The SCEAS System
Navigation Menu

Journals in DBLP

Computer Communications
1994, volume: 17, number: 7

  1. Sead Muftic
    Editorial. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:7, pp:451-452 [Journal]
  2. Dorothy E. Denning
    The US key escrow encryption technology. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:7, pp:453-457 [Journal]
  3. Rainer A. Rueppel, Paul C. van Oorschot
    Modern key agreement techniques. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:7, pp:458-465 [Journal]
  4. Thomas Beth, Fritz Bauspieß, Hans-Joachim Knobloch, Steffen Stempel
    TESS: A security system based on discrete exponentiation. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:7, pp:466-475 [Journal]
  5. Per Kaijser
    Security protection for parts of a data structure. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:7, pp:476-482 [Journal]
  6. John Linn
    Generic interface to security services. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:7, pp:483-491 [Journal]
  7. Sead Muftic, Morris Sloman
    Security architecture for distributed systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:7, pp:492-500 [Journal]
  8. Per Kaijser, Tom Parker, Denis Pinkas
    SESAME: The solution to security for open distributed systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:7, pp:501-518 [Journal]
  9. Peter T. Kirstein, Peter Williams
    Piloting authentication and security services in the 'PASSWORD' project. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:7, pp:519-531 [Journal]
  10. Terry Dosdale
    Security in EDIFACT systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:7, pp:532-537 [Journal]
  11. Stephan Lechner
    SAMSON: Management of security in open systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:7, pp:538-543 [Journal]
  12. Ahmed Patel
    Security management for OSI networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:7, pp:544-553 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002