Rüdiger Weis A protocol improvement for High-bandwidth encryption using non-encrypting Smart Cards. [Citation Graph (0, 0)][DBLP] Conference on Information Security Management & Small Systems Security, 1999, pp:1-10 [Conf]
P. H. Samwel, Marcel E. M. Spruit A practical approach to manage data communication security. [Citation Graph (0, 0)][DBLP] Conference on Information Security Management & Small Systems Security, 1999, pp:29-40 [Conf]
Matthew J. Warren, William Hutchinson The Future of Australian & New Zealand Security Standard AS/NZS 4444?. [Citation Graph (0, 0)][DBLP] Conference on Information Security Management & Small Systems Security, 1999, pp:41-50 [Conf]
Werner Olivier, Rossouw von Solms The Effective Utilization of Audit Logs in Information Security Management. [Citation Graph (0, 0)][DBLP] Conference on Information Security Management & Small Systems Security, 1999, pp:51-62 [Conf]
Ann Frisinger, Louise Yngström An approach to standardizing security analysis methods for virtual systems. [Citation Graph (0, 0)][DBLP] Conference on Information Security Management & Small Systems Security, 1999, pp:63-74 [Conf]
Vassilis Prevelakis A Secure Station for Network Monitoring and Control. [Citation Graph (0, 0)][DBLP] Conference on Information Security Management & Small Systems Security, 1999, pp:103-116 [Conf]
Matthem Berry, Andrew Hutchison, Elton Saul Predicting the Performance of Transactional Electronic Commerce Protocols. [Citation Graph (0, 0)][DBLP] Conference on Information Security Management & Small Systems Security, 1999, pp:161-178 [Conf]
Willis H. Ware The Cyber-Posture of the National Information Infrastructure. [Citation Graph (0, 0)][DBLP] Conference on Information Security Management & Small Systems Security, 1999, pp:179-204 [Conf]
Terry Stanley Designing a Secure System for Implementing Chip Cards in the Financial Services Industry. [Citation Graph (0, 0)][DBLP] Conference on Information Security Management & Small Systems Security, 1999, pp:213-220 [Conf]
Stephen Wilson New models for the management of public key infrastructure and root certification authorities. [Citation Graph (0, 0)][DBLP] Conference on Information Security Management & Small Systems Security, 1999, pp:221-230 [Conf]
William J. Caelli A Secure Electronic Commerce Environment: Only with `Smart Cards'. [Citation Graph (0, 0)][DBLP] Conference on Information Security Management & Small Systems Security, 1999, pp:231-242 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP