|
Journals in DBLP
- Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
Cardinality-based inference control in data cubes. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:5, pp:655-692 [Journal]
- Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei
Key management for high bandwidth secure multicast. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:5, pp:693-709 [Journal]
- Taenam Cho, Sang-Ho Lee, Won Kim
A group key recovery mechanism based on logical key hierarchy. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:5, pp:711-736 [Journal]
- Jian Zhang, Jian Gong, Yong Ding
Research on automated rollbackability of intrusion response. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:5, pp:737-751 [Journal]
- Florian P. Buchholz, Clay Shields
Providing process origin information to aid in computer forensic investigations. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:5, pp:753-776 [Journal]
- Charles Iheagwara, Andrew Blyth, Mukesh Singhal
Cost effective management frameworks for intrusion detection systems. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:5, pp:777-798 [Journal]
|