The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Security & Privacy
2003, volume: 1, number: 2

  1. George Cybenko
    From the Editor: Sapphire/Slammer Redux. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:6- [Journal]

  2. Letters to the Editor. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:7-10 [Journal]
  3. Daniel P. Dern
    Privacy Concerns. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:11-13 [Journal]
  4. Lance Spitzner
    The Honeynet Project: Trapping the Hackers. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:15-23 [Journal]
  5. Matt Blaze
    Rights Amplification in Master-Keyed Mechanical Locks. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:24-32 [Journal]
  6. Salil Prabhakar, Sharath Pankanti, Anil K. Jain
    Biometric Recognition: Security and Privacy Concerns. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:33-42 [Journal]
  7. William E. Burr
    Selecting the Advanced Encryption Standard. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:43-52 [Journal]
  8. Marc Donner
    Post-Apocalypse Now. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:53-55 [Journal]
  9. Jim Davis, Melissa Dark
    Teaching Students to Design Secure Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:56-58 [Journal]
  10. Gary McGraw
    From the Ground Up: The DIMACS Software Security Workshop. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:59-66 [Journal]
  11. Michael Lesk
    Copyright Enforcement or Censorship: New Uses for the DMCA? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:67-69 [Journal]
  12. Jim Hearn
    Moving Forward? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:70-71 [Journal]
  13. Ivan Arce
    The Weakest Link Revisited. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:72-76 [Journal]
  14. Edward Ball, David W. Chadwick, Darren P. Mundy
    Patient Privacy in Electronic Prescription Transfer. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:77-80 [Journal]
  15. James A. Whittaker
    Why Secure Applications are Difficult to Write. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:81-83 [Journal]
  16. Michael Caloyannides
    Engineering or Sloganeering? The Counterattack on Privacy. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:84-87 [Journal]
  17. Bruce Schneier
    Locks and Full Disclosure. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:88- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002