![]() |
| 1992 | ||
|---|---|---|
| 4 | J. C. Wray: An Analysis of Covert Timing Channels. Journal of Computer Security 1(3-4): 219-232 (1992) | |
| 1991 | ||
| 3 | J. C. Wray: An Analysis of Covert Timing Channels. IEEE Symposium on Security and Privacy 1991: 2-7 | |
| 2 | Paul A. Karger, J. C. Wray: Storage Channels in Disk Arm Optimization. IEEE Symposium on Security and Privacy 1991: 52-63 | |
| 1989 | ||
| 1 | J. C. Wray: An Optimization for Information Flow Analysis. CSFW 1989: 105-110 | |
| 1 | Paul A. Karger | [2] |