|
Journals in DBLP
- E. Eugene Schultz
Infosec certification: Which way do we turn from here? [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:8, pp:587-588 [Journal]
- E. Eugene Schultz
Security views. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:8, pp:589-598 [Journal]
- Nathan Friess, Ryan Vogt, John Aycock
Timing is everything. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:8, pp:599-603 [Journal]
- Stephen Flowerday, Rossouw von Solms
Real-time information integrity = system integrity + data integrity + continuous assurances. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:8, pp:604-613 [Journal]
- Haralambos Mouratidis
Safety and Security in Multiagent Systems: Report on the 2nd SASEMAS workshop (SASEMAS'05). [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:8, pp:614-617 [Journal]
- Chun-I Fan, Yung-Cheng Chan, Zhi-Kai Zhang
Robust remote authentication scheme with smart cards. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:8, pp:619-628 [Journal]
- Jun Jiang, Chen He, Ling-ge Jiang
A novel mix-based location privacy mechanism in Mobile IPv6. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:8, pp:629-641 [Journal]
- Fabrizio Baiardi, Alessandro Falleni, Riccardo Granchi, Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli
SEAS, a secure e-voting protocol: Design and implementation. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:8, pp:642-652 [Journal]
- Chuan-Kun Wu
Hash channels. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:8, pp:653-661 [Journal]
- Yun Wang
A multinomial logistic regression modeling approach for anomaly intrusion detection. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:8, pp:662-674 [Journal]
|