The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Security & Privacy
2004, volume: 2, number: 1

  1. Fred B. Schneider
    From the Editors: The Next Digital Divide. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:5- [Journal]

  2. Reviewer Thanks. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:6- [Journal]

  3. Letters to the Editors. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:7-9 [Journal]
  4. Charles C. Palmer
    Can We Win the Security Game? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:10-12 [Journal]
  5. Greg Goth, Pam Frost Gorder, Scott L. Andresen
    News. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:14-19 [Journal]
  6. Martin R. Stytz
    Book Reviews. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:20-21 [Journal]
  7. David L. Dill, Aviel D. Rubin
    Guest Editors' Introduction: E-Voting Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:22-23 [Journal]
  8. David Evans, Nathanael Paul
    Election Security: Perception and Reality. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:24-31 [Journal]
  9. Jonathan Bannet, David W. Price, Algis Rudys, Justin Singer, Dan S. Wallach
    Hack-a-Vote: Security Issues with Electronic Voting Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:32-37 [Journal]
  10. David Chaum
    Secret-Ballot Receipts: True Voter-Verifiable Elections. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:38-47 [Journal]
  11. Nicolas Sklavos, Nick A. Moldovyan, Vladimir Gorodetsky, Odysseas G. Koufopavlou
    Computer Network Security: Report from MMM-ACNS. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:49-52 [Journal]
  12. Marc Donner
    Die Gedanken Sind Frei. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:53-55 [Journal]
  13. Michael R. Grimaila
    Maximizing Business Information Security's Educational Value. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:56-60 [Journal]
  14. Michael Lesk
    Micropayments: An Idea Whose Time Has Passed Twice? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:61-63 [Journal]
  15. Jim Hearn
    Does the Common Criteria Paradigm Have a Future? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:64-65 [Journal]
  16. Ivan Arce
    More Bang For the Bug: An Account of 2003's Attack Trends. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:66-68 [Journal]
  17. Sean W. Smith, Eugene H. Spafford
    Grand Challenges in Information Security: Process and Output. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:69-71 [Journal]
  18. Martin R. Stytz
    Considering Defense in Depth for Software Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:72-75 [Journal]
  19. Neal Krawetz
    Anti-Honeypot Technology. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:76-79 [Journal]
  20. Michael A. Caloyannides
    Online Monitoring: Security or Social Control? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:81-83 [Journal]
  21. Bruce Schneier
    Voting Security and Technology. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:84- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002