Login / Signup

Securing information flow via dynamic capture of dependencies.

Paritosh ShroffScott F. SmithMark Thober
Published in: J. Comput. Secur. (2008)
Keyphrases