The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Security & Privacy
2003, volume: 1, number: 3

  1. Marc Donner
    Toward a Security Ontology. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:6-7 [Journal]
  2. Greg Goth, Scott L. Andresen
    News. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:8-13 [Journal]
  3. Nancy R. Mead
    Building a Foundation. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:14- [Journal]
  4. Lucila Ishitani, Virgílio A. F. Almeida, Wagner Meira Jr.
    Masks: Bringing Anonymity and Personalization Together. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:18-23 [Journal]
  5. Hassan Aljifri
    IP Traceback: A New Denial-of-Service Deterrent? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:24-31 [Journal]
  6. Niels Provos, Peter Honeyman
    Hide and Seek: An Introduction to Steganography. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:32-44 [Journal]
  7. Václav Matyás Jr., Zdenek Ríha
    Toward Reliable User Authentication through Biometrics. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:45-49 [Journal]
  8. Marc Donner
    Hey, Robot! [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:51-55 [Journal]
  9. Deborah A. Frincke
    Who Watches the Security Educators? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:56-58 [Journal]
  10. Edward W. Felten
    Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:60-62 [Journal]
  11. Michael Lesk
    The Good, the Bad, and the Ugly: What Might Change if We Had Good DRM. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:63-66 [Journal]
  12. Jim Hearn
    Slow Dancing. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:67-68 [Journal]
  13. Elias Levy
    Poisoning the Software Supply Chain. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:70-73 [Journal]
  14. Sean W. Smith
    Humans in the Loop: Human-Computer Interaction and Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:75-79 [Journal]
  15. Martin R. Stytz
    The Case for Software Warranties. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:80-82 [Journal]
  16. Michael A. Caloyannides
    Society Cannot Function Without Privacy. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:84-86 [Journal]
  17. Bruce Schneier
    Guilty Until Proven Innocent? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:88- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002