The SCEAS System
Navigation Menu

Journals in DBLP

Int. J. Inf. Sec.
2002, volume: 1, number: 2

  1. Fabian Monrose, Michael K. Reiter, Susanne Wetzel
    Password hardening based on keystroke dynamics. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2002, v:1, n:2, pp:69-83 [Journal]
  2. Ohad Rodeh, Kenneth P. Birman, Danny Dolev
    Using AVL trees for fault-tolerant group key management. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2002, v:1, n:2, pp:84-99 [Journal]
  3. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
    Securing SOAP e-services. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2002, v:1, n:2, pp:100-115 [Journal]
  4. Michiharu Kudo
    PBAC: Provision-based access control model. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2002, v:1, n:2, pp:116-130 [Journal]
  5. Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
    A complete characterization of a family of key exchange protocols. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2002, v:1, n:2, pp:131-142 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002