The SCEAS System
Navigation Menu

Journals in DBLP

Informatica (Slovenia)
2002, volume: 26, number: 2

  1. Joris Claessens, Bart Preneel, Joos Vandewalle
    Combining World Wide Web and wireless security. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
  2. Adrian Spalka, Armin B. Cremers, Hanno Langweg
    Trojan horse attacks on software for electronic signatures. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
  3. Arso Savanovic, Dusan Gabrijelcic, Borka Jerman-Blazic, Stamatis Karnouskos
    An active networks security architecture. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
  4. Kamalasen Rajalingham, David Chadwick, Brian Knight
    Efficient methods for checking integrity: a structured spreadsheet engineering methodology. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
  5. C. Margaritis, N. Kolokotronis, Panagiota Papadopoulou, Drakoulis Martakos
    Securing Web-based Information Systems: A Model and Implementation Guidelines. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
  6. Vijay V. Mandke, Madhavan K. Nayar
    Implementing information integrity technology - a feedbackcontrol system approach. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
  7. Jaroslav Janácek, Richard Ostertág
    Problems in practical use of electronic signatures. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
  8. Ayaz Isazadeh
    Software engineering: configuration languages. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
  9. Bostjan Brumen, Izidor Golob, Tatjana Welzer, Ivan Rozman, Marjan Druzovec, Hannu Jaakkola
    Data protection for outsourced data mining. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
  10. Wesley Brandi, Martin S. Olivier
    Maintaining Integrity within Mobile Self Protecting Objects. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
  11. Ernesto Damiani, Pierangela Samarati, Sabrina De Capitani di Vimercati, Stefano Paraboschi
    XML access control systems: a component-based approach. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
  12. Vijayalakshmi Atluri, Ravi Mukkamala
    Employing an extended transaction model in multilevel secure transaction processing. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
  13. Bart De Win, Bart Vanhaute, Bart De Decker
    How aspect-oriented programming can help to build secure software. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002