|
Journals in DBLP
Understanding the limitations of S/MIME digital signatures for e-mails: A GUI based approach. [Citation Graph (, )][DBLP]
SDriver: Location-specific signatures prevent SQL injection attacks. [Citation Graph (, )][DBLP]
From desktop to mobile: Examining the security experience. [Citation Graph (, )][DBLP]
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. [Citation Graph (, )][DBLP]
Detecting rogue access points using client-side bottleneck bandwidth analysis. [Citation Graph (, )][DBLP]
An incremental frequent structure mining framework for real-time alert correlation. [Citation Graph (, )][DBLP]
Preventing massive automated access to web resources. [Citation Graph (, )][DBLP]
Information security: The moving target. [Citation Graph (, )][DBLP]
Reliable and fully distributed trust model for mobile ad hoc networks. [Citation Graph (, )][DBLP]
How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management. [Citation Graph (, )][DBLP]
Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions. [Citation Graph (, )][DBLP]
|