Amanote Research
Register
Sign In
Explicit Authentication Response Considered Harmful
doi 10.1145/2535813.2535822
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 2013
Authors
Lianying Zhao
Mohammad Mannan
Publisher
ACM Press
Related search
Color Figures Considered Harmful
Software Testing Verification and Reliability
Media Technology
Risk
Reliability
Safety
Quality
Software
Consistent Hashing Considered Harmful
Distributed Development Considered Harmful?
Hash Tables Considered Harmful
International Journal of Recent Technology and Engineering
Engineering
Management of Technology
Innovation
Semantically Far Inspirations Considered Harmful?
Ambient Assistive Technology Considered Harmful
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Right to an Explanation Considered Harmful
SSRN Electronic Journal
Lack of Priority Queuing Considered Harmful
Queue
Computer Science
Partially Overlapped Channels Not Considered Harmful
Performance Evaluation Review
Hardware
Computer Networks
Software
Architecture
Communications