|
Journals in DBLP
- Francesco Bergadano, Bruno Crispo, T. Mark A. Lomas
Strong Authentication and Privacy with Standard Browsers. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 1997, v:5, n:3, pp:191-212 [Journal]
- Jean-Jacques Quisquater, Marc Joye
Authentication of Sequences with the SL2 Hash Function: Application to Video Sequences. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 1997, v:5, n:3, pp:213-224 [Journal]
- Ciarán Bryce, Winfried E. Kühnhauser, Rémy Amouroux, Mauricio Lopez, Harry Rudnik
CWASAR: a European Infrastructure for Secure Electronic Commerce. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 1997, v:5, n:3, pp:225-236 [Journal]
- Paul F. Syverson, Michael G. Reed, David M. Goldschlag
Private Web Browsing. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 1997, v:5, n:3, pp:237-248 [Journal]
- Martin Röscheisen, Terry Winograd
A Network-Centric Design for Relationship-Based Security and Access Control. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 1997, v:5, n:3, pp:249-254 [Journal]
- Marianne Winslett, Neil Ching, Vicki Ellen Jones, Igor Slepchin
Using Digital Credentials on the World Wide Web. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 1997, v:5, n:3, pp:255-266 [Journal]
|