|
Journals in DBLP
- Vanesa Daza, Javier Herranz, Germán Sáez
Protocols useful on the Internet from distributed signature schemes. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2004, v:3, n:2, pp:61-69 [Journal]
- Mark Burgess, Geoffrey Canright, Kenth Engø-Monsen
A graph-theoretical model of computer security. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2004, v:3, n:2, pp:70-85 [Journal]
- Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2004, v:3, n:2, pp:86-98 [Journal]
- Antonio Mana, Javier Lopez, Juan J. Ortega, Ernesto Pimentel, José M. Troya
A framework for secure execution of software. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2004, v:3, n:2, pp:99-112 [Journal]
- Habtamu Abie, Pål Spilling, Bent Foyn
A distributed digital rights management model for secure information-distribution systems. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2004, v:3, n:2, pp:113-128 [Journal]
|