The SCEAS System
Navigation Menu

Journals in DBLP

Journal of Computer Security
1997, volume: 5, number: 3

  1. Francesco Bergadano, Bruno Crispo, T. Mark A. Lomas
    Strong Authentication and Privacy with Standard Browsers. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1997, v:5, n:3, pp:191-212 [Journal]
  2. Jean-Jacques Quisquater, Marc Joye
    Authentication of Sequences with the SL2 Hash Function: Application to Video Sequences. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1997, v:5, n:3, pp:213-224 [Journal]
  3. Ciarán Bryce, Winfried E. Kühnhauser, Rémy Amouroux, Mauricio Lopez, Harry Rudnik
    CWASAR: a European Infrastructure for Secure Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1997, v:5, n:3, pp:225-236 [Journal]
  4. Paul F. Syverson, Michael G. Reed, David M. Goldschlag
    Private Web Browsing. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1997, v:5, n:3, pp:237-248 [Journal]
  5. Martin Röscheisen, Terry Winograd
    A Network-Centric Design for Relationship-Based Security and Access Control. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1997, v:5, n:3, pp:249-254 [Journal]
  6. Marianne Winslett, Neil Ching, Vicki Ellen Jones, Igor Slepchin
    Using Digital Credentials on the World Wide Web. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1997, v:5, n:3, pp:255-266 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002