The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2004, volume: 23, number: 8

  1. E. Eugene Schultz
    Is the U.S. government really getting serious about information security? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:8, pp:621-622 [Journal]
  2. Sebastiaan H. von Solms, Emil Marais
    From secure wired networks to secure wireless networks - what are the extra risks? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:8, pp:633-637 [Journal]
  3. Shaun Posthumus, Rossouw von Solms
    A framework for the governance of information security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:8, pp:638-646 [Journal]
  4. Axelle Apvrille, Makan Pourzandi
    XML distributed security policy for clusters. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:8, pp:649-658 [Journal]
  5. Cungang Yang, Celia Li
    Access control in a hierarchy using one-way hash functions. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:8, pp:659-664 [Journal]
  6. Li-Chiou Chen, Thomas A. Longstaff, Kathleen M. Carley
    Characterization of defense mechanisms against distributed denial of service attacks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:8, pp:665-678 [Journal]
  7. Afzel Noore, Nikhil Tungala, Max M. Houck
    Embedding biometric identifiers in 2D barcodes for improved security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:8, pp:679-686 [Journal]
  8. Rachid Beghdad
    Modelling and solving the intrusion detection problem in computer networks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:8, pp:687-696 [Journal]
  9. Yanjiang Yang, Shuhong Wang, Feng Bao, Jie Wang, Robert H. Deng
    New efficient user identification and key distribution scheme providing enhanced security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:8, pp:697-704 [Journal]
  10. Heba Kamal Aslan
    A hybrid scheme for multicast authentication over lossy networks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:8, pp:705-713 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002