Journals in DBLP
Simon N. Foley , Jeremy Jacob Specifying Security for Computer Supported Collaborative Working. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1995, v:3, n:4, pp:233-254 [Journal ] Liqun Chen , Dieter Gollmann , Chris J. Mitchell Distributing Trust Amongst Multiple Authentication Servers. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1995, v:3, n:4, pp:255-268 [Journal ] Aris Zakinthinos , E. Stewart Lee The Composability of Non-Interference. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1995, v:3, n:4, pp:269-282 [Journal ] Matt Bishop Theft of Information in the Take-Grant Protection Model. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1995, v:3, n:4, pp:283-308 [Journal ] Carlo Blundo , Luiz A. Frota Mattos , Douglas R. Stinson Multiple Key Distribution Maintaining User Anonymity via Broadcast Channels. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1995, v:3, n:4, pp:309-322 [Journal ]