The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Chris Pounder: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chris Pounder
    Cyber crime: the backdrop to the Council of Europe Convention. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:4, pp:311-315 [Journal]
  2. Chris Pounder
    The Council of Europe Cyber-Crime Convention. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:5, pp:380-383 [Journal]
  3. Chris Pounder
    The European Union Proposal for a Policy Towards Network and Information Security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:7, pp:573-576 [Journal]
  4. Chris Pounder
    Anti-Terrorism Legislation: The Impact on The Processing of Data. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:3, pp:240-245 [Journal]
  5. Chris Pounder
    The emergence of a comprehensive obligation towards computer security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:4, pp:328-332 [Journal]
  6. Chris Pounder
    The US's National Strategy for Homeland Security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:6, pp:503-505 [Journal]
  7. Chris Pounder
    Security policy update. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:7, pp:620-623 [Journal]
  8. Chris Pounder
    A tangled Web of libel lies? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:1, pp:34-37 [Journal]
  9. Chris Pounder
    Security with unfortunate side effect. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:2, pp:115-118 [Journal]
  10. Chris Pounder
    Governments act to improve security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:3, pp:207-211 [Journal]
  11. Chris Pounder
    First steps towards a european union policy on the securing of electronic communications. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:7, pp:590-594 [Journal]
  12. Chris Pounder
    Homeworking: No longer an easy option? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:1, pp:27-30 [Journal]
  13. Chris Pounder
    Security and the new Data Protection law. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:2, pp:124-128 [Journal]
  14. Chris Pounder
    Further developments in the field of encryption and digital signatures. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:4, pp:308-312 [Journal]
  15. Chris Pounder
    European commission takes action to secure the internet. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:5, pp:392-396 [Journal]
  16. Chris Pounder
    The Annual Report of the UK Data Protection Registrar. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:6, pp:479-482 [Journal]
  17. Chris Pounder
    An initial plan of action for compliance with the UK's Data Protection Act 1998. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:1, pp:23-27 [Journal]
  18. Chris Pounder
    The revised version of BS7799 - so what's new? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:4, pp:307-311 [Journal]
  19. Chris Pounder, Freddy Kosten
    Year 2000: A Date with Destiny? [Citation Graph (0, 0)][DBLP]
    Journal of Information, Law and Technology, 1997, v:1997, n:3, pp:- [Journal]

Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002