The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Trans. Dependable Sec. Comput.
2005, volume: 2, number: 2

  1. Vern Paxson, Michael Waidner
    Guest Editor's Introduction: 2005 IEEE Symposium on Security and Privacy. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:2, pp:81- [Journal]
  2. Paul C. van Oorschot, Anil Somayaji, Glenn Wurster
    Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:2, pp:82-92 [Journal]
  3. Tadayoshi Kohno, Andre Broido, Kimberly C. Claffy
    Remote Physical Device Fingerprintin. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:2, pp:93-108 [Journal]
  4. Michael Backes, Birgit Pfitzmann
    Relating Symbolic and Cryptographic Secrecy. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:2, pp:109-123 [Journal]
  5. Kalyanaraman Vaidyanathan, Kishor S. Trivedi
    A Comprehensive Model for Software Rejuvenation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:2, pp:124-137 [Journal]
  6. Xubin He, Ming Zhang, Qing Yang
    SPEK: A Storage Performance Evaluation Kernel Module for Block-Level Storage Systems under Faulty Conditions. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:2, pp:138-149 [Journal]
  7. Ioannis Voyiatzis, Constantin Halatsis
    A Low-Cost Concurrent BIST Scheme for Increased Dependability. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:2, pp:150-156 [Journal]
  8. James Joshi, Elisa Bertino, Arif Ghafoor
    An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:2, pp:157-175 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002