Search Results

You are looking at 1 - 2 of 2 items for :

  • Information Technology x
Clear All
Open access

Milena Dobreva, Galia Angelova and Gennady Agre

Lead a Horse to Water. - In: Proc. of Joint Conference on Digital Libraries, ACM, New York, 2005, pp. 1-7. 14. Deegan, M., S. Tanner. Digital Futures: Strategies for the Information Age. London, Library Association Publishing, 2002. 15. Rasmussen G. K., G. Petersen. Personas. - In: M. Dobreva, O’Dwyer, A. P. Feliciati, Eds. User Studies in Digital Library Development. London, Facet Publishing, 2012, pp. 105-114. 16. Fox, R. Dramatis Personae. - OCLC Systems & Services: International Digital Library Perspectives, Vol. 30

Open access

Chad Spensky, Jeffrey Stewart, Arkady Yerukhimovich, Richard Shay, Ari Trachtenberg, Rick Housley and Robert K. Cunningham

investigations into the alleged hacking of sim card encryption keys by britain’s government communications headquarters and the U.S. National Security Agency,” 2 2015. [49] J. Zhang, F. Yuan, and Q. Xu, “DeTrust: Defeating hardware trust verification with stealthy implicitly-triggered hardware trojans,” in CCS 2014. [50] S. Wei and M. Potkonjak, “The undetectable and unprovable hardware trojan horse,” in DAC 2013. [51] T. Bray, “Exercising our remote application removal feature,” http://android-developers.blogspot.com/2010