | [5] |
5 | Steve R. White | [3] |