
Journals in DBLP
 Vanesa Daza, Javier Herranz, Germán Sáez
Protocols useful on the Internet from distributed signature schemes. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2004, v:3, n:2, pp:6169 [Journal]
 Mark Burgess, Geoffrey Canright, Kenth EngøMonsen
A graphtheoretical model of computer security. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2004, v:3, n:2, pp:7085 [Journal]
 Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2004, v:3, n:2, pp:8698 [Journal]
 Antonio Mana, Javier Lopez, Juan J. Ortega, Ernesto Pimentel, José M. Troya
A framework for secure execution of software. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2004, v:3, n:2, pp:99112 [Journal]
 Habtamu Abie, Pål Spilling, Bent Foyn
A distributed digital rights management model for secure informationdistribution systems. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2004, v:3, n:2, pp:113128 [Journal]
