The SCEAS System
Navigation Menu

Journals in DBLP

Journal of Computer Security
2003, volume: 11, number: 3

  1. Premkumar T. Devanbu, Michael Gertz, Charles U. Martel, Stuart G. Stubblebine
    Authentic Data Publication Over the Internet. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:3, pp:291-314 [Journal]
  2. Daniel Barbará, Rajni Goel, Sushil Jajodia
    A Checksum-based Corruption Detection Technique. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:3, pp:315-330 [Journal]
  3. John Hale, Mauricio Papa, Sujeet Shenoi
    Programmable Access Control. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:3, pp:331-352 [Journal]
  4. Wouter Teepe, Reind P. van de Riet, Martin S. Olivier
    WorkFlow Analyzed for Security and Privacy in Using Databases. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:3, pp:353-364 [Journal]
  5. Christian Altenschmidt, Joachim Biskup, Ulrich Flegel, Yücel Karabulut
    Secure Mediation: Requirements, Design, and Architecture. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:3, pp:365-398 [Journal]
  6. Steve Kremer, Jean-François Raskin
    A Game-based Verification of Non-repudiation and Fair Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:3, pp:399-430 [Journal]
  7. Katherine Campbell, Lawrence A. Gordon, Martin P. Loeb, Lei Zhou
    The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:3, pp:431-448 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002