|
Journals in DBLP
Editorial. [Citation Graph (, )][DBLP]
Building access control models with attribute exploration. [Citation Graph (, )][DBLP]
A distributed requirements management framework for legal compliance and accountability. [Citation Graph (, )][DBLP]
Anomaly-based network intrusion detection: Techniques, systems and challenges. [Citation Graph (, )][DBLP]
Huffman-based join-exit-tree scheme for contributory key management. [Citation Graph (, )][DBLP]
RAID-RMS: A fault tolerant stripped mirroring RAID architecture for distributed systems. [Citation Graph (, )][DBLP]
User perceptions of security, convenience and usability for ebanking authentication tokens. [Citation Graph (, )][DBLP]
Why Johnny can't surf (safely)? Attacks and defenses for web users. [Citation Graph (, )][DBLP]
Recognition of electro-magnetic leakage information from computer radiation with SVM. [Citation Graph (, )][DBLP]
Securing communication using function extraction technology for malicious code behavior analysis. [Citation Graph (, )][DBLP]
Keystroke dynamics-based authentication for mobile devices. [Citation Graph (, )][DBLP]
An oblique-matrix technique for data integrity assurance. [Citation Graph (, )][DBLP]
Digital multisignature on the generalized conic curve over Zn. [Citation Graph (, )][DBLP]
|