Journals in DBLP
Bruno d'Ausbourg , Christel Calas Implementing Secure Dependencies over a Network by Designing a Distributed Security SubSystem. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1996, v:4, n:1, pp:3-26 [Journal ] A. W. Roscoe , Jim Woodcock , L. Wulf Non-interference through Determinism. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1996, v:4, n:1, pp:27-54 [Journal ] Ueli M. Maurer , Pierre E. Schmid A Calculus for Security Bootstrapping in Distributed Systems. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1996, v:4, n:1, pp:55-80 [Journal ] Azad Jiwa , Thomas Hardjono , Jennifer Seberry Beacons for Authentication in Distributed Systems. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1996, v:4, n:1, pp:81-96 [Journal ] Ralf C. Hauser , Philippe A. Janson , Refik Molva , Gene Tsudik , Els Van Herreweghen Robust and Secure Password and Key Change Method. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1996, v:4, n:1, pp:97-112 [Journal ]