Journals in DBLP
J. UCS 2005, volume: 11, number: 1
Ajith Abraham , Johnson P. Thomas , Sugata Sanyal , Lakhmi C. Jain Information Assurance and Security. [Citation Graph (0, 0)][DBLP ] J. UCS, 2005, v:11, n:1, pp:1-3 [Journal ] Frank Adelstein , Prasanth Alla , Rob Joyce , Golden G. Richard III Physically Locating Wireless Intruders. [Citation Graph (0, 0)][DBLP ] J. UCS, 2005, v:11, n:1, pp:4-19 [Journal ] Sriranjani Sitaraman , S. Venkatesan Low-Intrusive Consistent Disk Checkpointing: A Tool for Digital Forensics. [Citation Graph (0, 0)][DBLP ] J. UCS, 2005, v:11, n:1, pp:20-36 [Journal ] In Joe Khor , Johnson P. Thomas , Istvan Jonyer Sliding Window Protocol for Secure Group Communication in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] J. UCS, 2005, v:11, n:1, pp:37-55 [Journal ] Nedeljko Cvejic , Tapio Seppänen Increasing Robustness of LSB Audio Steganography by Reduced Distortion LSB Coding. [Citation Graph (0, 0)][DBLP ] J. UCS, 2005, v:11, n:1, pp:56-65 [Journal ] Nadia Nedjah , Luiza de Macedo Mourelle Software/Hardware Co-Design of Efficient and Secure Cryptographic Hardware. [Citation Graph (0, 0)][DBLP ] J. UCS, 2005, v:11, n:1, pp:66-82 [Journal ] Sachin P. Joglekar , Stephen R. Tate ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention. [Citation Graph (0, 0)][DBLP ] J. UCS, 2005, v:11, n:1, pp:83-103 [Journal ] Rangarajan Vasudevan , Ajith Abraham , Sugata Sanyal A Novel Scheme for Secured Data Transfer Over Computer Networks. [Citation Graph (0, 0)][DBLP ] J. UCS, 2005, v:11, n:1, pp:104-121 [Journal ] Ravi Sankar Veerubhotla , Ashutosh Saxena , Ved Prakash Gulati , Arun K. Pujari Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing. [Citation Graph (0, 0)][DBLP ] J. UCS, 2005, v:11, n:1, pp:122-149 [Journal ] Valentina Casola , Rosa Preziosi , Massimiliano Rak , Luigi Troiano A Reference Model for Security Level Evaluation: Policy and Fuzzy Techniques. [Citation Graph (0, 0)][DBLP ] J. UCS, 2005, v:11, n:1, pp:150-174 [Journal ] Aleksandra Nenadic , Ning Zhang , Barry M. G. Cheetham , Carole A. Goble RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature Encryption. [Citation Graph (0, 0)][DBLP ] J. UCS, 2005, v:11, n:1, pp:175-192 [Journal ] Jisun Park , K. Suzanne Barber Information Quality Assurance by Lazy Exploration of Information Source Combinations Space in Open Multi-Agent Systems. [Citation Graph (0, 0)][DBLP ] J. UCS, 2005, v:11, n:1, pp:193-209 [Journal ]