|
Journals in DBLP
- Joris Claessens, Bart Preneel, Joos Vandewalle
Combining World Wide Web and wireless security. [Citation Graph (0, 0)][DBLP] Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
- Adrian Spalka, Armin B. Cremers, Hanno Langweg
Trojan horse attacks on software for electronic signatures. [Citation Graph (0, 0)][DBLP] Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
- Arso Savanovic, Dusan Gabrijelcic, Borka Jerman-Blazic, Stamatis Karnouskos
An active networks security architecture. [Citation Graph (0, 0)][DBLP] Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
- Kamalasen Rajalingham, David Chadwick, Brian Knight
Efficient methods for checking integrity: a structured spreadsheet engineering methodology. [Citation Graph (0, 0)][DBLP] Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
- C. Margaritis, N. Kolokotronis, Panagiota Papadopoulou, Drakoulis Martakos
Securing Web-based Information Systems: A Model and Implementation Guidelines. [Citation Graph (0, 0)][DBLP] Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
- Vijay V. Mandke, Madhavan K. Nayar
Implementing information integrity technology - a feedbackcontrol system approach. [Citation Graph (0, 0)][DBLP] Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
- Jaroslav Janácek, Richard Ostertág
Problems in practical use of electronic signatures. [Citation Graph (0, 0)][DBLP] Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
- Ayaz Isazadeh
Software engineering: configuration languages. [Citation Graph (0, 0)][DBLP] Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
- Bostjan Brumen, Izidor Golob, Tatjana Welzer, Ivan Rozman, Marjan Druzovec, Hannu Jaakkola
Data protection for outsourced data mining. [Citation Graph (0, 0)][DBLP] Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
- Wesley Brandi, Martin S. Olivier
Maintaining Integrity within Mobile Self Protecting Objects. [Citation Graph (0, 0)][DBLP] Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
- Ernesto Damiani, Pierangela Samarati, Sabrina De Capitani di Vimercati, Stefano Paraboschi
XML access control systems: a component-based approach. [Citation Graph (0, 0)][DBLP] Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
- Vijayalakshmi Atluri, Ravi Mukkamala
Employing an extended transaction model in multilevel secure transaction processing. [Citation Graph (0, 0)][DBLP] Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
- Bart De Win, Bart Vanhaute, Bart De Decker
How aspect-oriented programming can help to build secure software. [Citation Graph (0, 0)][DBLP] Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
|