The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Security & Privacy
2004, volume: 2, number: 2

  1. George Cybenko
    From the Editors: Don't Bring a Knife to a Gunfight. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:5- [Journal]

  2. Letters to the Editor. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:6-7 [Journal]
  3. Martin R. Stytz
    Book Reviews. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:8- [Journal]
  4. Greg Goth, Benjamin J. Alfonsi, Scott L. Andresen
    News. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:9-15 [Journal]
  5. Kanta Jiwnani, Marvin V. Zelkowitz
    Susceptibility Matrix: A New Aid to Software Auditing. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:16-21 [Journal]
  6. Simon Byers
    Information Leakage Caused by Hidden Data in Published Documents. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:23-27 [Journal]
  7. Marco Gruteser, Xuan Liu
    Protecting Privacy in Continuous Location-Tracking Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:28-34 [Journal]
  8. Annie I. Antón, Julia Brande Earp, Qingfeng He, William H. Stufflebeam, Davide Bolchini, Carlos Jensen
    Financial Privacy Policies and the Need for Standardization. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:36-45 [Journal]
  9. Ashish Popli
    ACM Computer and Communication Security Conference. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:46-47 [Journal]
  10. Stephen A. Weis
    RFID Privacy Workshop: Concerns, Consensus, and Questions. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:48-50 [Journal]
  11. Marc Donner
    Hacking the Best-Seller List. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:51-53 [Journal]
  12. Matt Bishop, Deborah A. Frincke
    Teaching Robust Programming. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:54-57 [Journal]
  13. Jeffery E. Payne
    Regulation and Information Security: Can Y2K Lessons Help Us? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:58-61 [Journal]
  14. Michael Lesk
    Shedding Light on Creativity: The History of Photography. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:62-64 [Journal]
  15. Elias Levy
    Criminals Become Tech Savvy. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:65-68 [Journal]
  16. Peter C. Wayner
    The Power of Candy-Coated Bits. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:69-72 [Journal]
  17. Roland L. Trope
    A Warranty of Cyberworthiness. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:73-76 [Journal]
  18. George Chamales
    The Honeywall CD-ROM. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:77-79 [Journal]
  19. Gary McGraw
    Software Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:80-83 [Journal]
  20. Michael A. Caloyannides
    The Cost of Convenience: A Faustian Deal. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:84-87 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002