Stephen Hinde Privacy legislation: a comparison of the US and European approaches. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:5, pp:378-387 [Journal]
Eve Edelson The 419 scam: information warfare on the spam front and a proposal for local filtering. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:5, pp:392-401 [Journal]
Chien-Lung Hsu, Tzong-Sun Wu Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:5, pp:453-456 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP