The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Denis Trcek: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Denis Trcek
    Trust formalization - from taxonomy to modeling and simulation framework. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering, 2004, pp:297-302 [Conf]
  2. Borka Jerman-Blazic, Denis Trcek, Tomaz Klobucar, Franc Bracun
    A Tool for Support of Key Distribution and Validity Certificate Check in Global Directory Service. [Citation Graph (0, 0)][DBLP]
    INDC, 1994, pp:381-390 [Conf]
  3. Burkhard Stiller, Pere Barlet-Ros, John Cushnie, Jordi Domingo-Pascual, David Hutchison, Rui J. Lopes, Andreas Mauthe, Mihai Popa, James Roberts, Josep Solé-Pareta, Denis Trcek, Carlos Veciana-Nogués
    Pricing and QoS. [Citation Graph (0, 0)][DBLP]
    QofIS Final Report, 2003, pp:263-291 [Conf]
  4. Denis Trcek, Borka Jerman-Blazic
    Certification Authorities in a Global Network - Procedures and Guidelines for a Public Key Infrastructure. [Citation Graph (0, 0)][DBLP]
    Australian Computer Journal, 1997, v:29, n:2, pp:41-47 [Journal]
  5. Borka Jerman-Blazic, Denis Trcek, Tomaz Klobucar, Franc Bracun
    A Tool for Support of Key Distribution and Validity Certificate Check in Global Directory Service. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1996, v:28, n:5, pp:709-717 [Journal]
  6. Denis Trcek
    Security policy conceptual modeling and formalization for networked information systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1716-1723 [Journal]
  7. Denis Trcek, Borka Jerman-Blazic
    Formal language for security services base modelling and analysis. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1995, v:18, n:12, pp:921-928 [Journal]
  8. Denis Trcek
    Security Models: Refocusing on the Human Factor. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2006, v:39, n:11, pp:103-104 [Journal]
  9. Denis Trcek
    MAC Based Lightweight Protocols for Strong Authentication and Key Exchange. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2005, v:21, n:4, pp:753-765 [Journal]

  10. System Dynamics Based Risk Management for Distributed Information Systems. [Citation Graph (, )][DBLP]


  11. Security policy management for networked information systems. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002