|
Journals in DBLP
- E. Eugene Schultz
Security dilemmas with Microsoft's Internet Explorer. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:3, pp:175-176 [Journal]
Security views - Malware update. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:3, pp:177-187 [Journal]
Smart card based authentication - any future? [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:3, pp:188-191 [Journal]
- Almut Herzog, Nahid Shahmehri
Performance of the Java security manager. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:3, pp:192-207 [Journal]
- Faisal Nabi
Secure business application logic for e-commerce systems. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:3, pp:208-217 [Journal]
- Xiu-Zhen Chen, Qing-Hua Zheng, Xiao-Hong Guan, Chen-Guang Lin, Jie Sun
Multiple behavior information fusion based quantitative threat evaluation. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:3, pp:218-231 [Journal]
- Konstantinos Rantos, Chris J. Mitchell
Matching key recovery mechanisms to business requirements. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:3, pp:232-245 [Journal]
- Maria Karyda, Evangelos A. Kiountouzis, Spyros Kokolakis
Information systems security policies: a contextual perspective. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:3, pp:246-260 [Journal]
|