|
Journals in DBLP
- Fred B. Schneider
Time Out for Station Identification. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:5, pp:5- [Journal]
Letters to the Editor. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:5, pp:6-7 [Journal]
- Greg Goth
News. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:5, pp:8-11 [Journal]
Protecting Consumers' Private Health Information. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:5, pp:12- [Journal]
- Lorrie Faith Cranor, Simson L. Garfinkel
Guest Editors' Introduction: Secure or Usable? [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:5, pp:16-18 [Journal]
- Dirk Balfanz, Glenn Durfee, Rebecca E. Grinter, Diana K. Smetters
In Search of Usable Security: Five Lessons from the Field. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:5, pp:19-24 [Journal]
- Jeff Jianxin Yan, Alan F. Blackwell, Ross J. Anderson, Alasdair Grant
Password Memorability and Security: Empirical Results. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:5, pp:25-31 [Journal]
- Mike Just
Designing and Evaluating Challenge-Question Systems. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:5, pp:32-39 [Journal]
- Alen Peacock, Xian Ke, Matthew Wilkerson
Typing Patterns: A Key to User Identification. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:5, pp:40-47 [Journal]
- Ka-Ping Yee
Aligning Security and Usability. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:5, pp:48-55 [Journal]
- Marc Donner
Jennifer Government. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:5, pp:57-59 [Journal]
- Deborah A. Frincke, Matt Bishop
Joining the Security Education Community. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:5, pp:61-63 [Journal]
- O. Sami Saydjari
Multilevel Security: Reprise. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:5, pp:64-67 [Journal]
- Mike Andrews, James A. Whittaker
Computer Security. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:5, pp:68-71 [Journal]
- Ivan Arce
The Shellcode Generation. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:5, pp:72-76 [Journal]
- Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky
Honeypot Forensics, Part II: Analyzing the Compromised Host. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:5, pp:77-80 [Journal]
- Gary McGraw, Bruce Potter
Software Security Testing. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:5, pp:81-85 [Journal]
- Michael A. Caloyannides
Speech Privacy Technophobes Need Not Apply. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:5, pp:86-87 [Journal]
- Bruce Schneier
SIMS: Solution, or Part of the Problem? [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:5, pp:88- [Journal]
|