![]() | ![]() |
1992 | ||
---|---|---|
4 | J. C. Wray: An Analysis of Covert Timing Channels. Journal of Computer Security 1(3-4): 219-232 (1992) | |
1991 | ||
3 | J. C. Wray: An Analysis of Covert Timing Channels. IEEE Symposium on Security and Privacy 1991: 2-7 | |
2 | Paul A. Karger, J. C. Wray: Storage Channels in Disk Arm Optimization. IEEE Symposium on Security and Privacy 1991: 52-63 | |
1989 | ||
1 | J. C. Wray: An Optimization for Information Flow Analysis. CSFW 1989: 105-110 |
1 | Paul A. Karger | [2] |