Journals in DBLP
Uma Chandrashekhar , Steven H. Richman , Rati C. Thanawala Overview. [Citation Graph (0, 0)][DBLP ] Bell Labs Technical Journal, 2004, v:8, n:4, pp:1-5 [Journal ] Andrew R. McGee , S. Rao Vasireddy , Chen Xie , David D. Picklesimer , Uma Chandrashekhar , Steven H. Richman A framework for ensuring network security. [Citation Graph (0, 0)][DBLP ] Bell Labs Technical Journal, 2004, v:8, n:4, pp:7-27 [Journal ] Hemi Trickey , Alvin Barshefsky An access control architecture for managing large-scale network applications. [Citation Graph (0, 0)][DBLP ] Bell Labs Technical Journal, 2004, v:8, n:4, pp:29-38 [Journal ] Chun K. Chan , Himanshu Pant Reliability and security modeling in upgrading wireless backbone networks. [Citation Graph (0, 0)][DBLP ] Bell Labs Technical Journal, 2004, v:8, n:4, pp:39-53 [Journal ] Douglas H. Bellows Architectures for secure operation and maintenance of converged voice and data networks. [Citation Graph (0, 0)][DBLP ] Bell Labs Technical Journal, 2004, v:8, n:4, pp:55-59 [Journal ] Abdur Rahim Choudhary Service intelligence through agile information controls. [Citation Graph (0, 0)][DBLP ] Bell Labs Technical Journal, 2004, v:8, n:4, pp:61-70 [Journal ] Cynthia E. Martin , Jeffrey H. Dunn Authentication mechanisms for call control message integrity and origin verification. [Citation Graph (0, 0)][DBLP ] Bell Labs Technical Journal, 2004, v:8, n:4, pp:71-91 [Journal ] Sampath Rangarajan , Anil Takkallapalli , Sarit Mukherjee , Sanjoy Paul , Scott Miller Adaptive VPN: Tradeoff between security levels and value-added services in virtual private networks. [Citation Graph (0, 0)][DBLP ] Bell Labs Technical Journal, 2004, v:8, n:4, pp:93-113 [Journal ] Vivek Sharma Intrusion detection in infrastructure wireless LANs. [Citation Graph (0, 0)][DBLP ] Bell Labs Technical Journal, 2004, v:8, n:4, pp:115-119 [Journal ] Yigang Cai , Jack Kozik , Helmut L. Raether , John B. Reid , Guy H. Starner , Sunil Thadani , Kumar V. Vemuri Authorization mechanisms for mobile commerce implementations in enhanced prepaid solutions. [Citation Graph (0, 0)][DBLP ] Bell Labs Technical Journal, 2004, v:8, n:4, pp:121-131 [Journal ] Chi-Hung Kelvin Chu , Ming Chu An integrated framework for the assessment of network operations, reliability, and security. [Citation Graph (0, 0)][DBLP ] Bell Labs Technical Journal, 2004, v:8, n:4, pp:133-152 [Journal ] David J. Houck , EunYoung Kim , Gerard P. O'Reilly , David D. Picklesimer , Hüseyin Uzunalioglu A network survivability model for critical national infrastructures. [Citation Graph (0, 0)][DBLP ] Bell Labs Technical Journal, 2004, v:8, n:4, pp:153-172 [Journal ] William L. Fithen , Shawn V. Hernan , Paul F. O'Rourke , David A. Shinberg Formal modeling of vulnerability. [Citation Graph (0, 0)][DBLP ] Bell Labs Technical Journal, 2004, v:8, n:4, pp:173-186 [Journal ] S. Rao Vasireddy , Steven Wolter , Uma Chandrashekhar , Robert J. Thornberry Jr. , Andrew R. McGee Security posture for civilian and non-civilian networks. [Citation Graph (0, 0)][DBLP ] Bell Labs Technical Journal, 2004, v:8, n:4, pp:187-202 [Journal ] Herbert Bertine , Igor Faynberg , Hui-Lan Lu Overview of data and telecommunications security standardization efforts in ISO, IEC, ITU, and IETF. [Citation Graph (0, 0)][DBLP ] Bell Labs Technical Journal, 2004, v:8, n:4, pp:203-229 [Journal ] Recent Lucent technologies patents. [Citation Graph (0, 0)][DBLP ] Bell Labs Technical Journal, 2004, v:8, n:4, pp:231-241 [Journal ]