|
Journals in DBLP
- E. Eugene Schultz
Incident response teams need to change. [Citation Graph (0, 0)][DBLP] Computers & Security, 2004, v:23, n:2, pp:87-88 [Journal]
- Mohammad Peyravian, Allen Roginsky, Nevenko Zunic
Non-PKI methods for public key distribution. [Citation Graph (0, 0)][DBLP] Computers & Security, 2004, v:23, n:2, pp:97-103 [Journal]
- Horng-Twu Liaw
A secure electronic voting protocol for general elections. [Citation Graph (0, 0)][DBLP] Computers & Security, 2004, v:23, n:2, pp:107-119 [Journal]
- Tzong-Sun Wu, Chien-Lung Hsu
Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks. [Citation Graph (0, 0)][DBLP] Computers & Security, 2004, v:23, n:2, pp:120-125 [Journal]
- Chang-Joo Moon, Dae-Ha Park, Soung-Jin Park, Doo-Kwon Baik
Symmetric RBAC model that takes the separation of duty and role hierarchies into consideration. [Citation Graph (0, 0)][DBLP] Computers & Security, 2004, v:23, n:2, pp:126-136 [Journal]
- Theodore Stergiou, Mark S. Leeson, Roger J. Green
An alternative architectural framework to the OSI security model. [Citation Graph (0, 0)][DBLP] Computers & Security, 2004, v:23, n:2, pp:137-153 [Journal]
- Allister Cournane, Ray Hunt
An analysis of the tools used for the generation and prevention of spam. [Citation Graph (0, 0)][DBLP] Computers & Security, 2004, v:23, n:2, pp:154-166 [Journal]
- Wen-Shenq Juang
Efficient password authenticated key agreement using smart cards. [Citation Graph (0, 0)][DBLP] Computers & Security, 2004, v:23, n:2, pp:167-173 [Journal]
- Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Yang
An improvement of nonrepudiable threshold proxy signature scheme with known signers. [Citation Graph (0, 0)][DBLP] Computers & Security, 2004, v:23, n:2, pp:174-178 [Journal]
|