Journals in DBLP
Michael Waidner Preface. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:3, n:1, pp:1- [Journal ] Philippa J. Hopcroft , Gavin Lowe Analysing a stream authentication protocol using model checking. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:3, n:1, pp:2-13 [Journal ] Joachim Biskup , Piero A. Bonatti Controlled query evaluation for enforcing confidentiality in complete information systems. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:3, n:1, pp:14-27 [Journal ] Sean W. Smith Outbound authentication for programmable secure coprocessors. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:3, n:1, pp:28-41 [Journal ] Michael Backes , Birgit Pfitzmann Computational probabilistic noninterference. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:3, n:1, pp:42-60 [Journal ]