|
Journals in DBLP
- Philip D. MacKenzie, Michael K. Reiter
Networked cryptographic devices resilient to capture. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2003, v:2, n:1, pp:1-20 [Journal]
- Sigrid Gürgens, Javier Lopez, René Peralta
Analysis of e-commerce protocols: Adapting a traditional technique. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2003, v:2, n:1, pp:21-36 [Journal]
- Joonsang Baek, Yuliang Zheng
Zheng and Seberry's public key encryption scheme revisited. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2003, v:2, n:1, pp:37-44 [Journal]
- Elisa Bertino, Elena Ferrari, Andrea Perego
Content-based filtering of Web documents: the MaX system and the EUFORBIA project. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2003, v:2, n:1, pp:45-58 [Journal]
- Willi Geiselmann, Willi Meier, Rainer Steinwandt
An attack on the isomorphisms of polynomials problem with one secret. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2003, v:2, n:1, pp:59-64 [Journal]
|