Charles Palmer
Charles Palmer
Verified email at us.ibm.com
Title
Cited by
Cited by
Year
Vehicle customization, restriction, and data logging
KA Goldman, CC Palmer, ER Palmer
US Patent 6,430,488, 2002
2912002
Using a rules model to improve handling of personally identifiable information
SB Adler, EF Bangerter, NHJ Brown, J Camenisch, AM Gilbert, G Karjoth, ...
US Patent 7,069,427, 2006
2812006
An approach to a problem in network design using genetic algorithms
CC Palmer, A Kershenbaum
Networks 26 (3), 151-163, 1995
2501995
Authenticated electronic coupon issuing and redemption
CC Palmer, ER Palmer, SW Smith
US Patent 6,505,773, 2003
2482003
Representing trees in genetic algorithms
CC Palmer, A Kershenbaum
Proceedings of the First IEEE Conference on Evolutionary Computation. IEEE …, 1994
2261994
Security in an autonomic computing environment
DM Chess, CC Palmer, SR White
IBM Systems Journal 42 (1), 107-118, 2003
1672003
Collaborative server processing of content and meta-information with application to virus checking in a server network
BT Hailpern, PK Malkin, RJ Schloss, SR White, PS Yu, CC Palmer
US Patent 6,275,937, 2001
1302001
Using a privacy agreement framework to improve handling of personally identifiable information
SB Adler, NHJ Brown, AM Gilbert, CC Palmer, M Schnyder, M Waidner
US Patent 7,603,317, 2009
1122009
Ethical hacking
CC Palmer
IBM Systems Journal 40 (3), 769-780, 2001
1022001
Using an object model to improve handling of personally identifiable information
SB Adler, EF Bangerter, KA Bohrer, NHJ Brown, J Camenisch, AM Gilbert, ...
US Patent 7,962,962, 2011
922011
Technical challenges of network anonymity
D Kesdogan, C Palmer
Computer Communications 29 (3), 306-324, 2006
292006
Netbios name authentication
JK Kravitz, CC Palmer
US Patent 4,930,159, 1990
271990
Two algorithms for finding optimal communications spanning trees
CC Palmer, A Kershenbaum
IBM Thomas J. Watson Research Division, 1994
151994
Protecting You [Guest editors' introduction]
MA Sasse, CC Palmer
IEEE Security & Privacy 12 (1), 11-13, 2014
92014
Call in the cyber national guard!
CE Irvine, CC Palmer
IEEE Security & Privacy 8 (1), 56-59, 2010
82010
Helping you protect you
MA Sasse, CC Palmer, M Jakobsson, S Consolvo, R Wash, LJ Camp
IEEE security & privacy 12 (1), 39-42, 2014
52014
Guest Editors' Introduction: Managing Organizational Security
SL Pfleeger, RL Trope, CC Palmer
IEEE Security & Privacy 5 (3), 13-15, 2007
52007
The GILDA LAN Design Tool
CC Palmer, M Naghshineh, JSC Chen
Proceedings of the International Workshop on Modeling, Analysis, and …, 1993
31993
Can we win the security game?
CC Palmer
IEEE Security & Privacy 2 (01), 10-12, 2004
22004
When Hashes Collide
D Naccache, CC Palmer
IEEE Security & Privacy 3 (3), 68-71, 2005
12005
The system can't perform the operation now. Try again later.
Articles 1–20