Search dblp for Publications

export results for "toc:db/journals/compsec/compsec23.bht:"

 download as .bib file

@article{DBLP:journals/compsec/AljifriN04,
  author       = {Hassan Aljifri and
                  Diego S{\'{a}}nchez Navarro},
  title        = {Search engines and privacy},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {5},
  pages        = {379--388},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2003.11.004},
  doi          = {10.1016/J.COSE.2003.11.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AljifriN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ApvrilleP04,
  author       = {Axelle Apvrille and
                  Makan Pourzandi},
  title        = {{XML} distributed security policy for clusters},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {8},
  pages        = {649--658},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.09.006},
  doi          = {10.1016/J.COSE.2004.09.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ApvrilleP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Artail04,
  author       = {Hassan Artail},
  title        = {Peer-assisted carrying authentication {(PACA)}},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {6},
  pages        = {478--488},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.04.003},
  doi          = {10.1016/J.COSE.2004.04.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Artail04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Aslan04,
  author       = {Heba Kamal Aslan},
  title        = {Logical analysis of AUTHMAC{\_}DH: a new protocol for authentication
                  and key distribution},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {290--299},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2003.11.002},
  doi          = {10.1016/J.COSE.2003.11.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Aslan04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Aslan04a,
  author       = {Heba Kamal Aslan},
  title        = {A scalable and distributed multicast security protocol using a subgroup-key
                  hierarchy},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {320--329},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2003.11.003},
  doi          = {10.1016/J.COSE.2003.11.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Aslan04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Aslan04b,
  author       = {Heba Kamal Aslan},
  title        = {A hybrid scheme for multicast authentication over lossy networks},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {8},
  pages        = {705--713},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.06.010},
  doi          = {10.1016/J.COSE.2004.06.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Aslan04b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BaumerEP04,
  author       = {David L. Baumer and
                  Julia Brande Earp and
                  J. C. Poindexter},
  title        = {Internet privacy law: a comparison between the United States and the
                  European Union},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {5},
  pages        = {400--412},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2003.11.001},
  doi          = {10.1016/J.COSE.2003.11.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BaumerEP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Beghdad04,
  author       = {Rachid Beghdad},
  title        = {Modelling and solving the intrusion detection problem in computer
                  networks},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {8},
  pages        = {687--696},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.05.007},
  doi          = {10.1016/J.COSE.2004.05.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Beghdad04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BesnardA04,
  author       = {Denis Besnard and
                  Budi Arief},
  title        = {Computer security impaired by legitimate users},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {3},
  pages        = {253--264},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2003.09.002},
  doi          = {10.1016/J.COSE.2003.09.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BesnardA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Chen04,
  author       = {Tzer{-}Shyong Chen},
  title        = {An English auction scheme in the online transaction environment},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {5},
  pages        = {389--399},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.02.002},
  doi          = {10.1016/J.COSE.2004.02.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Chen04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenJC04,
  author       = {Yu{-}Yi Chen and
                  Jinn{-}ke Jan and
                  Chin{-}Ling Chen},
  title        = {The design of a secure anonymous Internet voting system},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {330--337},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.01.015},
  doi          = {10.1016/J.COSE.2004.01.015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenJC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenLC04,
  author       = {Li{-}Chiou Chen and
                  Thomas A. Longstaff and
                  Kathleen M. Carley},
  title        = {Characterization of defense mechanisms against distributed denial
                  of service attacks},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {8},
  pages        = {665--678},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.06.008},
  doi          = {10.1016/J.COSE.2004.06.008},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenLC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChoC04,
  author       = {Sanghyun Cho and
                  Sung Deok Cha},
  title        = {{SAD:} web session anomaly detection based on parameter estimation},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {312--319},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.01.006},
  doi          = {10.1016/J.COSE.2004.01.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChoC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CoetzeeE04,
  author       = {Marijke Coetzee and
                  Jan H. P. Eloff},
  title        = {Towards Web Service access control},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {7},
  pages        = {559--570},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.05.006},
  doi          = {10.1016/J.COSE.2004.05.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CoetzeeE04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CournaneH04,
  author       = {Allister Cournane and
                  Ray Hunt},
  title        = {An analysis of the tools used for the generation and prevention of
                  spam},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {154--166},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2003.10.001},
  doi          = {10.1016/J.COSE.2003.10.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CournaneH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DeMaraR04,
  author       = {Ronald F. DeMara and
                  Adam J. Rocke},
  title        = {Mitigation of network tampering using dynamic dispatch of mobile agents},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {31--42},
  year         = {2004},
  url          = {https://doi.org/10.1016/S0167-4048(04)00068-9},
  doi          = {10.1016/S0167-4048(04)00068-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DeMaraR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FengGGGL04,
  author       = {Li Feng and
                  Xiaohong Guan and
                  Sangang Guo and
                  Yan Gao and
                  Peini Liu},
  title        = {Predicting the intrusion intentions by observing system call sequences},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {3},
  pages        = {241--252},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.01.016},
  doi          = {10.1016/J.COSE.2004.01.016},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FengGGGL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hofmeyr04,
  author       = {Steven A. Hofmeyr},
  title        = {The implications of immunology for secure systems design},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {6},
  pages        = {453--455},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.06.006},
  doi          = {10.1016/J.COSE.2004.06.006},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Hofmeyr04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuM04,
  author       = {Ji Hu and
                  Christoph Meinel},
  title        = {Tele-Lab "IT-Security" on {CD:} portable, reliable and safe {IT} security
                  training},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {282--289},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.02.005},
  doi          = {10.1016/J.COSE.2004.02.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HwangC04,
  author       = {Gwan{-}Hwan Hwang and
                  Tao{-}Ku Chang},
  title        = {An operational model and language support for securing {XML} documents},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {6},
  pages        = {498--529},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.03.003},
  doi          = {10.1016/J.COSE.2004.03.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HwangC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HwangC04a,
  author       = {Shin{-}Jia Hwang and
                  Ching{-}Chung Chan},
  title        = {Improvement on Li et al.'s generalization of proxy signature schemes},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {7},
  pages        = {615--619},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.06.003},
  doi          = {10.1016/J.COSE.2004.06.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HwangC04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Iheagwara04,
  author       = {Charles Iheagwara},
  title        = {The effect of intrusion detection management methods on the return
                  on investment},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {3},
  pages        = {213--228},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2003.09.006},
  doi          = {10.1016/J.COSE.2003.09.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Iheagwara04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JeonCKL04,
  author       = {Jae{-}Myeong Jeon and
                  Yon Dohn Chung and
                  Myoung{-}Ho Kim and
                  Yoon{-}Joon Lee},
  title        = {Filtering XPath expressions for {XML} access control},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {7},
  pages        = {591--605},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.06.009},
  doi          = {10.1016/J.COSE.2004.06.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JeonCKL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JiangPL04,
  author       = {Rui Jiang and
                  Li Pan and
                  Jianhua Li},
  title        = {Further analysis of password authentication schemes based on authentication
                  tests},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {6},
  pages        = {469--477},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.04.002},
  doi          = {10.1016/J.COSE.2004.04.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JiangPL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JinLG04,
  author       = {Andrew Teoh Beng Jin and
                  David Ngo Chek Ling and
                  Alwyn Goh},
  title        = {Personalised cryptographic key generation based on FaceHashing},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {7},
  pages        = {606--614},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.06.002},
  doi          = {10.1016/J.COSE.2004.06.002},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/JinLG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Juang04,
  author       = {Wen{-}Shenq Juang},
  title        = {Efficient password authenticated key agreement using smart cards},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {167--173},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2003.11.005},
  doi          = {10.1016/J.COSE.2003.11.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Juang04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/King04,
  author       = {Stuart King},
  title        = {Applying application security standards - a case study},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {17--21},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.01.005},
  doi          = {10.1016/J.COSE.2004.01.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/King04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Leach04,
  author       = {John Leach},
  title        = {{TBSE} - an engineering approach to the design of accurate and reliable
                  security systems},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {22--28},
  year         = {2004},
  url          = {https://doi.org/10.1016/S0167-4048(04)00069-0},
  doi          = {10.1016/S0167-4048(04)00069-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Leach04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeeHL04,
  author       = {Tian{-}Fu Lee and
                  Tzonelih Hwang and
                  Chun{-}Li Lin},
  title        = {Enhanced three-party encrypted key exchange without server public
                  keys},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {7},
  pages        = {571--577},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.06.007},
  doi          = {10.1016/J.COSE.2004.06.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LeeHL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LekkasG04,
  author       = {Dimitrios Lekkas and
                  Dimitris Gritzalis},
  title        = {Cumulative notarization for long-term preservation of digital signatures},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {5},
  pages        = {413--424},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.03.002},
  doi          = {10.1016/J.COSE.2004.03.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LekkasG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Li04,
  author       = {Ming Li},
  title        = {An approach to reliably identifying signs of {DDOS} flood attacks
                  based on {LRD} traffic pattern recognition},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {7},
  pages        = {549--558},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.04.005},
  doi          = {10.1016/J.COSE.2004.04.005},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Li04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Liaw04,
  author       = {Horng{-}Twu Liaw},
  title        = {A secure electronic voting protocol for general elections},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {107--119},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.01.007},
  doi          = {10.1016/J.COSE.2004.01.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Liaw04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LinCC04,
  author       = {Min{-}Hui Lin and
                  Chin{-}Chen Chang and
                  Yan{-}Ren Chen},
  title        = {A fair and secure mobile agent environment based on blind signature
                  and proxy host},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {3},
  pages        = {199--212},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.01.008},
  doi          = {10.1016/J.COSE.2004.01.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LinCC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LopezOP04,
  author       = {Javier L{\'{o}}pez and
                  Rolf Oppliger and
                  G{\"{u}}nther Pernul},
  title        = {Authentication and authorization infrastructures (AAIs): a comparative
                  survey},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {7},
  pages        = {578--590},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.06.013},
  doi          = {10.1016/J.COSE.2004.06.013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LopezOP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/McKenna04,
  author       = {Brian McKenna},
  title        = {Erratum to "Attacks on the (enhanced) Yang-Shieh authentication" [Comput
                  Secur 22(8) {(2003)} 725-727]},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {85},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.01.001},
  doi          = {10.1016/J.COSE.2004.01.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/McKenna04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MoitraK04,
  author       = {Soumyo D. Moitra and
                  Suresh L. Konda},
  title        = {An empirical investigation of network attacks on computer systems},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {43--51},
  year         = {2004},
  url          = {https://doi.org/10.1016/S0167-4048(04)00067-7},
  doi          = {10.1016/S0167-4048(04)00067-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MoitraK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MoonPPB04,
  author       = {Chang{-}Joo Moon and
                  Dae{-}Ha Park and
                  Soung{-}Jin Park and
                  Doo{-}Kwon Baik},
  title        = {Symmetric {RBAC} model that takes the separation of duty and role
                  hierarchies into consideration},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {126--136},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2003.09.004},
  doi          = {10.1016/J.COSE.2003.09.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MoonPPB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NooreTH04,
  author       = {Afzel Noore and
                  Nikhil Tungala and
                  Max M. Houck},
  title        = {Embedding biometric identifiers in 2D barcodes for improved security},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {8},
  pages        = {679--686},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.09.007},
  doi          = {10.1016/J.COSE.2004.09.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NooreTH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PeyravianRZ04,
  author       = {Mohammad Peyravian and
                  Allen Roginsky and
                  Nevenko Zunic},
  title        = {Non-PKI methods for public key distribution},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {97--103},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.01.011},
  doi          = {10.1016/J.COSE.2004.01.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PeyravianRZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PosthumusS04,
  author       = {Shaun Posthumus and
                  Rossouw von Solms},
  title        = {A framework for the governance of information security},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {8},
  pages        = {638--646},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.10.006},
  doi          = {10.1016/J.COSE.2004.10.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PosthumusS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Purser04,
  author       = {Steve Purser},
  title        = {Improving the {ROI} of the security management process},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {7},
  pages        = {542--546},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.09.004},
  doi          = {10.1016/J.COSE.2004.09.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Purser04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RogersS04,
  author       = {Marcus K. Rogers and
                  Kate Seigfried},
  title        = {The future of computer forensics: a needs analysis survey},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {12--16},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.01.003},
  doi          = {10.1016/J.COSE.2004.01.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RogersS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Schultz04,
  author       = {E. Eugene Schultz},
  title        = {Security training and awareness - fitting a square peg in a round
                  hole},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {1--2},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.01.002},
  doi          = {10.1016/J.COSE.2004.01.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Schultz04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Schultz04a,
  author       = {E. Eugene Schultz},
  title        = {Incident response teams need to change},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {87--88},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.01.009},
  doi          = {10.1016/J.COSE.2004.01.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Schultz04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Schultz04b,
  author       = {E. Eugene Schultz},
  title        = {Worms and viruses: are we losing control?},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {3},
  pages        = {179--180},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.04.001},
  doi          = {10.1016/J.COSE.2004.04.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Schultz04b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Schultz04c,
  author       = {E. Eugene Schultz},
  title        = {Security views},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {3},
  pages        = {181--190},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.03.001},
  doi          = {10.1016/J.COSE.2004.03.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Schultz04c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Schultz04d,
  author       = {E. Eugene Schultz},
  title        = {Intrusion prevention},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {265--266},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.04.004},
  doi          = {10.1016/J.COSE.2004.04.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Schultz04d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Schultz04e,
  author       = {E. Eugene Schultz},
  title        = {Security views},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {267--274},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.05.001},
  doi          = {10.1016/J.COSE.2004.05.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Schultz04e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Schultz04f,
  author       = {E. Eugene Schultz},
  title        = {Sarbanes-Oxley - a huge boon to information security in the {US}},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {5},
  pages        = {353--354},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.05.004},
  doi          = {10.1016/J.COSE.2004.05.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Schultz04f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Schultz04g,
  author       = {E. Eugene Schultz},
  title        = {Security views},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {5},
  pages        = {355--361},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.06.001},
  doi          = {10.1016/J.COSE.2004.06.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Schultz04g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Schultz04h,
  author       = {E. Eugene Schultz},
  title        = {The case for one-time credentials},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {6},
  pages        = {441--442},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.08.001},
  doi          = {10.1016/J.COSE.2004.08.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Schultz04h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Schultz04i,
  author       = {E. Eugene Schultz},
  title        = {The gap between cryptography and information security: has it narrowed?},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {7},
  pages        = {531--532},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.09.001},
  doi          = {10.1016/J.COSE.2004.09.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Schultz04i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Schultz04j,
  author       = {E. Eugene Schultz},
  title        = {Security views},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {7},
  pages        = {533--541},
  year         = {2004},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Schultz04j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Schultz04k,
  author       = {E. Eugene Schultz},
  title        = {Is the {U.S.} government really getting serious about information
                  security?},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {8},
  pages        = {621--622},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.10.009},
  doi          = {10.1016/J.COSE.2004.10.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Schultz04k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SerafimW04,
  author       = {Vin{\'{\i}}cius da Silveira Serafim and
                  Raul Fernando Weber},
  title        = {Restraining and repairing file system damage through file integrity
                  control},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {52--62},
  year         = {2004},
  url          = {https://doi.org/10.1016/S0167-4048(04)00066-5},
  doi          = {10.1016/S0167-4048(04)00066-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SerafimW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SolmsM04,
  author       = {Sebastiaan H. von Solms and
                  Emil Marais},
  title        = {From secure wired networks to secure wireless networks - what are
                  the extra risks?},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {8},
  pages        = {633--637},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.09.005},
  doi          = {10.1016/J.COSE.2004.09.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SolmsM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SolmsS04,
  author       = {Rossouw von Solms and
                  Sebastiaan H. von Solms},
  title        = {From policies to culture},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {275--279},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.01.013},
  doi          = {10.1016/J.COSE.2004.01.013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SolmsS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SolmsS04a,
  author       = {Sebastiaan H. von Solms and
                  Rossouw von Solms},
  title        = {The 10 deadly sins of information security management},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {5},
  pages        = {371--376},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.05.002},
  doi          = {10.1016/J.COSE.2004.05.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SolmsS04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SongF04,
  author       = {Yougang Song and
                  Brett D. Fleisch},
  title        = {Rico: a security proxy for mobile code},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {338--351},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2003.09.003},
  doi          = {10.1016/J.COSE.2003.09.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SongF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/StergiouLG04,
  author       = {Theodore Stergiou and
                  Mark S. Leeson and
                  Roger J. Green},
  title        = {An alternative architectural framework to the {OSI} security model},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {137--153},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2003.09.001},
  doi          = {10.1016/J.COSE.2003.09.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/StergiouLG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Stewart04,
  author       = {Andrew Stewart},
  title        = {On risk: perception and direction},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {5},
  pages        = {362--370},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.05.003},
  doi          = {10.1016/J.COSE.2004.05.003},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Stewart04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SzczepanskiWASS04,
  author       = {Janusz Szczepanski and
                  Elek Wajnryb and
                  Jos{\'{e}} M. Amig{\'{o}} and
                  Maria V. Sanchez{-}Vives and
                  Mel Slater},
  title        = {Biometric random number generators},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {77--84},
  year         = {2004},
  url          = {https://doi.org/10.1016/S0167-4048(04)00064-1},
  doi          = {10.1016/S0167-4048(04)00064-1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SzczepanskiWASS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TzengHY04,
  author       = {Shiang{-}Feng Tzeng and
                  Min{-}Shiang Hwang and
                  Cheng{-}Ying Yang},
  title        = {An improvement of nonrepudiable threshold proxy signature scheme with
                  known signers},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {174--178},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2003.12.001},
  doi          = {10.1016/J.COSE.2003.12.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TzengHY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Ungureanu04,
  author       = {Victoria Ungureanu},
  title        = {Formal support for certificate management policies},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {300--311},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.02.001},
  doi          = {10.1016/J.COSE.2004.02.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Ungureanu04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VenterE04,
  author       = {H. S. Venter and
                  Jan H. P. Eloff},
  title        = {Vulnerability forecasting - a conceptual model},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {6},
  pages        = {489--497},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.06.005},
  doi          = {10.1016/J.COSE.2004.06.005},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/VenterE04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VroomS04,
  author       = {Cheryl Vroom and
                  Rossouw von Solms},
  title        = {Towards information security behavioural compliance},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {3},
  pages        = {191--198},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.01.012},
  doi          = {10.1016/J.COSE.2004.01.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VroomS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Wool04,
  author       = {Avishai Wool},
  title        = {The use and usability of direction-based filtering in firewalls},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {6},
  pages        = {459--468},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.02.003},
  doi          = {10.1016/J.COSE.2004.02.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Wool04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WuH04,
  author       = {Tzong{-}Sun Wu and
                  Chien{-}Lung Hsu},
  title        = {Efficient user identification scheme with key distribution preserving
                  anonymity for distributed computer networks},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {120--125},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2003.09.005},
  doi          = {10.1016/J.COSE.2003.09.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WuH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangL04,
  author       = {Cungang Yang and
                  Celia Li},
  title        = {Access control in a hierarchy using one-way hash functions},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {8},
  pages        = {659--664},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.08.004},
  doi          = {10.1016/J.COSE.2004.08.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangW04,
  author       = {Chou Chen Yang and
                  Ren{-}Chiun Wang},
  title        = {Cryptanalysis of a user friendly remote authentication scheme with
                  smart cards},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {5},
  pages        = {425--427},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.02.006},
  doi          = {10.1016/J.COSE.2004.02.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangWBWD04,
  author       = {Yanjiang Yang and
                  Shuhong Wang and
                  Feng Bao and
                  Jie Wang and
                  Robert H. Deng},
  title        = {New efficient user identification and key distribution scheme providing
                  enhanced security},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {8},
  pages        = {697--704},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.08.005},
  doi          = {10.1016/J.COSE.2004.08.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangWBWD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YuC04,
  author       = {Enzhe Yu and
                  Sungzoon Cho},
  title        = {Keystroke dynamics identity verification - its problems and practical
                  solutions},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {5},
  pages        = {428--440},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.02.004},
  doi          = {10.1016/J.COSE.2004.02.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YuC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhuCW04,
  author       = {Liehuang Zhu and
                  Yuanda Cao and
                  Dong Wang},
  title        = {Digital signature of multicast streams secure against adaptive chosen
                  message attack},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {3},
  pages        = {229--240},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.01.014},
  doi          = {10.1016/J.COSE.2004.01.014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhuCW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Zuccato04,
  author       = {Albin Zuccato},
  title        = {Holistic security requirement engineering for electronic commerce},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {63--76},
  year         = {2004},
  url          = {https://doi.org/10.1016/S0167-4048(04)00065-3},
  doi          = {10.1016/S0167-4048(04)00065-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Zuccato04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics