The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2003, volume: 22, number: 5

  1. E. Eugene Schultz
    Pandora's Box: spyware, adware, autoexecution, and NGSCB. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:5, pp:366-367 [Journal]
  2. E. Eugene Schultz
    Security Views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:5, pp:368-377 [Journal]
  3. Stephen Hinde
    Privacy legislation: a comparison of the US and European approaches. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:5, pp:378-387 [Journal]
  4. Hank Wolfe
    Encountering encryption. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:5, pp:388-391 [Journal]
  5. Eve Edelson
    The 419 scam: information warfare on the spam front and a proposal for local filtering. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:5, pp:392-401 [Journal]
  6. Fred Cohen, Deanna Koike
    Leading attackers through attack graphs with deceptions. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:5, pp:402-411 [Journal]
  7. Scott A. Vanstone
    Next generation security for wireless: elliptic curve cryptography. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:5, pp:412-415 [Journal]
  8. Andrew Harding
    SSL Virtual Private Networks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:5, pp:416-420 [Journal]
  9. Martin Botha, Rossouw von Solms
    Utilising fuzzy logic and trend analysis for effective intrusion detection. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:5, pp:423-434 [Journal]
  10. Gonzalo Álvarez, Slobodan Petrovic
    A new taxonomy of Web attacks suitable for efficient encoding. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:5, pp:435-449 [Journal]
  11. Sheng Zhong, Tianwen Lin
    A comment on the Chen-Chung scheme for hierarchical access control. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:5, pp:450-452 [Journal]
  12. Chien-Lung Hsu, Tzong-Sun Wu
    Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:5, pp:453-456 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002