Journals in DBLP
E. Eugene Schultz About "Unofficial patches". [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:2, pp:79-80 [Journal ] Danny Bradbury The metamorphosis of malware writers. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:2, pp:89-90 [Journal ] Vicki Miller Luoma Computer forensics and electronic discovery: The new management challenge. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:2, pp:91-96 [Journal ] Vafa D. Izadinia , Derrick G. Kourie , Jan H. P. Eloff Uncovering identities: A study into VPN tunnel fingerprinting. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:2, pp:97-105 [Journal ] Hsiang-An Wen , Chun-Li Lin , Tzonelih Hwang Provably secure authenticated key exchange protocols for low power computing clients. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:2, pp:106-113 [Journal ] Vipul Goyal , Virendra Kumar , Mayank Singh , Ajith Abraham , Sugata Sanyal A new protocol to counter online dictionary attacks. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:2, pp:114-120 [Journal ] Nikos Komninos , Dimitris Vergados , Christos Douligeris Layered security design for mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:2, pp:121-130 [Journal ] Raphael Chung-Wei Phan , David Wagner Security considerations for incremental hash functions based on pair block chaining. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:2, pp:131-136 [Journal ] Krishna Sampigethaya , Radha Poovendran A framework and taxonomy for comparison of electronic voting schemes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:2, pp:137-153 [Journal ]