The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
1992, volume: 11, number: 2

  1. Harold Joseph Highland
    Random bits & bytes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:2, pp:110-120 [Journal]
  2. Belden Menkus
    Introduction to computer security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:2, pp:121-127 [Journal]
  3. Robin L. Sherman
    Biometrics futures. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:2, pp:128-133 [Journal]
  4. Dimitris Gritzalis, Sokratis K. Katsikas, J. Keklikoglou, A. Tomaras
    Determining access rights for medical information systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:2, pp:149-161 [Journal]
  5. P. Venkat Rangan
    An axiomatic theory of trust in secure communication protocols. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:2, pp:163-172 [Journal]
  6. Rotraut Laun
    Asymmetric user authentication. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:2, pp:173-183 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002