Journals in DBLP
E. Eugene Schultz Microsoft is back in the hot seat. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:6, pp:393-394 [Journal ] Danny Bradbury Microsoft's new window on security. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:6, pp:405-407 [Journal ] Rossouw von Solms , Sebastiaan H. von Solms Information Security Governance: A model based on the Direct-Control Cycle. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:6, pp:408-412 [Journal ] Bilge Karabacak , Ibrahim Sogukpinar A quantitative method for ISO 17799 gap analysis. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:6, pp:413-419 [Journal ] Kumar Mangipudi , Rajendra Katti A Secure Identification and Key agreement protocol with user Anonymity (SIKA). [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:6, pp:420-425 [Journal ] Hamida Seba FTKM: A fault-tolerant key management protocol for multicast communications. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:6, pp:426-434 [Journal ] Dong Jin Kwak , Sang-Jae Moon , Guilin Wang , Robert H. Deng A secure extension of the Kwak-Moon group signcryption scheme. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:6, pp:435-444 [Journal ] A. A. Abimbola , Jose Munoz , William J. Buchanan NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:6, pp:445-451 [Journal ] Emrah Tomur , Y. Murat Erten Application of temporal and spatial role based access control in 802.11 wireless networks. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:6, pp:452-458 [Journal ] Morteza Amini , Rasool Jalili , Hamid Reza Shahriari RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:6, pp:459-468 [Journal ] Zhi-hong Zuo , Qing-xin Zhu , Ming-Tian Zhou Infection, imitation and a hierarchy of computer viruses. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:6, pp:469-473 [Journal ]