The SCEAS System
Navigation Menu

Journals in DBLP

Bell Labs Technical Journal
2004, volume: 8, number: 4

  1. Uma Chandrashekhar, Steven H. Richman, Rati C. Thanawala
    Overview. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:8, n:4, pp:1-5 [Journal]
  2. Andrew R. McGee, S. Rao Vasireddy, Chen Xie, David D. Picklesimer, Uma Chandrashekhar, Steven H. Richman
    A framework for ensuring network security. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:8, n:4, pp:7-27 [Journal]
  3. Hemi Trickey, Alvin Barshefsky
    An access control architecture for managing large-scale network applications. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:8, n:4, pp:29-38 [Journal]
  4. Chun K. Chan, Himanshu Pant
    Reliability and security modeling in upgrading wireless backbone networks. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:8, n:4, pp:39-53 [Journal]
  5. Douglas H. Bellows
    Architectures for secure operation and maintenance of converged voice and data networks. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:8, n:4, pp:55-59 [Journal]
  6. Abdur Rahim Choudhary
    Service intelligence through agile information controls. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:8, n:4, pp:61-70 [Journal]
  7. Cynthia E. Martin, Jeffrey H. Dunn
    Authentication mechanisms for call control message integrity and origin verification. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:8, n:4, pp:71-91 [Journal]
  8. Sampath Rangarajan, Anil Takkallapalli, Sarit Mukherjee, Sanjoy Paul, Scott Miller
    Adaptive VPN: Tradeoff between security levels and value-added services in virtual private networks. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:8, n:4, pp:93-113 [Journal]
  9. Vivek Sharma
    Intrusion detection in infrastructure wireless LANs. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:8, n:4, pp:115-119 [Journal]
  10. Yigang Cai, Jack Kozik, Helmut L. Raether, John B. Reid, Guy H. Starner, Sunil Thadani, Kumar V. Vemuri
    Authorization mechanisms for mobile commerce implementations in enhanced prepaid solutions. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:8, n:4, pp:121-131 [Journal]
  11. Chi-Hung Kelvin Chu, Ming Chu
    An integrated framework for the assessment of network operations, reliability, and security. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:8, n:4, pp:133-152 [Journal]
  12. David J. Houck, EunYoung Kim, Gerard P. O'Reilly, David D. Picklesimer, Hüseyin Uzunalioglu
    A network survivability model for critical national infrastructures. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:8, n:4, pp:153-172 [Journal]
  13. William L. Fithen, Shawn V. Hernan, Paul F. O'Rourke, David A. Shinberg
    Formal modeling of vulnerability. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:8, n:4, pp:173-186 [Journal]
  14. S. Rao Vasireddy, Steven Wolter, Uma Chandrashekhar, Robert J. Thornberry Jr., Andrew R. McGee
    Security posture for civilian and non-civilian networks. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:8, n:4, pp:187-202 [Journal]
  15. Herbert Bertine, Igor Faynberg, Hui-Lan Lu
    Overview of data and telecommunications security standardization efforts in ISO, IEC, ITU, and IETF. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:8, n:4, pp:203-229 [Journal]

  16. Recent Lucent technologies patents. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:8, n:4, pp:231-241 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002