The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Security & Privacy
2006, volume: 4, number: 2

  1. Marc Donner
    The Impending Debate. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:4-5 [Journal]
  2. Mikhael Felker
    Internet War Games: Power of the Masses. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:7- [Journal]
  3. Brent Kesler, Heather Drinan, Nancy Fontaine
    News Briefs. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:8-13 [Journal]
  4. Kjell Jørgen Hole, Vebjørn Moen, Thomas Tjøstheim
    Case Study: Online Banking Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:14-20 [Journal]
  5. Alain P. Hiltgen, Thorsten Kramp, Thomas Weigold
    Secure Internet Banking Authentication. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:21-29 [Journal]
  6. Wenjie Wang, Yufei Yuan, Norman P. Archer
    A Contextual Framework for Combating Identity Theft. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:30-38 [Journal]
  7. David Hwang, Patrick Schaumont, Kris Tiri, Ingrid Verbauwhede
    Securing Embedded Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:40-49 [Journal]
  8. Feisal Keblawi, Dick Sullivan
    Applying the Common Criteria in Systems Engineering. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:50-55 [Journal]
  9. Peter Kuper
    A Warning to Industry--Fix It or Lose It. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:56-60 [Journal]
  10. Matt Bishop, Deborah A. Frincke
    Who Owns Your Computer? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:61-63 [Journal]
  11. Rosario Gennaro
    Randomness in Cryptography. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:64-67 [Journal]
  12. James A. Whittaker, Richard Ford
    How to Think about Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:68-71 [Journal]
  13. Thorsten Holz, Simon Marechal, Frédéric Raynal
    New Threats and Attacks on the World Wide Web. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:72-75 [Journal]
  14. Scott Bradner
    The End of End-to-End Security? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:76-79 [Journal]
  15. Michael E. Lesk
    Should Indexing Be Fair Use? The Battle over Google Book Search. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:80-83 [Journal]
  16. John Steven
    Adopting an Enterprise Software Security Framework. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:84-87 [Journal]
  17. William E. Burr
    Cryptographic Hash Standards: Where Do We Go from Here? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:88-91 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002