The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2009, volume: 28, number: 3-4


  1. Understanding the limitations of S/MIME digital signatures for e-mails: A GUI based approach. [Citation Graph (, )][DBLP]


  2. SDriver: Location-specific signatures prevent SQL injection attacks. [Citation Graph (, )][DBLP]


  3. From desktop to mobile: Examining the security experience. [Citation Graph (, )][DBLP]


  4. An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. [Citation Graph (, )][DBLP]


  5. Detecting rogue access points using client-side bottleneck bandwidth analysis. [Citation Graph (, )][DBLP]


  6. An incremental frequent structure mining framework for real-time alert correlation. [Citation Graph (, )][DBLP]


  7. Preventing massive automated access to web resources. [Citation Graph (, )][DBLP]


  8. Information security: The moving target. [Citation Graph (, )][DBLP]


  9. Reliable and fully distributed trust model for mobile ad hoc networks. [Citation Graph (, )][DBLP]


  10. How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management. [Citation Graph (, )][DBLP]


  11. Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002