|
Journals in DBLP
From the editor-in-chief: Virus and worm trends. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:3, pp:174-175 [Journal]
- E. Eugene Schultz
Security views. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:3, pp:176-187 [Journal]
- Stephen Hinde
Cyber-terrorism in context. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:3, pp:188-192 [Journal]
- Hank Wolfe
Evidence acquisition. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:3, pp:193-195 [Journal]
- Hassan Aljifri, Diego Sánchez Navarro
International legal aspects of cryptography: Understanding cryptography. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:3, pp:196-203 [Journal]
- Rolf Moulton, Robert S. Coles
A contest to evaluate IT security services management. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:3, pp:204-206 [Journal]
- Chris Pounder
Governments act to improve security. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:3, pp:207-211 [Journal]
- Seny Kamara, Sonia Fahmy, E. Eugene Schultz, Florian Kerschbaum, Michael Frantzen
Analysis of vulnerabilities in Internet firewalls. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:3, pp:214-232 [Journal]
- Helen van de Haar, Rossouw von Solms
A model for deriving information security control attribute profiles. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:3, pp:233-244 [Journal]
- Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang
Generalization of proxy signature-based on discrete logarithms. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:3, pp:245-255 [Journal]
- Phillip J. Brooke, Richard F. Paige
Fault trees for security system design and analysis. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:3, pp:256-264 [Journal]
|