The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2005, volume: 24, number: 3

  1. E. Eugene Schultz
    Security dilemmas with Microsoft's Internet Explorer. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:3, pp:175-176 [Journal]

  2. Security views - Malware update. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:3, pp:177-187 [Journal]

  3. Smart card based authentication - any future? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:3, pp:188-191 [Journal]
  4. Almut Herzog, Nahid Shahmehri
    Performance of the Java security manager. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:3, pp:192-207 [Journal]
  5. Faisal Nabi
    Secure business application logic for e-commerce systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:3, pp:208-217 [Journal]
  6. Xiu-Zhen Chen, Qing-Hua Zheng, Xiao-Hong Guan, Chen-Guang Lin, Jie Sun
    Multiple behavior information fusion based quantitative threat evaluation. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:3, pp:218-231 [Journal]
  7. Konstantinos Rantos, Chris J. Mitchell
    Matching key recovery mechanisms to business requirements. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:3, pp:232-245 [Journal]
  8. Maria Karyda, Evangelos A. Kiountouzis, Spyros Kokolakis
    Information systems security policies: a contextual perspective. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:3, pp:246-260 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002