|
Journals in DBLP
- Ahmed Awad E. Ahmed, Issa Traoré
A New Biometric Technology Based on Mouse Dynamics. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:3, pp:165-179 [Journal]
- Baruch Awerbuch, Shay Kutten, Yishay Mansour, Boaz Patt-Shamir, George Varghese
A Time-Optimal Self-Stabilizing Synchronizer Using A Phase Clock. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:3, pp:180-190 [Journal]
- Gal Badishi, Amir Herzberg, Idit Keidar
Keeping Denial-of-Service Attackers in the Dark. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:3, pp:191-204 [Journal]
- Nizar Bouabdallah, Bruno Sericola
Introducing a Relative Priority for the Shared-Protection Schemes. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:3, pp:205-215 [Journal]
- Iliano Cervesato, Catherine Meadows
One Picture Is Worth a Dozen Connectives: A Fault-Tree Representation of NPATRL Security Requirements. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:3, pp:216-227 [Journal]
- Wei Yu, Yan (Lindsay) Sun, K. J. Ray Liu
Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:3, pp:228-242 [Journal]
|