-
Grier is a
frequent speaker at
computer conferences such as
Black Hat,
ACSAC, and DFRWS. His
research has
appeared in the
Journal of
Digital Investigation...
- "Thirty
Years Later:
Lessons from the
Multics Security Evaluation" (PDF),
ACSAC: 119–126
Karger et Sc****
wrote that
Thompson added this
reference in a...
-
Proceedings of the 30th
Annual Computer Security Applications Conference.
ACSAC '14. New York, NY, USA: ****ociation for
Computing Machinery. pp. 326–335...
-
Proceedings of the 32nd
Annual Conference on
Computer Security Applications.
ACSAC '16: 2016
Annual Computer Security Applications Conference. Los Angeles...
-
Random Number Generation in Software,"
acsac, pp. 129, 19th
Annual Computer Security Applications Conference (
ACSAC '03), 2003 "Fortuna on
Bruce Schneier's...
-
Advances in
Computer Systems Architecture: 11th Asia-Pacific Conference,
ACSAC 2006, Shanghai, China,
September 6-8, 2006, Proceedings. Springer. p. 109...
- (PDF). Proc.
Annual Computer Security Applications Conference. doi:10.1109/
ACSAC.2001.991552.
Archived from the
original on
October 11, 2006.{{cite conference}}:...
- Wheeler,
David A.
Countering Trusting Trust through Diverse Double-Compiling.
ACSAC. "Guix
Further Reduces Bootstrap Seed to 25% — 2020 — Blog — GNU Guix"....
-
Hardening SGX
Enclaves against Cache Attacks with Data
Location Randomization.
ACSAC '19:
Proceedings of the 35th
Annual Computer Security Applications Conference...
-
Proceedings of the 30th
Annual Computer Security Applications Conference.
ACSAC '14. pp. 256–265. doi:10.1145/2664243.2664260. ISBN 9781450330053. S2CID 3619463...