The SCEAS System
Navigation Menu

Journals in DBLP

J. UCS
2005, volume: 11, number: 1

  1. Ajith Abraham, Johnson P. Thomas, Sugata Sanyal, Lakhmi C. Jain
    Information Assurance and Security. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:1, pp:1-3 [Journal]
  2. Frank Adelstein, Prasanth Alla, Rob Joyce, Golden G. Richard III
    Physically Locating Wireless Intruders. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:1, pp:4-19 [Journal]
  3. Sriranjani Sitaraman, S. Venkatesan
    Low-Intrusive Consistent Disk Checkpointing: A Tool for Digital Forensics. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:1, pp:20-36 [Journal]
  4. In Joe Khor, Johnson P. Thomas, Istvan Jonyer
    Sliding Window Protocol for Secure Group Communication in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:1, pp:37-55 [Journal]
  5. Nedeljko Cvejic, Tapio Seppänen
    Increasing Robustness of LSB Audio Steganography by Reduced Distortion LSB Coding. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:1, pp:56-65 [Journal]
  6. Nadia Nedjah, Luiza de Macedo Mourelle
    Software/Hardware Co-Design of Efficient and Secure Cryptographic Hardware. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:1, pp:66-82 [Journal]
  7. Sachin P. Joglekar, Stephen R. Tate
    ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:1, pp:83-103 [Journal]
  8. Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal
    A Novel Scheme for Secured Data Transfer Over Computer Networks. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:1, pp:104-121 [Journal]
  9. Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati, Arun K. Pujari
    Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:1, pp:122-149 [Journal]
  10. Valentina Casola, Rosa Preziosi, Massimiliano Rak, Luigi Troiano
    A Reference Model for Security Level Evaluation: Policy and Fuzzy Techniques. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:1, pp:150-174 [Journal]
  11. Aleksandra Nenadic, Ning Zhang, Barry M. G. Cheetham, Carole A. Goble
    RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature Encryption. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:1, pp:175-192 [Journal]
  12. Jisun Park, K. Suzanne Barber
    Information Quality Assurance by Lazy Exploration of Information Source Combinations Space in Open Multi-Agent Systems. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:1, pp:193-209 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002