Search results for: Indrakshi Ray
Lecture Notes in Computer Science > Computer Security - ESORICS 2008 > Session 8: Information Flow and Non-transferability > 349-363
Lecture Notes in Computer Science > Computer Security - ESORICS 2008 > Session 8: Information Flow and Non-transferability > 349-363