Journals in DBLP
Sead Muftic Editorial. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1994, v:17, n:7, pp:451-452 [Journal ] Dorothy E. Denning The US key escrow encryption technology. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1994, v:17, n:7, pp:453-457 [Journal ] Rainer A. Rueppel , Paul C. van Oorschot Modern key agreement techniques. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1994, v:17, n:7, pp:458-465 [Journal ] Thomas Beth , Fritz Bauspieß , Hans-Joachim Knobloch , Steffen Stempel TESS: A security system based on discrete exponentiation. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1994, v:17, n:7, pp:466-475 [Journal ] Per Kaijser Security protection for parts of a data structure. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1994, v:17, n:7, pp:476-482 [Journal ] John Linn Generic interface to security services. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1994, v:17, n:7, pp:483-491 [Journal ] Sead Muftic , Morris Sloman Security architecture for distributed systems. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1994, v:17, n:7, pp:492-500 [Journal ] Per Kaijser , Tom Parker , Denis Pinkas SESAME: The solution to security for open distributed systems. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1994, v:17, n:7, pp:501-518 [Journal ] Peter T. Kirstein , Peter Williams Piloting authentication and security services in the 'PASSWORD' project. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1994, v:17, n:7, pp:519-531 [Journal ] Terry Dosdale Security in EDIFACT systems. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1994, v:17, n:7, pp:532-537 [Journal ] Stephan Lechner SAMSON: Management of security in open systems. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1994, v:17, n:7, pp:538-543 [Journal ] Ahmed Patel Security management for OSI networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1994, v:17, n:7, pp:544-553 [Journal ]