|
Journals in DBLP
- Premkumar T. Devanbu, Michael Gertz, Charles U. Martel, Stuart G. Stubblebine
Authentic Data Publication Over the Internet. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2003, v:11, n:3, pp:291-314 [Journal]
- Daniel Barbará, Rajni Goel, Sushil Jajodia
A Checksum-based Corruption Detection Technique. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2003, v:11, n:3, pp:315-330 [Journal]
- John Hale, Mauricio Papa, Sujeet Shenoi
Programmable Access Control. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2003, v:11, n:3, pp:331-352 [Journal]
- Wouter Teepe, Reind P. van de Riet, Martin S. Olivier
WorkFlow Analyzed for Security and Privacy in Using Databases. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2003, v:11, n:3, pp:353-364 [Journal]
- Christian Altenschmidt, Joachim Biskup, Ulrich Flegel, Yücel Karabulut
Secure Mediation: Requirements, Design, and Architecture. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2003, v:11, n:3, pp:365-398 [Journal]
- Steve Kremer, Jean-François Raskin
A Game-based Verification of Non-repudiation and Fair Exchange Protocols. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2003, v:11, n:3, pp:399-430 [Journal]
- Katherine Campbell, Lawrence A. Gordon, Martin P. Loeb, Lei Zhou
The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2003, v:11, n:3, pp:431-448 [Journal]
|