Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2629)
Editorial
(398)
by Journal
by Funding Agency
Clear filters
Powered by
79 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: K.6.5 - Security and Protection
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
6
7
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Internet Payment System: A New Payment System for Internet Transactions
Zoran Đurić
,
Ognjen Marić
,
Dragan Gašević
10.3217/jucs-013-04-0479
28-04-2007
Unique: 344 | Total: 426
| Access Period:
479-503
HTML
XML
PDF
Research Article
A Collaborative Biomedical Research System
Adel Taweel
,
Alan Rector
,
Jeremy Rogers
10.3217/jucs-012-01-0080
28-01-2006
Unique: 356 | Total: 438
| Access Period:
80-98
HTML
XML
PDF
Research Article
RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature Encryption
Aleksandra Nenadic
,
Ning Zhang
,
Barry Cheetham
,
Carole Goble
10.3217/jucs-011-01-0175
28-01-2005
Unique: 327 | Total: 420
| Access Period:
175-192
HTML
XML
PDF
Research Article
A Reference Model for Security Level Evaluation: Policy and Fuzzy Techniques
Valentina Casola
,
Rosa Preziosi
,
Massimiliano Rak
10.3217/jucs-011-01-0150
28-01-2005
Unique: 312 | Total: 377
| Access Period:
150-174
HTML
XML
PDF
Research Article
ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention
Sachin Joglekar
,
Stephen Tate
10.3217/jucs-011-01-0083
28-01-2005
Unique: 316 | Total: 371
| Access Period:
83-103
HTML
XML
PDF
Research Article
Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases
Ahmad Baraani-Dastjerdi
,
Josef Pieprzyk
,
Reihaneh Safavi-Naini
,
Janusz Getta
10.3217/jucs-003-06-0730
28-06-1997
Unique: 371 | Total: 432
| Access Period:
730-753
HTML
XML
PDF
Research Article
Levels of Anonymity
Bill Flinn
,
Hermann Maurer
10.3217/jucs-001-01-0035
28-01-1995
Unique: 362 | Total: 432
| Access Period:
35-47
HTML
XML
PDF
6
7
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK