The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Security & Privacy
2005, volume: 3, number: 2

  1. Marc Donner
    What's in a Name? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:4-5 [Journal]
  2. Benjamin Alfonsi
    FBI's Virtual Case File Living in Limbo. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:7- [Journal]
  3. Eric Goetz, Garrett Jones, Brent Kesler
    News Briefs. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:8-10 [Journal]
  4. Stephen A. Weiss
    Crypto 2004. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:11-13 [Journal]
  5. Roy Iverson
    A Framework to Consider. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:14- [Journal]
  6. Rolf Oppliger, Ruedi Rytz
    Does Trusted Computing Remedy Computer Security Problems? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:16-19 [Journal]
  7. Alexander Iliev, Sean W. Smith
    Protecting Client Privacy with Trusted Computing at the Server. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:20-28 [Journal]
  8. Dawn N. Jutla, Peter Bodorik
    Sociotechnical Architecture for Online Privacy. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:29-39 [Journal]
  9. Shari Lawrence Pfleeger, Gabrielle Bloom
    Canning Spam: Proposed Solutions to Unwanted Email. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:40-47 [Journal]
  10. Ronald Dodge, Daniel Ragsdale
    Technology Education at the US Military Academy. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:49-53 [Journal]
  11. Roy A. Maxion, Rachel R. M. Roberts
    Methodological Foundations: Enabling the Next Generation of Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:54-57 [Journal]
  12. Peter Oehlert
    Violating Assumptions with Fuzzing. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:58-62 [Journal]
  13. Elias Levy
    Worm Propagation and Generic Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:63-65 [Journal]
  14. Sean W. Smith
    Turing is from Mars, Shannon is from Venus: Computer Science and Computer Engineering. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:66-69 [Journal]
  15. E. Michael Power, Roland L. Trope
    Averting Security Missteps in Outsourcing. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:70-73 [Journal]
  16. Sean Barnum, Gary McGraw
    Knowledge for Software Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:74-78 [Journal]
  17. Daniel E. Geer Jr.
    The Problem Statement is the Problem. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:80- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002