Richard Barber Implementing Public Key Infrastructures in a Dynamic Business Environment. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:3, pp:230-233 [Journal]
Richard Barber Security in a Mobile World Is Bluetooth the Answer? [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:4, pp:321-325 [Journal]
Richard Barber The Evolution of Intrusion Detection Systems The Next Step. [Citation Graph (0, 0)][DBLP] Computers & Security, 2001, v:20, n:2, pp:132-145 [Journal]
Richard Barber Security in a Mobile World - is Bluetooth the Answer? [Citation Graph (0, 0)][DBLP] Computers & Security, 2001, v:20, n:5, pp:374-379 [Journal]
Search in 0.001secs, Finished in 0.001secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP