The SCEAS System
Navigation Menu

Journals in DBLP

Computer Networks
1999, volume: 31, number: 8

  1. Refik Molva
    Internet security architecture. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:8, pp:787-804 [Journal]
  2. Hervé Debar, Marc Dacier, Andreas Wespi
    Towards a taxonomy of intrusion-detection systems. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:8, pp:805-822 [Journal]
  3. Carl M. Ellison
    The nature of a useable PKI. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:8, pp:823-830 [Journal]
  4. Sean W. Smith, Steve Weingart
    Building a high-performance, programmable secure coprocessor. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:8, pp:831-860 [Journal]
  5. N. Asokan, Hervé Debar, Michael Steiner, Michael Waidner
    Authenticating public terminals. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:8, pp:861-870 [Journal]
  6. Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik
    Untraceable mobility or how to travel incognito. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:8, pp:871-884 [Journal]
  7. Ralf C. Hauser, Tony Przygienda, Gene Tsudik
    Lowering security overhead in link state routing. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:8, pp:885-894 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002