Journals in DBLP
Someswar Kesh , Sam Ramanujan , Sridhar P. Nerur A framework for analyzing e-commerce security. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2002, v:10, n:4, pp:149-158 [Journal ] Hao Feng , Chan Choong Wah Private key generation from on-line handwritten signatures. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2002, v:10, n:4, pp:159-164 [Journal ] Kostas S. Metaxiotis , John E. Psarras , Stefanos Papastefanatos Knowledge and information management in e-learning environments; the user agent architecture. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2002, v:10, n:4, pp:165-170 [Journal ] Gaurav Jain , Deepali Singh , Shekhar Verma Service level agreements in IP networks. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2002, v:10, n:4, pp:171-177 [Journal ] Alan D. Smith , William T. Rupp Issues in cybersecurity; understanding the potential risks associated with hackers/crackers. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2002, v:10, n:4, pp:178-183 [Journal ] John A. Rodgers , David C. Yen , David C. Chou Developing e-business; a strategic approach. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2002, v:10, n:4, pp:184-192 [Journal ] Steven Furnell Cybercrime - vandalizing the information society (Review). [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2002, v:10, n:4, pp:196- [Journal ]