M. C. Lee, Chun-Kan Fung A public-key based authentication and key establishment protocol coupled with a client puzzle. [Citation Graph (0, 0)][DBLP] JASIST, 2003, v:54, n:9, pp:810-823 [Journal]
Tomas A. Lipinski The myth of technological neutrality in copyright and the rights of institutional users: Recent legal challenges to the information organization as mediator and the impact of the DMCA, WIPO, and TEACH. [Citation Graph (0, 0)][DBLP] JASIST, 2003, v:54, n:9, pp:824-835 [Journal]
Blaise Cronin, Debora Shaw, Kathryn La Barre A cast of thousands: Coauthorship and subauthorship collaboration in the 20th century as manifested in the scholarly journal literature of psychology and philosophy. [Citation Graph (0, 0)][DBLP] JASIST, 2003, v:54, n:9, pp:855-871 [Journal]
Joette Stefl-Mabry A social judgment analysis of information source preference profiles: An exploratory study to empirically represent media selection patterns. [Citation Graph (0, 0)][DBLP] JASIST, 2003, v:54, n:9, pp:879-904 [Journal]