The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2003, volume: 22, number: 6


  1. From the editor-in-chief: Gartner's prediction concerning intrusion detection systems: sense or nonsense? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:6, pp:462-463 [Journal]
  2. E. Eugene Schultz
    Security views: Online piracy battle heats up in US. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:6, pp:464-473 [Journal]
  3. Stephen Hinde
    Spam: the evolution of a nuisance. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:6, pp:474-478 [Journal]

  4. Presenting the Evidence Report: Introduction. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:6, pp:479-481 [Journal]
  5. John Leach
    Security engineering and security RoI. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:6, pp:482-486 [Journal]
  6. Robert S. Coles, Rolf Moulton
    Operationalizing IT Risk Management. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:6, pp:487-493 [Journal]
  7. Andrew Blyth, Daniel Cunliffe, Iain Sutherland
    Security analysis of XML usage and XML parsing. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:6, pp:494-505 [Journal]
  8. Christopher Kelly, Chris Nelms
    Roadmap to checking data migration. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:6, pp:506-510 [Journal]
  9. Elisa Bertino
    RBAC models - concepts and trends. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:6, pp:511-514 [Journal]
  10. Brian McKenna
    Web services set to provoke new sthreats: Preview of Compsec 2003, 30 Oct-1 Nov, Queen Elizabeth II Conference Centre, Westminster, London, UK. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:6, pp:515-516 [Journal]
  11. Hung-Yu Chien, Jinn-ke Jan
    New hierarchical assignment without Public Key cryptography. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:6, pp:523-526 [Journal]
  12. Tzer-Shyong Chen, Yu-Fang Chung, Gwo-Shiuan Huang
    Efficient proxy multisignature schemes based on the elliptic curve cryptosystem. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:6, pp:527-534 [Journal]
  13. Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun
    Security middleware for enhancing interoperability of Public Key Infrastructure. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:6, pp:535-546 [Journal]
  14. Shyi-Tsong Wu, Bin-Chang Chieu
    A user friendly remote authentication scheme with smart cards. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:6, pp:547-550 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002