Journals in DBLP
Corrado Priami Preface to the special issue on Security in global computing. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:2, n:3-4, pp:125- [Journal ] David Teller , Pascal Zimmer , Daniel Hirschkoff Using ambients to control resources. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:2, n:3-4, pp:126-144 [Journal ] Mikael Buchholtz , Hanne Riis Nielson , Flemming Nielson A calculus for control flow analysis of security protocols. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:2, n:3-4, pp:145-167 [Journal ] Roberto Gorrieri , Ruggero Lanotte , Andrea Maggiolo-Schettini , Fabio Martinelli , Simone Tini , Enrico Tronci Automated analysis of timed security: a case study on web privacy. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:2, n:3-4, pp:168-186 [Journal ] Massimo Bartoletti , Pierpaolo Degano , Gian Luigi Ferrari Stack inspection and secure program transformations. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:2, n:3-4, pp:187-217 [Journal ] Philip D. MacKenzie , Michael K. Reiter Two-party generation of DSA signatures. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:2, n:3-4, pp:218-239 [Journal ]