|
Journals in DBLP
- Michael K. Reiter, Stuart G. Stubblebine
Authentication Metric Analysis and Design. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 1999, v:2, n:2, pp:138-158 [Journal]
- Bruce Schneier, John Kelsey
Secure Audit Logs to Support Computer Forensics. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 1999, v:2, n:2, pp:159-176 [Journal]
- Trent Jaeger, Atul Prakash, Jochen Liedtke, Nayeem Islam
Flexible Control of Downloaded Executable Content. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 1999, v:2, n:2, pp:177-228 [Journal]
|