The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Security & Privacy
2003, volume: 1, number: 6

  1. George Cybenko
    From the Editors: Privacy Is the Issue. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:5-7 [Journal]
  2. Greg Goth, Benjamin Alfonsi
    News. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:8-13 [Journal]
  3. Daniel E. Geer Jr., David Aucsmith, James A. Whittaker
    Monoculture. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:14-19 [Journal]
  4. Simson L. Garfinkel
    Email-Based Identification and Authentication: An Alternative to PKI? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:20-26 [Journal]
  5. Dakshi Agrawal, Dogan Kesdogan
    Measuring Anonymity: The Disclosure Attack. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:27-34 [Journal]
  6. Jean-Marc Seigneur, Christian Damsgaard Jensen
    Privacy Recovery with Disposable Email Addresses. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:35-39 [Journal]
  7. Abdelmounaam Rezgui, Athman Bouguettaya, Mohamed Eltoweissy
    Privacy on the Web: Facts, Challenges, and Solutions. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:40-49 [Journal]
  8. Lorrie Faith Cranor
    P3P: Making Privacy Policies More Useful. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:50-55 [Journal]
  9. John S. Quarterman
    The Ultimate in Instant Gratification. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:56-58 [Journal]
  10. Cynthia E. Irvine
    Teaching Constructive Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:59-61 [Journal]
  11. Jeannette M. Wing
    A Call to Action: Look Beyond the Horizon. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:62-67 [Journal]
  12. Michael Lesk
    Feist and Facts: If Data Is Protected, Will It Be More or Less Available? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:68-70 [Journal]
  13. Elias Levy
    Crossover: Online Pests Plaguing the Offline World. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:71-73 [Journal]
  14. Sean W. Smith, Jothy Rosenberg, Adam Golodner
    A Funny Thing Happened on the Way to the Marketplace. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:74-78 [Journal]
  15. Bill McCarty
    The Honeynet Arms Race. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:79-82 [Journal]

  16. 2003 Annual Index IEEE Security & Privacy Volume 1. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:83-88 [Journal]
  17. Michael A. Caloyannides
    Digital "Evidence" and Reasonable Doubt. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:89-91 [Journal]
  18. Bruce Schneier
    Airplane Hackers. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:92- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002