Journals in DBLP
From the editor-in-chief: Gartner's prediction concerning intrusion detection systems: sense or nonsense? [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:6, pp:462-463 [Journal ] E. Eugene Schultz Security views: Online piracy battle heats up in US. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:6, pp:464-473 [Journal ] Stephen Hinde Spam: the evolution of a nuisance. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:6, pp:474-478 [Journal ] Presenting the Evidence Report: Introduction. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:6, pp:479-481 [Journal ] John Leach Security engineering and security RoI. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:6, pp:482-486 [Journal ] Robert S. Coles , Rolf Moulton Operationalizing IT Risk Management. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:6, pp:487-493 [Journal ] Andrew Blyth , Daniel Cunliffe , Iain Sutherland Security analysis of XML usage and XML parsing. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:6, pp:494-505 [Journal ] Christopher Kelly , Chris Nelms Roadmap to checking data migration. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:6, pp:506-510 [Journal ] Elisa Bertino RBAC models - concepts and trends. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:6, pp:511-514 [Journal ] Brian McKenna Web services set to provoke new sthreats: Preview of Compsec 2003, 30 Oct-1 Nov, Queen Elizabeth II Conference Centre, Westminster, London, UK. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:6, pp:515-516 [Journal ] Hung-Yu Chien , Jinn-ke Jan New hierarchical assignment without Public Key cryptography. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:6, pp:523-526 [Journal ] Tzer-Shyong Chen , Yu-Fang Chung , Gwo-Shiuan Huang Efficient proxy multisignature schemes based on the elliptic curve cryptosystem. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:6, pp:527-534 [Journal ] Kwok-Yan Lam , Siu Leung Chung , Ming Gu , Jia-Guang Sun Security middleware for enhancing interoperability of Public Key Infrastructure. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:6, pp:535-546 [Journal ] Shyi-Tsong Wu , Bin-Chang Chieu A user friendly remote authentication scheme with smart cards. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:6, pp:547-550 [Journal ]