The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2003, volume: 22, number: 8

  1. E. Eugene Schultz
    Information security and the media. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:8, pp:652-653 [Journal]
  2. E. Eugene Schultz
    Security views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:8, pp:654-663 [Journal]
  3. Stephen Hinde
    Computer security: Mapping the future. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:8, pp:664-669 [Journal]
  4. Hank Wolfe
    Setting up an electronic evidence forensics laboratory. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:8, pp:670-672 [Journal]
  5. Jay G. Heiser
    Beyond cryptography: Bruce Schneier's Beyond Fear: thinking sensibly about security in an uncertain world. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:8, pp:673-674 [Journal]
  6. J. Johnston, Jan H. P. Eloff, Les Labuschagne
    Security and human computer interfaces. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:8, pp:675-684 [Journal]
  7. John Leach
    Improving user security behaviour. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:8, pp:685-692 [Journal]
  8. Aykut Guven, Ibrahim Sogukpinar
    Understanding users' keystroke patterns for computer access security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:8, pp:695-706 [Journal]
  9. John Reinke, Hossein Saiedian
    The availability of source code in relation to timely response to security vulnerabilities. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:8, pp:707-724 [Journal]
  10. Ke-Fei Chen, Sheng Zhong
    Attacks on the (enhanced) Yang-Shieh authentication. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:8, pp:725-727 [Journal]
  11. Chin-Chen Chang, Ya-Fen Chang
    Efficient anonymous auction protocols with freewheeling bids. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:8, pp:728-734 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002