The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2004, volume: 23, number: 7

  1. E. Eugene Schultz
    The gap between cryptography and information security: has it narrowed? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:7, pp:531-532 [Journal]
  2. E. Eugene Schultz
    Security views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:7, pp:533-541 [Journal]
  3. Steve Purser
    Improving the ROI of the security management process. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:7, pp:542-546 [Journal]
  4. Ming Li
    An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:7, pp:549-558 [Journal]
  5. Marijke Coetzee, Jan H. P. Eloff
    Towards Web Service access control. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:7, pp:559-570 [Journal]
  6. Tian-Fu Lee, Tzonelih Hwang, Chun-Li Lin
    Enhanced three-party encrypted key exchange without server public keys. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:7, pp:571-577 [Journal]
  7. Javier Lopez, Rolf Oppliger, Günther Pernul
    Authentication and authorization infrastructures (AAIs): a comparative survey. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:7, pp:578-590 [Journal]
  8. Jae-Myeong Jeon, Yon Dohn Chung, Myoung-Ho Kim, Yoon-Joon Lee
    Filtering XPath expressions for XML access control. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:7, pp:591-605 [Journal]
  9. Andrew Teoh Beng Jin, David Ngo Chek Ling, Alwyn Goh
    Personalised cryptographic key generation based on FaceHashing. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:7, pp:606-614 [Journal]
  10. Shin-Jia Hwang, Ching-Chung Chan
    Improvement on Li et al.'s generalization of proxy signature schemes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:7, pp:615-619 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002