Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"University of Texas – Austin" +contributor:("Shmatikov, Vitaly"). Showing records 1 – 14 of 14 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


University of Texas – Austin

1. Jana, Suman. Security and privacy in perceptual computing.

Degree: PhD, Computer Sciences, 2014, University of Texas – Austin

 Perceptual, "context-aware" applications that observe their environment and interact with users via cameras and other sensors are becoming ubiquitous on personal computers, mobile phones, gaming… (more)

Subjects/Keywords: Perceptual computing; Security and privacy; Augmented reality; Least privilege; Privacy transforms; Computer vision

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jana, S. (2014). Security and privacy in perceptual computing. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/25990

Chicago Manual of Style (16th Edition):

Jana, Suman. “Security and privacy in perceptual computing.” 2014. Doctoral Dissertation, University of Texas – Austin. Accessed January 26, 2021. http://hdl.handle.net/2152/25990.

MLA Handbook (7th Edition):

Jana, Suman. “Security and privacy in perceptual computing.” 2014. Web. 26 Jan 2021.

Vancouver:

Jana S. Security and privacy in perceptual computing. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2014. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/2152/25990.

Council of Science Editors:

Jana S. Security and privacy in perceptual computing. [Doctoral Dissertation]. University of Texas – Austin; 2014. Available from: http://hdl.handle.net/2152/25990

2. Narayanan, Arvind, 1981-. Data privacy : the non-interactive setting.

Degree: PhD, Computer Sciences, 2009, University of Texas – Austin

 The Internet has enabled the collection, aggregation and analysis of personal data on a massive scale. It has also enabled the sharing of collected data… (more)

Subjects/Keywords: Internet – Security measures; Data protection; Electronic data interchange; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Narayanan, Arvind, 1. (2009). Data privacy : the non-interactive setting. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/18424

Chicago Manual of Style (16th Edition):

Narayanan, Arvind, 1981-. “Data privacy : the non-interactive setting.” 2009. Doctoral Dissertation, University of Texas – Austin. Accessed January 26, 2021. http://hdl.handle.net/2152/18424.

MLA Handbook (7th Edition):

Narayanan, Arvind, 1981-. “Data privacy : the non-interactive setting.” 2009. Web. 26 Jan 2021.

Vancouver:

Narayanan, Arvind 1. Data privacy : the non-interactive setting. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2009. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/2152/18424.

Council of Science Editors:

Narayanan, Arvind 1. Data privacy : the non-interactive setting. [Doctoral Dissertation]. University of Texas – Austin; 2009. Available from: http://hdl.handle.net/2152/18424


University of Texas – Austin

3. -6848-2988. Exploiting leakage in privacy-protecting systems.

Degree: PhD, Computer science, 2016, University of Texas – Austin

 Conventional systems store data unencrypted. This allows them to easily access and manipulate their data. However, by not protecting their data, these systems are at… (more)

Subjects/Keywords: Security; Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-6848-2988. (2016). Exploiting leakage in privacy-protecting systems. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/45559

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-6848-2988. “Exploiting leakage in privacy-protecting systems.” 2016. Doctoral Dissertation, University of Texas – Austin. Accessed January 26, 2021. http://hdl.handle.net/2152/45559.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-6848-2988. “Exploiting leakage in privacy-protecting systems.” 2016. Web. 26 Jan 2021.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-6848-2988. Exploiting leakage in privacy-protecting systems. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2016. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/2152/45559.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-6848-2988. Exploiting leakage in privacy-protecting systems. [Doctoral Dissertation]. University of Texas – Austin; 2016. Available from: http://hdl.handle.net/2152/45559

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


University of Texas – Austin

4. -7819-4835. Automatic static analysis of software performance.

Degree: PhD, Computer science, 2016, University of Texas – Austin

 Performance is a critical component of software quality. Software performance can have drastic repercussions on an application, frustrating its users, breaking the functionality of its… (more)

Subjects/Keywords: Static analysis; Security; Performance; Program analysis; Denial-of-service; Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-7819-4835. (2016). Automatic static analysis of software performance. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/40279

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-7819-4835. “Automatic static analysis of software performance.” 2016. Doctoral Dissertation, University of Texas – Austin. Accessed January 26, 2021. http://hdl.handle.net/2152/40279.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-7819-4835. “Automatic static analysis of software performance.” 2016. Web. 26 Jan 2021.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-7819-4835. Automatic static analysis of software performance. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2016. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/2152/40279.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-7819-4835. Automatic static analysis of software performance. [Doctoral Dissertation]. University of Texas – Austin; 2016. Available from: http://hdl.handle.net/2152/40279

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


University of Texas – Austin

5. -2587-3671. On the (in)security of service APIs.

Degree: PhD, Computer science, 2015, University of Texas – Austin

 Today's systems abstract the implementation details of common services such as secure client-server communication, access to native device resources (e.g. camera), access to cloud-stored files… (more)

Subjects/Keywords: Web security; Mobile security; Network protocol security; Security vulnerabilities

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-2587-3671. (2015). On the (in)security of service APIs. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/32586

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-2587-3671. “On the (in)security of service APIs.” 2015. Doctoral Dissertation, University of Texas – Austin. Accessed January 26, 2021. http://hdl.handle.net/2152/32586.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-2587-3671. “On the (in)security of service APIs.” 2015. Web. 26 Jan 2021.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-2587-3671. On the (in)security of service APIs. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2015. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/2152/32586.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-2587-3671. On the (in)security of service APIs. [Doctoral Dissertation]. University of Texas – Austin; 2015. Available from: http://hdl.handle.net/2152/32586

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

6. -5937-3237. A new approach to detecting failures in distributed systems.

Degree: PhD, Computer science, 2015, University of Texas – Austin

 Fault-tolerant distributed systems often handle failures in two steps: first, detect the failure and, second, take some recovery action. A common approach to detecting failures… (more)

Subjects/Keywords: Computer science; Fault tolerance; Distributed systems; Failure detection

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-5937-3237. (2015). A new approach to detecting failures in distributed systems. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/31376

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-5937-3237. “A new approach to detecting failures in distributed systems.” 2015. Doctoral Dissertation, University of Texas – Austin. Accessed January 26, 2021. http://hdl.handle.net/2152/31376.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-5937-3237. “A new approach to detecting failures in distributed systems.” 2015. Web. 26 Jan 2021.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-5937-3237. A new approach to detecting failures in distributed systems. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2015. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/2152/31376.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-5937-3237. A new approach to detecting failures in distributed systems. [Doctoral Dissertation]. University of Texas – Austin; 2015. Available from: http://hdl.handle.net/2152/31376

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

7. Goel, Deepak. A CleanRoom approach to bring your own apps.

Degree: MSin Computer Sciences, Computer Science, 2013, University of Texas – Austin

 Today, on mobile devices such as smartphones and tablets, hundreds of thousands of software apps provide useful services to users. Users use these apps to… (more)

Subjects/Keywords: BYOA; BYOD; Differential privacy; Information flow control; Privacy preserving app; Android; App security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Goel, D. (2013). A CleanRoom approach to bring your own apps. (Masters Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/40995

Chicago Manual of Style (16th Edition):

Goel, Deepak. “A CleanRoom approach to bring your own apps.” 2013. Masters Thesis, University of Texas – Austin. Accessed January 26, 2021. http://hdl.handle.net/2152/40995.

MLA Handbook (7th Edition):

Goel, Deepak. “A CleanRoom approach to bring your own apps.” 2013. Web. 26 Jan 2021.

Vancouver:

Goel D. A CleanRoom approach to bring your own apps. [Internet] [Masters thesis]. University of Texas – Austin; 2013. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/2152/40995.

Council of Science Editors:

Goel D. A CleanRoom approach to bring your own apps. [Masters Thesis]. University of Texas – Austin; 2013. Available from: http://hdl.handle.net/2152/40995

8. Son, Sooel. Toward better server-side Web security.

Degree: PhD, Computer Science, 2014, University of Texas – Austin

 Server-side Web applications are constantly exposed to new threats as new technologies emerge. For instance, forced browsing attacks exploit incomplete access-control enforcement to perform security-sensitive… (more)

Subjects/Keywords: Security; Web; PHP; Static analysis; Dynamic analysis; Forced-browsing; SQL/NoSQL injection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Son, S. (2014). Toward better server-side Web security. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/24821

Chicago Manual of Style (16th Edition):

Son, Sooel. “Toward better server-side Web security.” 2014. Doctoral Dissertation, University of Texas – Austin. Accessed January 26, 2021. http://hdl.handle.net/2152/24821.

MLA Handbook (7th Edition):

Son, Sooel. “Toward better server-side Web security.” 2014. Web. 26 Jan 2021.

Vancouver:

Son S. Toward better server-side Web security. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2014. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/2152/24821.

Council of Science Editors:

Son S. Toward better server-side Web security. [Doctoral Dissertation]. University of Texas – Austin; 2014. Available from: http://hdl.handle.net/2152/24821


University of Texas – Austin

9. Brickell, Justin Lee. Privacy-preserving computation for data mining.

Degree: PhD, Computer Sciences, 2009, University of Texas – Austin

 As data mining matures as a field and develops more powerful algorithms for discovering and exploiting patterns in data, the amount of data about individuals… (more)

Subjects/Keywords: Data mining; Privacy preservation; Sanitized data; Cryptographic techniques

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Brickell, J. L. (2009). Privacy-preserving computation for data mining. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/7538

Chicago Manual of Style (16th Edition):

Brickell, Justin Lee. “Privacy-preserving computation for data mining.” 2009. Doctoral Dissertation, University of Texas – Austin. Accessed January 26, 2021. http://hdl.handle.net/2152/7538.

MLA Handbook (7th Edition):

Brickell, Justin Lee. “Privacy-preserving computation for data mining.” 2009. Web. 26 Jan 2021.

Vancouver:

Brickell JL. Privacy-preserving computation for data mining. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2009. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/2152/7538.

Council of Science Editors:

Brickell JL. Privacy-preserving computation for data mining. [Doctoral Dissertation]. University of Texas – Austin; 2009. Available from: http://hdl.handle.net/2152/7538

10. Porter, Donald E. Operating system transactions.

Degree: PhD, Computer Sciences, 2010, University of Texas – Austin

 Applications must be able to synchronize accesses to operating system (OS) resources in order to ensure correctness in the face of concurrency and system failures.… (more)

Subjects/Keywords: Transactions; Operating systems; Concurrency; TxOS; Race conditions; Transactional memory; Lock-free data structures; System transactions; Linked list algorithms; Lock-free algorithm; Lock-free lists

Page 1 Page 2 Page 3 Page 4 Page 5 Sample image Sample image

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Porter, D. E. (2010). Operating system transactions. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/ETD-UT-2010-12-2488

Chicago Manual of Style (16th Edition):

Porter, Donald E. “Operating system transactions.” 2010. Doctoral Dissertation, University of Texas – Austin. Accessed January 26, 2021. http://hdl.handle.net/2152/ETD-UT-2010-12-2488.

MLA Handbook (7th Edition):

Porter, Donald E. “Operating system transactions.” 2010. Web. 26 Jan 2021.

Vancouver:

Porter DE. Operating system transactions. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2010. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/2152/ETD-UT-2010-12-2488.

Council of Science Editors:

Porter DE. Operating system transactions. [Doctoral Dissertation]. University of Texas – Austin; 2010. Available from: http://hdl.handle.net/2152/ETD-UT-2010-12-2488

11. -5508-4043. Platform-level protection for interacting mobile apps.

Degree: PhD, Computer science, 2016, University of Texas – Austin

 In a modern mobile platform, apps are mutually distrustful, but they share the same device and frequently interact with each other. This dissertation shows how… (more)

Subjects/Keywords: Operating systems; Mobile platforms; Security; Confinement

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-5508-4043. (2016). Platform-level protection for interacting mobile apps. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/43721

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-5508-4043. “Platform-level protection for interacting mobile apps.” 2016. Doctoral Dissertation, University of Texas – Austin. Accessed January 26, 2021. http://hdl.handle.net/2152/43721.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-5508-4043. “Platform-level protection for interacting mobile apps.” 2016. Web. 26 Jan 2021.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-5508-4043. Platform-level protection for interacting mobile apps. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2016. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/2152/43721.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-5508-4043. Platform-level protection for interacting mobile apps. [Doctoral Dissertation]. University of Texas – Austin; 2016. Available from: http://hdl.handle.net/2152/43721

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

12. Lewko, Allison Bishop. Functional encryption : new proof techniques and advancing capabilities.

Degree: PhD, Computer Sciences, 2012, University of Texas – Austin

 We develop the dual system encryption methodology to provide fully secure functional encryption systems. We introduce new proof techniques and explore their applications, resulting in… (more)

Subjects/Keywords: Cryptography; Functional encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lewko, A. B. (2012). Functional encryption : new proof techniques and advancing capabilities. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/ETD-UT-2012-05-5374

Chicago Manual of Style (16th Edition):

Lewko, Allison Bishop. “Functional encryption : new proof techniques and advancing capabilities.” 2012. Doctoral Dissertation, University of Texas – Austin. Accessed January 26, 2021. http://hdl.handle.net/2152/ETD-UT-2012-05-5374.

MLA Handbook (7th Edition):

Lewko, Allison Bishop. “Functional encryption : new proof techniques and advancing capabilities.” 2012. Web. 26 Jan 2021.

Vancouver:

Lewko AB. Functional encryption : new proof techniques and advancing capabilities. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2012. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/2152/ETD-UT-2012-05-5374.

Council of Science Editors:

Lewko AB. Functional encryption : new proof techniques and advancing capabilities. [Doctoral Dissertation]. University of Texas – Austin; 2012. Available from: http://hdl.handle.net/2152/ETD-UT-2012-05-5374


University of Texas – Austin

13. Srivastava, Varun. Static analysis for finding security inconsistencies between similar implementations.

Degree: MA, Computer Sciences, 2010, University of Texas – Austin

 The proliferation of distributed, multilayer software services is encouraging a separation of Application Programming Interfaces (APIs) and their implementation, and thus multiple implementations of the… (more)

Subjects/Keywords: Security semantics; Static analysis; Software differences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Srivastava, V. (2010). Static analysis for finding security inconsistencies between similar implementations. (Masters Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/38234

Chicago Manual of Style (16th Edition):

Srivastava, Varun. “Static analysis for finding security inconsistencies between similar implementations.” 2010. Masters Thesis, University of Texas – Austin. Accessed January 26, 2021. http://hdl.handle.net/2152/38234.

MLA Handbook (7th Edition):

Srivastava, Varun. “Static analysis for finding security inconsistencies between similar implementations.” 2010. Web. 26 Jan 2021.

Vancouver:

Srivastava V. Static analysis for finding security inconsistencies between similar implementations. [Internet] [Masters thesis]. University of Texas – Austin; 2010. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/2152/38234.

Council of Science Editors:

Srivastava V. Static analysis for finding security inconsistencies between similar implementations. [Masters Thesis]. University of Texas – Austin; 2010. Available from: http://hdl.handle.net/2152/38234


University of Texas – Austin

14. Roy, Indrajit. Protecting sensitive information from untrusted code.

Degree: PhD, Computer Sciences, 2010, University of Texas – Austin

 As computer systems support more aspects of modern life, from finance to health care, security is becoming increasingly important. However, building secure systems remains a… (more)

Subjects/Keywords: Security; Operating systems; Java virtual machine; Cloud computing; Information flow control; Access control; Differential privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Roy, I. (2010). Protecting sensitive information from untrusted code. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/ETD-UT-2010-08-1951

Chicago Manual of Style (16th Edition):

Roy, Indrajit. “Protecting sensitive information from untrusted code.” 2010. Doctoral Dissertation, University of Texas – Austin. Accessed January 26, 2021. http://hdl.handle.net/2152/ETD-UT-2010-08-1951.

MLA Handbook (7th Edition):

Roy, Indrajit. “Protecting sensitive information from untrusted code.” 2010. Web. 26 Jan 2021.

Vancouver:

Roy I. Protecting sensitive information from untrusted code. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2010. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/2152/ETD-UT-2010-08-1951.

Council of Science Editors:

Roy I. Protecting sensitive information from untrusted code. [Doctoral Dissertation]. University of Texas – Austin; 2010. Available from: http://hdl.handle.net/2152/ETD-UT-2010-08-1951

.