The SCEAS System
Navigation Menu

Journals in DBLP

Computer Communications
2000, volume: 23, number: 17

  1. Madjid Merabti, Qi Shi, Rolf Oppliger
    Advanced security techniques for network protection. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1581-1583 [Journal]
  2. Along Lin, R. Brown
    The application of security policy to role-based access control and the common data security architecture. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1584-1593 [Journal]
  3. Stephane Doyon, Mourad Debbabi
    On object initialization in the Java bytecode. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1594-1605 [Journal]
  4. Jianying Zhou
    Further analysis of the Internet key exchange protocol. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1606-1612 [Journal]
  5. Paul Ashley, Mark Vandenwauver, Frank Siebenlist
    Applying authorization to intranets: architectures, issues and APIs. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1613-1620 [Journal]
  6. Ross J. Anderson, Jong-Hyeon Lee
    Jikzi - a new framework for security policy, trusted publishing and electronic commerce. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1621-1626 [Journal]
  7. N. Asokan, Philip Ginzboorg
    Key agreement in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1627-1637 [Journal]
  8. Seong-Min Hong, Seungwon Lee, Yongsoo Park, Yookun Cho, Hyunsoo Yoon
    On the construction of a powerful distributed authentication server without additional key management. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1638-1644 [Journal]
  9. Maria Felicia Florio, Roberto Gorrieri, Gianluigi Marchetti
    Coping with denial of service due to malicious Java applets. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1645-1654 [Journal]
  10. Pascal Urien
    Internet card, a smart card as a true Internet node. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1655-1666 [Journal]
  11. Wayne A. Jansen
    Countermeasures for mobile agent security. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1667-1676 [Journal]
  12. Chun-I Fan, Wei-Kuei Chen, Yi-Shiung Yeh
    Randomization enhanced Chaum's blind signature scheme. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1677-1680 [Journal]
  13. Lakshminath R. Dondeti, Sarit Mukherjee, Ashok Samal
    Scalable secure one-to-many group communication using dual encryption. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1681-1701 [Journal]
  14. Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia
    Modeling requests among cooperating intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1702-1715 [Journal]
  15. Denis Trcek
    Security policy conceptual modeling and formalization for networked information systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1716-1723 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002