The SCEAS System
Navigation Menu

Journals in DBLP

Computers & Security
2000, volume: 19, number: 5

  1. Bill Hancock
    Security Views. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:382-383 [Journal]
  2. Bill Hancock
    "I Agree" Legal Agreements Get Legislated. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:383-384 [Journal]
  3. Bill Hancock
    The US Government Tells Its Users to Clean Up Their E-mail. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:385-387 [Journal]
  4. Bill Hancock
    Home PC's Targeted by Hackers (Duh!). [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:387-388 [Journal]
  5. Bill Hancock
    CIO's Get Serious About Best Security Practices. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:388-388 [Journal]
  6. Bill Hancock
    Yahoo Faces Identity Crisis. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:389-389 [Journal]
  7. Bill Hancock
    Microsoft a Popular Virus Target Due to Ubiquity. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:389-391 [Journal]
  8. Bill Hancock
    UK's RIP Bill Creates Official Snooping. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:391-392 [Journal]
  9. Bill Hancock
    Extortion Going Online. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:392-393 [Journal]
  10. Bill Hancock
    Office 2000 Patch Recommended by CERT. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:393-393 [Journal]
  11. Bill Hancock
    Self-Regulation for Privacy Doesn't Work Says FTC. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:393-394 [Journal]
  12. Bill Hancock
    ...But the Industry Wants Self-Regulation. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:394-395 [Journal]
  13. Bill Hancock
    US Senate Wakes Up to Need for Cybertools for Law Enforcers. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:395-396 [Journal]
  14. Bill Hancock
    PGP V5.0 Keys Potentially Insecure. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:396-397 [Journal]
  15. Bill Hancock
    Canadian Credit Card Conundrum Caused by a Cracker. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:397-398 [Journal]
  16. Bill Hancock
    Suspect Charged in `Love Bug' Worm has Charges Dropped. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:398-398 [Journal]
  17. Bill Hancock
    Network Solutions Re-evaluates Security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:398-400 [Journal]
  18. Bill Hancock
    CMU Sets Up a Sister to CERT. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:400-401 [Journal]
  19. Bill Hancock
    Speedy Response Yields Success at DOE. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:401-401 [Journal]
  20. Bill Hancock
    AOL Gets Busted - Again. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:402-402 [Journal]
  21. Bill Hancock
    Who's to Blame? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:402-403 [Journal]
  22. Bill Hancock
    Wireless Ubiquity for E-Biz. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:403-403 [Journal]
  23. Bill Hancock
    Isn't It Interesting What You Can Buy At An Auction Site? TV's, Computers, Drugs. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:404-405 [Journal]
  24. Bill Hancock
    And Now, the Bug-in-Your-Site Award Goes To.... [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:404-404 [Journal]
  25. Bill Hancock
    G8 Thinks About Cybercrime (It's About Time, Too). [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:405-407 [Journal]
  26. Stephen Hinde
    Love Conquers All? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:408-420 [Journal]
  27. Gerald L. Kovacich
    Netspionage The Global Threat to Information, Part II: Information Collection in the Gray Zon. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:421-427 [Journal]
  28. Stephen M. Matyas, Jeff Stapleto
    A Biometric Standard for Information Management and Security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:428-441 [Journal]
  29. Yu-Lun Huang, Shiuh-Pyng Shieh, Fu-Shen Ho
    A Generic Electronic Payment Model Supporting Multiple Merchant Transactions. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:453-465 [Journal]
  30. Mohammad Peyravian, Nevenko Zunic
    Methods for Protecting Password Transmission. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:466-469 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002