publications

publications by categories in reversed chronological order. generated by jekyll-scholar.

2014

  1. Protecting You [Guest editors’ introduction]
    M Angela Sasse and Charles C Palmer
    IEEE Security & Privacy, 2014
  2. Preface: cybersecurity for a smarter planet
    Charles C Palmer
    IBM Journal of Research and Development, 2014
  3. Preface: cybersecurity for a smarter planet
    Charles C Palmer
    IBM Journal of Research and Development, 2014
  4. Helping you protect you
    M Angela Sasse, Charles C Palmer, Markus Jakobsson, and 3 more authors
    IEEE Security & Privacy, 2014

2011

  1. Using an object model to improve handling of personally identifiable information
    Steven B Adler, Endre Felix Bangerter, Kathryn Ann Bohrer, and 8 more authors
    Jun 2011
    US Patent 7,962,962
  2. Using an object model to improve handling of personally identifiable information
    Steven B Adler, Endre Felix Bangerter, Kathryn Ann Bohrer, and 8 more authors
    Jun 2011
    US Patent 7,962,962

2010

  1. Call in the cyber national guard!
    Cynthia E Irvine and Charles C Palmer
    IEEE Security & Privacy, Jun 2010
  2. In Memoriam: Paul Karger
    Roger Schell, Steve Lipner, Mary Ellen Zurko, and 4 more authors
    IEEE Security & Privacy, Jun 2010
  3. In Memoriam: Paul Karger
    Roger Schell, Steve Lipner, Mary Ellen Zurko, and 4 more authors
    IEEE Security & Privacy, Jun 2010

2009

  1. Using a privacy agreement framework to improve handling of personally identifiable information
    Steven B Adler, Nigel Howard Julian Brown, Arthur M Gilbert, and 3 more authors
    Oct 2009
    US Patent 7,603,317

2007

  1. Guest Editors’ Introduction: Managing Organizational Security
    Shari Lawrence Pfleeger, Roland L Trope, and Charles C Palmer
    IEEE Security & Privacy, Oct 2007

2006

  1. Technical challenges of network anonymity
    Dogan Kesdogan and Charles Palmer
    Computer Communications, Oct 2006
  2. Using a rules model to improve handling of personally identifiable information
    Steven B Adler, Endre Felix Bangerter, Nigel Howard Julian Brown, and 8 more authors
    Jun 2006
    US Patent 7,069,427
  3. Using a rules model to improve handling of personally identifiable information
    Steven B Adler, Endre Felix Bangerter, Nigel Howard Julian Brown, and 8 more authors
    Jun 2006
    US Patent 7,069,427

2005

  1. When Hashes Collide
    David Naccache and Charles C Palmer
    IEEE Security & Privacy, Jun 2005
  2. When Hashes Collide
    David Naccache and Charles C Palmer
    IEEE Security & Privacy, Jun 2005

2004

  1. Can we win the security game?
    Charles C Palmer
    IEEE Security & Privacy, Jun 2004

2003

  1. The past present and future of network anonymity
    Dogan Kesdogan and C Palmer
    Network Security, Special Issue of Computer Communications Journal, Elsevier, Jun 2003
  2. Security in an autonomic computing environment
    David M Chess, Charles C Palmer, and Steve R White
    IBM Systems journal, Jun 2003
  3. Authenticated electronic coupon issuing and redemption
    Charles Campbell Palmer, Elaine Rivette Palmer, and Sean William Smith
    Jan 2003
    US Patent 6,505,773
  4. Authenticated electronic coupon issuing and redemption
    Charles Campbell Palmer, Elaine Rivette Palmer, and Sean William Smith
    Jan 2003
    US Patent 6,505,773

2002

  1. Vehicle customization, restriction, and data logging
    Kenneth Alan Goldman, Charles Campbell Palmer, and Elaine Rivette Palmer
    Aug 2002
    US Patent 6,430,488

2001

  1. Collaborative server processing of content and meta-information with application to virus checking in a server network
    Brent Tzion Hailpern, Peter Kenneth Malkin, Robert Jeffrey Schloss, and 3 more authors
    Aug 2001
    US Patent 6,275,937
  2. Ethical hacking
    Charles C. Palmer
    IBM Systems Journal, Aug 2001

1995

  1. An approach to a problem in network design using genetic algorithms
    Charles C Palmer and Aaron Kershenbaum
    Networks, Aug 1995

1994

  1. Two algorithms for finding optimal communications spanning trees
    Charles C Palmer and Aaron Kershenbaum
    Aug 1994
  2. Two algorithms for finding optimal communications spanning trees
    Charles C Palmer and Aaron Kershenbaum
    Aug 1994
  3. Representing trees in genetic algorithms
    Charles C Palmer and Aaron Kershenbaum
    In Proceedings of the First IEEE conference on evolutionary computation. IEEE World Congress on Computational Intelligence, Aug 1994
  4. Submitted in Partial Fulfillment of the Requirements for the Degree of DOCTOR OF PHILOSOPHY (Computer Science) at the
    Charles Campbell Palmer
    POLYTECHNIC UNIVERSITY, Aug 1994

1993

  1. The GILDA LAN Design Tool
    Charles Campbell Palmer, Mahmoud Naghshineh, and Jeane S-C Chen
    In Proceedings of the International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, Aug 1993

1991

  1. GILDA: Graphically Interfaced Lan Design Advisor
    Charles C Palmer, Mahmoud Naghshineh, Jeane S-C Chen, and 2 more authors
    In Proceedings of the Second International Conference on Local Communication Systems: LAN and PBX, Palma, Spain, Aug 1991

1990

  1. Netbios name authentication
    Jeffrey K Kravitz and Charles C Palmer
    May 1990
    US Patent 4,930,159
  2. Netbios name authentication
    Jeffrey K Kravitz and Charles C Palmer
    May 1990
    US Patent 4,930,159