The SCEAS System
Navigation Menu

Journals in DBLP

Int. J. Inf. Sec.
2004, volume: 3, number: 2

  1. Vanesa Daza, Javier Herranz, Germán Sáez
    Protocols useful on the Internet from distributed signature schemes. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:3, n:2, pp:61-69 [Journal]
  2. Mark Burgess, Geoffrey Canright, Kenth Engø-Monsen
    A graph-theoretical model of computer security. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:3, n:2, pp:70-85 [Journal]
  3. Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson
    The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:3, n:2, pp:86-98 [Journal]
  4. Antonio Mana, Javier Lopez, Juan J. Ortega, Ernesto Pimentel, José M. Troya
    A framework for secure execution of software. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:3, n:2, pp:99-112 [Journal]
  5. Habtamu Abie, Pål Spilling, Bent Foyn
    A distributed digital rights management model for secure information-distribution systems. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:3, n:2, pp:113-128 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002