Journals in DBLP
Catherine Meadows Guest Editorial: Introduction to the Special Section - Best Papers of the 1995 IEEE Symposium on Security and Privacy. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1996, v:22, n:5, pp:281-282 [Journal ] Olin Sibert , Phillip A. Porras , Robert Lindell An Analysis of the Intel 80x86 Security Architecture and Implementations. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1996, v:22, n:5, pp:283-293 [Journal ] Ross J. Anderson , S. Johann Bezuidenhoudt On the Reliability of Electronic Payment Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1996, v:22, n:5, pp:294-301 [Journal ] Matthew K. Franklin , Michael K. Reiter The Design and Implementation of a Secure Auction Service. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1996, v:22, n:5, pp:302-312 [Journal ] Rajashekar Kailar Accountability in Electronic Commerce Protocols. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1996, v:22, n:5, pp:313-328 [Journal ] Myong H. Kang , Ira S. Moskowitz , Daniel C. Lee A Network Pump. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1996, v:22, n:5, pp:329-338 [Journal ] Salwa K. Abd-El-Hafiz , Victor R. Basili A Knowledge-Based Approach to the Analysis of Loops. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1996, v:22, n:5, pp:339-360 [Journal ]