Larry Koved

According to our database1, Larry Koved authored at least 23 papers between 1986 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Passive security intelligence to analyze the security risks of mobile/BYOD activities.
IBM J. Res. Dev., 2016

Perceptions of Risk in Mobile Transaction.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

2015
Security and Privacy on the Web [Guest editors' introduction].
IEEE Softw., 2015

Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015.
CoRR, 2015

2014
Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014.
CoRR, 2014

2013
Practical out-of-band authentication for mobile applications.
Proceedings of the Industrial Track of the 14th ACM/IFIP/USENIX International Middleware Conference, 2013

2012
Biometric authentication on a mobile device: a study of user effort, error and task disruption.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2006
The case for analysis preserving language transformation.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2006

2005
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection.
Proceedings of the ECOOP 2005, 2005

2004
Validating structural properties of nested objects.
Proceedings of the Companion to the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2004

SABER: smart analysis based error reduction.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2004

Detecting unwanted synchronization in Java programs.
Proceedings of the IASTED Conference on Software Engineering and Applications, 2004

Enterprise Java security : Building secure J2EE applications.
Addison-Wesley, ISBN: 978-0321118899, 2004

2002
Access rights analysis for Java.
Proceedings of the 2002 ACM SIGPLAN Conference on Object-Oriented Programming Systems, 2002

2001
Security challenges for Enterprise Java in an e-business environment.
IBM Syst. J., 2001

2000
Automatic detection of immutable fields in Java.
Proceedings of the 2000 conference of the Centre for Advanced Studies on Collaborative Research, 2000

1999
User Authentication and Authorization in the Java(tm) Platform.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
The Evolution of Java Security.
IBM Syst. J., 1998

1995
Ubiquitous mail: speech and graphical user interfaces to an integrated voice/e-mail mailbox.
Proceedings of the Human-Computer Interaction, 1995

1993
GROOP: An Object-Oriented Toolkit for Animated 3D Graphics.
Proceedings of the Eighth Annual Conference on Object-Oriented Programming Systems, 1993

1992
Using a Dialog Manager for Real-Time Conferencing.
Proceedings of the CSCW 1992 Tools and Technologies Workshop, 1992

1988
Elements of visual language.
Proceedings of the IEEE Workshop on Visual Languages, 1988

1986
Embedded Menus: Selecting Items in Context.
Commun. ACM, 1986


  Loading...