|
Journals in DBLP
- E. Eugene Schultz
Patching Pandemonium. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:7, pp:556-558 [Journal]
Security Views. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:7, pp:559-569 [Journal]
- Stephen Hinde
Nimbyism, dominoes and creaking infrastructure. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:7, pp:570-576 [Journal]
- Hank Wolfe
Forensic evidence testimony - some thoughts. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:7, pp:577-579 [Journal]
- Rolf Moulton, Robert S. Coles
Applying information security governance. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:7, pp:580-584 [Journal]
- Nicolas Sklavos, Odysseas G. Koufopavlou
Data dependent rotations, a trustworthy approach for future encryption systems/ciphers: low cost and high performance. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:7, pp:585-588 [Journal]
- Jau-Ji Shen, Chih-Wei Lin, Min-Shiang Hwang
Security enhancement for the timestamp-based password authentication scheme using smart cards. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:7, pp:591-595 [Journal]
- Sang Hyun Oh, Won Suk Lee
An anomaly intrusion detection method by clustering normal user behavior. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:7, pp:596-612 [Journal]
- Sang-Jun Han, Sung-Bae Cho
Detecting intrusion with rule-based integration of multiple models. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:7, pp:613-623 [Journal]
- Harold W. Thimbleby
The reduced Enigma. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:7, pp:624-642 [Journal]
- Bin Wang, Jian-Hua Li, Zhi-Peng Tong
Cryptanalysis of an enhanced timestamp-based password authentication scheme. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:7, pp:643-645 [Journal]
|