Dartmouth logo Dartmouth College Computer Science
Technical Report series
CS home
TR home
TR search TR listserv
By author: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
By number: 2018, 2017, 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007, 2006, 2005, 2004, 2003, 2002, 2001, 2000, 1999, 1998, 1997, 1996, 1995, 1994, 1993, 1992, 1991, 1990, 1989, 1988, 1987, 1986

Author: Matt Bishop

Note that only technical reports are listed here. If you are interested in other papers by this author, check their home page to see if they have other papers listed.

PCS-TR88-136: The Sharing of Rights and Information in a Capability-Based Protection System
PCS-TR88-137: Theft of Information in the Take-Grant Protection Model
PCS-TR88-138: An Application of a Fast Data Encryption Standard Implementation
PCS-TR90-151: Applying the Take-Grant Protection Model
PCS-TR90-152: A Proactive Password Checker
PCS-TR90-153: Administrator's Guide to the Digital Signature Facility "Rover"
PCS-TR91-150: Privacy-Enhanced Electronic Mail
PCS-TR91-154: A Security Analysis of Version 2 of the Network Time Protocol NTP: A Report to the Privacy and Security Research Group
PCS-TR91-156: An Overview of Computer Viruses in a Research Environment
PCS-TR91-158: Implementation Notes on bdes(1)
PCS-TR92-176: Parallel Computer Needs at Dartmouth College
PCS-TR92-182: How to Encrypt /usr/dict/words in About a Second
PCS-TR95-264: Process Migration for Heterogeneous Distributed Systems

Notify me about new tech reports.

Search the technical reports.

To receive paper copy of a report, by mail, send your address and the TR number to reports AT cs.dartmouth.edu

Copyright notice: The documents contained in this server are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

Technical reports collection maintained by David Kotz.