|
Journals in DBLP
- Sokratis K. Katsikas, Javier Lopez, Günther Pernul
Editorial. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal]
- Nicola Mezzetti
Design and evaluation of a trust-aware naming service. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal]
- Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson
Two models of efficient Mixnet-based receipt-free voting using (threshold) re-encryption. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal]
- Marco Casassa Mont
Handling privacy obligations in enterprises: important aspects and technical approaches. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal]
- Barbara Sprick, Sandra Wortmann
Time dependent trust structures. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal]
- Dongwan Shin, Gail-Joon Ahn
Role-based privilege and trust management. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal]
- Tommaso Cucinotta, Marco Di Natale, David Corcoran
An open middleware for smart cards. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal]
- Ahmed Patel
An automatic computing approach to developing secure, trusted and auditable services for e-business. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal]
- Sokratis K. Katsikas, Javier Lopez, Günther Pernul
Trust, privacy and security in digital business. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal]
|