|
Journals in DBLP
Security views: Malware update. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:1, pp:1-9 [Journal]
- Theodosios Tsiakis, George Stephanides
The concept of security and trust in electronic payments. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:1, pp:10-15 [Journal]
- Mariana Gerber, Rossouw von Solms
Management of risk in the information age. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:1, pp:16-30 [Journal]
- Simon Hansman, Ray Hunt
A taxonomy of network and computer attacks. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:1, pp:31-43 [Journal]
- Tianjie Cao, Dongdai Lin, Rui Xue
A randomized RSA-based partially blind signature scheme for electronic cash. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:1, pp:44-49 [Journal]
- Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
An improvement of Hwang-Lee-Tang's simple remote user authentication scheme. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:1, pp:50-56 [Journal]
- Yacine Challal, Abdelmadjid Bouabdallah, Hatem Bettahar
H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:1, pp:57-68 [Journal]
- Kerry-Lynn Thomson, Rossouw von Solms
Information security obedience: a definition. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:1, pp:69-75 [Journal]
- Ruishan Zhang, Kefei Chen
Improvements on the WTLS protocol to avoid denial of service attacks. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:1, pp:76-82 [Journal]
- Che Wun Chiou, Chiou-Yng Lee
Multiplexer-based double-exponentiation for normal basis of GF(2m). [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:1, pp:83-86 [Journal]
|