The SCEAS System
Navigation Menu

Journals in DBLP

Inf. Manag. Comput. Security
2001, volume: 9, number: 2

  1. Eddie W. L. Cheng, Heng Li
    Information priority-setting for better resource allocation using analytic hierarchy process (AHP). [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2001, v:9, n:2, pp:61-70 [Journal]
  2. Stefanos Gritzalis, Dimitris Gritzalis
    A digital seal solution for deploying trust on commercial transactions. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2001, v:9, n:2, pp:71-79 [Journal]
  3. David C. Yen, David C. Chou
    Intranets for organizational innovation. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2001, v:9, n:2, pp:80-87 [Journal]
  4. Gayle Webb White, Sheila J. Pearson
    Controlling corporate e-mail, PC use and computer security. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2001, v:9, n:2, pp:88-92 [Journal]
  5. Steven Furnell, Pelagia Chiliarchaki, Paul Dowland
    Security analysers: administrator assistants or hacker helpers? [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2001, v:9, n:2, pp:93-101 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002