Journals in DBLP
Marc Donner What's in a Name? [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:2, pp:4-5 [Journal ] Benjamin Alfonsi FBI's Virtual Case File Living in Limbo. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:2, pp:7- [Journal ] Eric Goetz , Garrett Jones , Brent Kesler News Briefs. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:2, pp:8-10 [Journal ] Stephen A. Weiss Crypto 2004. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:2, pp:11-13 [Journal ] Roy Iverson A Framework to Consider. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:2, pp:14- [Journal ] Rolf Oppliger , Ruedi Rytz Does Trusted Computing Remedy Computer Security Problems? [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:2, pp:16-19 [Journal ] Alexander Iliev , Sean W. Smith Protecting Client Privacy with Trusted Computing at the Server. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:2, pp:20-28 [Journal ] Dawn N. Jutla , Peter Bodorik Sociotechnical Architecture for Online Privacy. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:2, pp:29-39 [Journal ] Shari Lawrence Pfleeger , Gabrielle Bloom Canning Spam: Proposed Solutions to Unwanted Email. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:2, pp:40-47 [Journal ] Ronald Dodge , Daniel Ragsdale Technology Education at the US Military Academy. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:2, pp:49-53 [Journal ] Roy A. Maxion , Rachel R. M. Roberts Methodological Foundations: Enabling the Next Generation of Security. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:2, pp:54-57 [Journal ] Peter Oehlert Violating Assumptions with Fuzzing. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:2, pp:58-62 [Journal ] Elias Levy Worm Propagation and Generic Attacks. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:2, pp:63-65 [Journal ] Sean W. Smith Turing is from Mars, Shannon is from Venus: Computer Science and Computer Engineering. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:2, pp:66-69 [Journal ] E. Michael Power , Roland L. Trope Averting Security Missteps in Outsourcing. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:2, pp:70-73 [Journal ] Sean Barnum , Gary McGraw Knowledge for Software Security. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:2, pp:74-78 [Journal ] Daniel E. Geer Jr. The Problem Statement is the Problem. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:2, pp:80- [Journal ]