Amanote Research

Amanote Research

    RegisterSign In

Explicit Authentication Response Considered Harmful

doi 10.1145/2535813.2535822
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2013

Authors
Lianying ZhaoMohammad Mannan
Publisher

ACM Press


Related search

Color Figures Considered Harmful

Software Testing Verification and Reliability
Media TechnologyRiskReliabilitySafetyQualitySoftware
2017English

Consistent Hashing Considered Harmful

2016English

Distributed Development Considered Harmful?

2013English

Hash Tables Considered Harmful

International Journal of Recent Technology and Engineering
EngineeringManagement of TechnologyInnovation
2019English

Semantically Far Inspirations Considered Harmful?

2017English

Ambient Assistive Technology Considered Harmful

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Right to an Explanation Considered Harmful

SSRN Electronic Journal
2019English

Lack of Priority Queuing Considered Harmful

Queue
Computer Science
2004English

Partially Overlapped Channels Not Considered Harmful

Performance Evaluation Review
HardwareComputer NetworksSoftwareArchitectureCommunications
2006English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy