The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Per Kaijser: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Per Kaijser
    A Review of the SESAME Development. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:1-8 [Conf]
  2. Per Kaijser
    On Authentication, Digital Signatures and Signature Laws. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:117-132 [Conf]
  3. Dimitris Androutsopoulos, Per Kaijser, Sokratis K. Katsikas, Kåre Presttun, Don Salmon, Paul G. Spirakis
    Surveillance and Protection in IBC Management: The Applicability of Two RACE Security Projects - SecureNet II and SESAME. [Citation Graph (0, 0)][DBLP]
    IS&N, 1994, pp:61-72 [Conf]
  4. R. Hunter, Per Kaijser, F. Nielsen
    ODA: a document architecture for open systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1989, v:12, n:2, pp:69-79 [Journal]
  5. Per Kaijser
    Security protection for parts of a data structure. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:7, pp:476-482 [Journal]
  6. Per Kaijser, Tom Parker, Denis Pinkas
    SESAME: The solution to security for open distributed systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:7, pp:501-518 [Journal]

Search in 0.001secs, Finished in 0.001secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002