The SCEAS System
Navigation Menu

Conferences in DBLP

Network Security (netsec)
2001 (conf/netsec/2001)

  1. Hideki Sakurada, Yasuyuki Tsukada
    A Role-Based Specification of the SET Payment Transaction Protocol. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:1-15 [Conf]
  2. Sebastiaan H. von Solms, M. V. Kisimov
    Information Security: Mutual Authentication in E-Commerce. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:15-32 [Conf]
  3. Nikos Alexandris, Emmanouil Magkos, Vassilios Chrissikopoulos
    Software-Based Receipt-Freeness in On-Line Elections. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:33-44 [Conf]
  4. Chih-Yin Lin, Tzong-Chen Wu, Jing-Jang Hwang
    ID-Based Structured Mulitsignature Schemes. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:45-60 [Conf]
  5. Marina Pudovkina
    Probabilistic Relations for the Solitaire Keystream Generator. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:61-74 [Conf]
  6. Nathalie Foster, Jeremy Jacob
    Hazard Analysis for Security Protocol Requirements. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:75-92 [Conf]
  7. Vincent Naessens, Bart Vanhaute, Bart De Decker
    Securing RMI Communication. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:93-106 [Conf]
  8. Jan Jürjens
    Secure Java Development with UML. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:107-124 [Conf]
  9. Bart De Win, Bart Vanhaute, Bart De Decker
    Security Through Aspect-Oriented Programming. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:125-138 [Conf]
  10. Aurélien Bonnet, Marc Lobelle
    Extending a Campus Network with Remote Bubbles Using IPsec. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:139-152 [Conf]
  11. Joris Claessens, Bart Preneel, Joos Vandewalle
    Combining World Wide Web and Wireless Security. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:153-172 [Conf]
  12. Niklas Borselius, Chris J. Mitchell, Aaron Wilson
    On Mobile Agent Based Transactions in Moderately Hostile Environments. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:173-186 [Conf]
  13. Christopher Krügel, Thomas Toth, Engin Kirda
    SPARTA, a Mobile Agent Based Instrusion Detection System. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:187-200 [Conf]
  14. Pieter von Dijken
    Shell's Trust Domain Infrastructure Security Certification. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:201-202 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002