The SCEAS System
Navigation Menu

Journals in DBLP

Electr. Notes Theor. Comput. Sci.
2006, volume: 142, number:

  1. Maurice H. ter Beek, Fabio Gadducci
    Preface. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:1-3 [Journal]
  2. Jan Münther
    On the Security of Security Software: Invited Position Paper. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:5-10 [Journal]
  3. Giampaolo Bella, Stefano Bistarelli, Simon N. Foley
    Soft Constraints for Security. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:11-29 [Journal]
  4. Jan Jürjens
    Foundations for Designing Secure Architectures. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:31-46 [Journal]
  5. Claudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
    A Web Service Architecture for Enforcing Access Control Policies. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:47-62 [Journal]
  6. Giampaolo Bella, Costantino Pistagna, Salvatore Riccobene
    Distributed Backup through Information Dispersal. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:63-77 [Journal]
  7. Agustina Buccella, Alejandra Cechich, Nieves R. Brisaboa
    A Federated Layer to Integrate Heterogeneous Knowledge. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:79-97 [Journal]
  8. Cas J. F. Cremers
    Compositionality of Security Protocols: A Research Agenda. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:99-110 [Journal]
  9. Lavinia Egidi, Marinella Petrocchi
    Modelling a Secure Agent with Team Automata. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:111-127 [Journal]
  10. Antonio Fariña, Nieves R. Brisaboa, Cristina París, José R. Paramá
    Fast and Flexible Compression for Web Search Engines. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:129-141 [Journal]
  11. Torsten Fink, Manuel Koch, Karl Pauls
    An MDA approach to Access Control Specifications Using MOF and UML Profiles. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:161-179 [Journal]
  12. Kamil Kulesza, Zbigniew Kotulski, Konrad Kulesza
    On Mobile Agents Resistance to Traffic Analysis. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:181-193 [Journal]
  13. Sebastian Nanz, Chris Hankin
    Formal Security Analysis for Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:195-213 [Journal]
  14. Sanjay Rawat, Arun K. Pujari, Ved Prakash Gulati
    On the Use of Singular Value Decomposition for a Fast Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:215-228 [Journal]
  15. Emilio Tuosto, Hugo Torres Vieira
    An Observational Model for Spatial Logics. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:229-254 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002