The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Security & Privacy
2004, volume: 2, number: 5

  1. Fred B. Schneider
    Time Out for Station Identification. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:5- [Journal]

  2. Letters to the Editor. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:6-7 [Journal]
  3. Greg Goth
    News. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:8-11 [Journal]

  4. Protecting Consumers' Private Health Information. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:12- [Journal]
  5. Lorrie Faith Cranor, Simson L. Garfinkel
    Guest Editors' Introduction: Secure or Usable? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:16-18 [Journal]
  6. Dirk Balfanz, Glenn Durfee, Rebecca E. Grinter, Diana K. Smetters
    In Search of Usable Security: Five Lessons from the Field. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:19-24 [Journal]
  7. Jeff Jianxin Yan, Alan F. Blackwell, Ross J. Anderson, Alasdair Grant
    Password Memorability and Security: Empirical Results. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:25-31 [Journal]
  8. Mike Just
    Designing and Evaluating Challenge-Question Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:32-39 [Journal]
  9. Alen Peacock, Xian Ke, Matthew Wilkerson
    Typing Patterns: A Key to User Identification. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:40-47 [Journal]
  10. Ka-Ping Yee
    Aligning Security and Usability. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:48-55 [Journal]
  11. Marc Donner
    Jennifer Government. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:57-59 [Journal]
  12. Deborah A. Frincke, Matt Bishop
    Joining the Security Education Community. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:61-63 [Journal]
  13. O. Sami Saydjari
    Multilevel Security: Reprise. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:64-67 [Journal]
  14. Mike Andrews, James A. Whittaker
    Computer Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:68-71 [Journal]
  15. Ivan Arce
    The Shellcode Generation. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:72-76 [Journal]
  16. Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky
    Honeypot Forensics, Part II: Analyzing the Compromised Host. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:77-80 [Journal]
  17. Gary McGraw, Bruce Potter
    Software Security Testing. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:81-85 [Journal]
  18. Michael A. Caloyannides
    Speech Privacy Technophobes Need Not Apply. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:86-87 [Journal]
  19. Bruce Schneier
    SIMS: Solution, or Part of the Problem? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:88- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002