The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2000, volume: 19, number: 1

  1. Bill Hancock
    Mass Network Flooding Attacks (Distributed Denial of Service - DDoS) Surface in the Wild. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:6-7 [Journal]
  2. Bill Hancock
    Cell Phone Crypto Cracked. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:7-8 [Journal]
  3. Bill Hancock
    Clinton's Proposed Crypto Regulations Under Attack. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:8-9 [Journal]
  4. Bill Hancock
    Overhauling the National Security Agency? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:9-10 [Journal]
  5. Bill Hancock
    Down Under, Hacking Private Computers by the Government is Legal. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:10-12 [Journal]
  6. Bill Hancock
    The "S" in SAP Doesn't Stand for Security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:12-13 [Journal]
  7. Bill Hancock
    New York Times Fires Employees for Violating Internal E-mail Policies. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:12-12 [Journal]
  8. Bill Hancock
    Melissa Virus Creator Pleads Guilty. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:13-13 [Journal]
  9. Bill Hancock
    `Anonymizing' Software Causes Law Enforcement Concerns. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:13-14 [Journal]
  10. Bill Hancock
    Security Problems Go Mobile In Your Next Car. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:14-16 [Journal]
  11. Bill Hancock
    The L0pht Goes Corporate and becomes @Stake. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:16-17 [Journal]
  12. Chuck Williams, Nevenko Zunic, Stephen M. Matyas, Sarbari Gupta, Michael Willett
    Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:18-20 [Journal]
  13. Michael Smith, Paul C. van Oorschot, Michael Willett
    Cryptographic Information Recovery Using Key Recover. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:21-27 [Journal]
  14. Michael Willett
    Features, Attributes, Characteristics, and Traits (FACTs) of Key Recovery Schemes/Products. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:28-30 [Journal]
  15. John Kennedy, Stephen M. Matyas, Nevenko Zunic
    Key Recovery Functional Model. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:31-36 [Journal]
  16. Stephen M. Matyas, Nevenko Zunic
    Additional Key Recovery Function. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:37-40 [Journal]
  17. Sarbari Gupta
    A Common Key Recovery Block Format: Promoting Interoperability Between Dissimilar Key Recovery Mechanisms. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:41-47 [Journal]
  18. Chuck Williams, Nevenko Zunic
    Global Interoperability for Key Recovery. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:48-55 [Journal]
  19. Sarbari Gupta, Stephen M. Matyas
    Public Key Infrastructure: Analysis of Existing and Needed Protocols and Object Formats for Key Recovery. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:56-68 [Journal]
  20. Abby Maclean, Stephen M. Matyas, Nevenko Zunic
    Organization Implementation Guidelines for Recovery of Encrypted Information. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:69-81 [Journal]
  21. Nevenko Zunic
    Organization Considerations for Retrieval of Stored Data via Key Recovery Methods. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:82-85 [Journal]
  22. Tom Markham, Chuck Williams
    Key Recovery Header for IPSEC. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:86-90 [Journal]
  23. David M. Balenson, Tom Markham
    ISAKMP Key Recovery Extension. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:91-99 [Journal]
  24. Timothy G. Shoriak
    SSL/TLS Protocol Enablement for Key Recovery. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:1, pp:100-104 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002