Journals in DBLP
Gavin Lowe Towards a Completeness Result for Model Checking of Security Protocols. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1999, v:7, n:1, pp:- [Journal ] A. W. Roscoe , Philippa J. Broadfoot Proving Security Protocols with Model Checkers by Data Independence Techniques. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1999, v:7, n:1, pp:- [Journal ] F. Javier Thayer , Jonathan C. Herzog , Joshua D. Guttman Strand Spaces: Proving Security Protocols Correct. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1999, v:7, n:1, pp:- [Journal ] Giovanni Vigna , Richard A. Kemmerer NetSTAT: A Network-based Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1999, v:7, n:1, pp:- [Journal ] Dennis M. Volpano , Geoffrey Smith Probabilistic Noninterference in a Concurrent Language. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1999, v:7, n:1, pp:- [Journal ] Thomas E. Daniels , Eugene H. Spafford Identification of Host Audit Data to Detect Attacks on Low-level IP Vulnerabilities. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1999, v:7, n:1, pp:3-35 [Journal ] Carlo Blundo , Barbara Masucci A Note on the Randomness in Dynamic Threshold Schemes. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1999, v:7, n:1, pp:73-85 [Journal ]