![]() | ![]() |
1999 | ||
---|---|---|
2 | EE | Winn Schwartau: Surviving denial of service. Computers & Security 18(2): 124-133 (1999) |
1998 | ||
1 | EE | Winn Schwartau: Time-based security explained: Provable security models and formulas for the practitioner and vendor. Computers & Security 17(8): 693-714 (1998) |