The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2003, volume: 22, number: 7

  1. E. Eugene Schultz
    Patching Pandemonium. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:7, pp:556-558 [Journal]

  2. Security Views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:7, pp:559-569 [Journal]
  3. Stephen Hinde
    Nimbyism, dominoes and creaking infrastructure. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:7, pp:570-576 [Journal]
  4. Hank Wolfe
    Forensic evidence testimony - some thoughts. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:7, pp:577-579 [Journal]
  5. Rolf Moulton, Robert S. Coles
    Applying information security governance. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:7, pp:580-584 [Journal]
  6. Nicolas Sklavos, Odysseas G. Koufopavlou
    Data dependent rotations, a trustworthy approach for future encryption systems/ciphers: low cost and high performance. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:7, pp:585-588 [Journal]
  7. Jau-Ji Shen, Chih-Wei Lin, Min-Shiang Hwang
    Security enhancement for the timestamp-based password authentication scheme using smart cards. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:7, pp:591-595 [Journal]
  8. Sang Hyun Oh, Won Suk Lee
    An anomaly intrusion detection method by clustering normal user behavior. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:7, pp:596-612 [Journal]
  9. Sang-Jun Han, Sung-Bae Cho
    Detecting intrusion with rule-based integration of multiple models. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:7, pp:613-623 [Journal]
  10. Harold W. Thimbleby
    The reduced Enigma. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:7, pp:624-642 [Journal]
  11. Bin Wang, Jian-Hua Li, Zhi-Peng Tong
    Cryptanalysis of an enhanced timestamp-based password authentication scheme. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:7, pp:643-645 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002