The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2009, volume: 28, number: 1-2


  1. Editorial. [Citation Graph (, )][DBLP]


  2. Building access control models with attribute exploration. [Citation Graph (, )][DBLP]


  3. A distributed requirements management framework for legal compliance and accountability. [Citation Graph (, )][DBLP]


  4. Anomaly-based network intrusion detection: Techniques, systems and challenges. [Citation Graph (, )][DBLP]


  5. Huffman-based join-exit-tree scheme for contributory key management. [Citation Graph (, )][DBLP]


  6. RAID-RMS: A fault tolerant stripped mirroring RAID architecture for distributed systems. [Citation Graph (, )][DBLP]


  7. User perceptions of security, convenience and usability for ebanking authentication tokens. [Citation Graph (, )][DBLP]


  8. Why Johnny can't surf (safely)? Attacks and defenses for web users. [Citation Graph (, )][DBLP]


  9. Recognition of electro-magnetic leakage information from computer radiation with SVM. [Citation Graph (, )][DBLP]


  10. Securing communication using function extraction technology for malicious code behavior analysis. [Citation Graph (, )][DBLP]


  11. Keystroke dynamics-based authentication for mobile devices. [Citation Graph (, )][DBLP]


  12. An oblique-matrix technique for data integrity assurance. [Citation Graph (, )][DBLP]


  13. Digital multisignature on the generalized conic curve over Zn. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002