The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Security & Privacy
2006, volume: 4, number: 1

  1. George Cybenko
    Why Johnny Can't Evaluate Security Risk. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:5- [Journal]
  2. Whitfield Diffie
    Chattering about SIGINT. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:9- [Journal]
  3. Laurianne McLaughlin
    Philip Zimmermann on What's Next after PGP. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:10-13 [Journal]
  4. Heather Drinan, Nancy Fontaine, Brent Kesler
    News Briefs. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:14-16 [Journal]
  5. Edward W. Felten, J. Alex Halderman
    Digital Rights Management, Spyware, and Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:18-23 [Journal]
  6. John G. Levine, Julian B. Grizzard, Henry L. Owen
    Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:24-32 [Journal]
  7. Nir Kshetri
    The Simple Economics of Cybercrimes. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:33-39 [Journal]
  8. Steven Cheung
    Denial of Service against the Domain Name System. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:40-45 [Journal]
  9. John Black, Martin Cochran, Martin Ryan Gardner
    A Security Analysis of the Internet Chess Club. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:46-52 [Journal]
  10. Christian Rechberger, Vincent Rijmen, Nicolas Sklavos
    The NIST Cryptographic Workshop on Hash Functions. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:54-56 [Journal]
  11. Timothy Rosenberg, Lance J. Hoffman
    Taking Networks on the Road: Portable Solutions for Security Educators. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:57-60 [Journal]
  12. Virgil D. Gligor, Thomas Haigh, Dick Kemmerer, Carl E. Landwehr, Steven B. Lipner, John D. McLean
    Information Assurance Technology Forecast 2005. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:62-69 [Journal]
  13. Jean-Sébastien Coron
    What Is Cryptography? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:70-73 [Journal]
  14. Robert C. Seacord
    Secure Coding in C and C++: Of Strings and Integers. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:74-76 [Journal]
  15. Dragos Ruiu
    Learning from Information Security History. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:77-79 [Journal]
  16. Jeremy Epstein, Scott R. Matsumoto, Gary McGraw
    Software Security and SOA: Danger, Will Robinson! [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:80-83 [Journal]
  17. Ramaswamy Chandramouli, Scott Rose
    Challenges in Securing the Domain Name System. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:84-87 [Journal]
  18. Steven M. Bellovin
    Unconventional Wisdom. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:88- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002