21 | Add to Reading ListSource URL: dl.dropboxusercontent.comLanguage: English |
---|
22 | Add to Reading ListSource URL: www.iukcougars.comLanguage: English - Date: 2016-04-05 12:19:59
|
---|
23 | Add to Reading ListSource URL: www.cs.cornell.eduLanguage: English - Date: 2008-09-01 17:49:06
|
---|
24 | |
---|
25 | Semantic Validation of BPEL Fragment Compositions Marian Harbach, Tim D¨ornemann, Ernst Juhnke, Bernd Freisleben Department of Mathematics and Computer Science, University of Marburg Hans-Meerwein-Str. 6, DMarburAdd to Reading ListSource URL: www.dcsec.uni-hannover.deLanguage: English - Date: 2011-01-17 08:23:21
|
---|
26 | MARY WHISNER Marian Gould Gallagher Law Library University of Washington School of Law BoxSeattle, WashingtonAdd to Reading ListSource URL: lib.law.washington.eduLanguage: English - Date: 2013-09-24 12:22:17
|
---|
27 | All Our Messages Are Belong to Us: Usable Confidentiality in Social Networks Marian Harbach, Sascha Fahl, Thomas Muders and Matthew Smith Distributed Computing & Security Group Leibniz University of Hannover Hannover, GeAdd to Reading ListSource URL: www.dcsec.uni-hannover.deLanguage: English - Date: 2013-11-11 07:13:41
|
---|
28 | University of Washington Marian Gould Gallagher Law Library East Asian Law Department William H. Gates Hall Room L138 BoxSeattle, WAAdd to Reading ListSource URL: lib.law.washington.eduLanguage: English - Date: 2014-06-30 19:12:38
|
---|
29 | Who’s Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness Marian Harbach, Sascha Fahl, Matthew Smith Usable Security and Privacy Lab Leibniz University Hannover Hannover, GermanyAdd to Reading ListSource URL: www.dcsec.uni-hannover.deLanguage: English - Date: 2014-05-26 07:22:45
|
---|
30 | Marian University October 2013 ThePhoenixAdd to Reading ListSource URL: www.brushwithscience.comLanguage: English - Date: 2013-11-22 15:20:36
|
---|