![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/jcs/jcs5.bht:"
@article{DBLP:journals/jcs/AsokanTW97, author = {N. Asokan and Gene Tsudik and Michael Waidner}, title = {Server-Supported Signatures}, journal = {J. Comput. Secur.}, volume = {5}, number = {1}, pages = {91--108}, year = {1997}, url = {https://doi.org/10.3233/JCS-1997-5105}, doi = {10.3233/JCS-1997-5105}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AsokanTW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/AtluriH97, author = {Vijayalakshmi Atluri and Wei{-}kuang Huang}, title = {Enforcing Mandatory and Discretionary Security in Workflow Management Systems}, journal = {J. Comput. Secur.}, volume = {5}, number = {4}, pages = {303--340}, year = {1997}, url = {https://doi.org/10.3233/JCS-1997-5403}, doi = {10.3233/JCS-1997-5403}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AtluriH97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BergadanoCL97, author = {Francesco Bergadano and Bruno Crispo and T. Mark A. Lomas}, title = {Strong Authentication and Privacy with Standard Browsers}, journal = {J. Comput. Secur.}, volume = {5}, number = {3}, pages = {191--212}, year = {1997}, url = {https://doi.org/10.3233/JCS-1997-5302}, doi = {10.3233/JCS-1997-5302}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BergadanoCL97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BonattiSS97, author = {Piero A. Bonatti and Maria Luisa Sapino and V. S. Subrahmanian}, title = {Merging Heterogeneous Security Orderings}, journal = {J. Comput. Secur.}, volume = {5}, number = {1}, pages = {3--30}, year = {1997}, url = {https://doi.org/10.3233/JCS-1997-5102}, doi = {10.3233/JCS-1997-5102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BonattiSS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BryceKALR97, author = {Ciar{\'{a}}n Bryce and Winfried E. K{\"{u}}hnhauser and R{\'{e}}my Amouroux and Mauricio L{\'{o}}pez and Harry Rudnik}, title = {{CWASAR:} a European Infrastructure for Secure Electronic Commerce}, journal = {J. Comput. Secur.}, volume = {5}, number = {3}, pages = {225--236}, year = {1997}, url = {https://doi.org/10.3233/JCS-1997-5304}, doi = {10.3233/JCS-1997-5304}, timestamp = {Thu, 25 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BryceKALR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/CamenischMS97, author = {Jan Camenisch and Ueli M. Maurer and Markus Stadler}, title = {Digital Payment Systems With Passive Anonymity-Revoking Trustees}, journal = {J. Comput. Secur.}, volume = {5}, number = {1}, pages = {69--90}, year = {1997}, url = {https://doi.org/10.3233/JCS-1997-5104}, doi = {10.3233/JCS-1997-5104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/CamenischMS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/CastanoVF97, author = {Silvana Castano and Sabrina De Capitani di Vimercati and Maria Grazia Fugini}, title = {Automated Derivation of Global Authorizations for Database Federations}, journal = {J. Comput. Secur.}, volume = {5}, number = {4}, pages = {271--302}, year = {1997}, url = {https://doi.org/10.3233/JCS-1997-5402}, doi = {10.3233/JCS-1997-5402}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/CastanoVF97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DemurjianT97, author = {Steven A. Demurjian and T. C. Ting}, title = {Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications}, journal = {J. Comput. Secur.}, volume = {5}, number = {4}, pages = {341--382}, year = {1997}, url = {https://doi.org/10.3233/JCS-1997-5404}, doi = {10.3233/JCS-1997-5404}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DemurjianT97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Lotz97, author = {Volkmar Lotz}, title = {Threat Scenarios as a Means to Formally Develop Secure Systems}, journal = {J. Comput. Secur.}, volume = {5}, number = {1}, pages = {31--68}, year = {1997}, url = {https://doi.org/10.3233/JCS-1997-5103}, doi = {10.3233/JCS-1997-5103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Lotz97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MalkhiR97, author = {Dahlia Malkhi and Michael K. Reiter}, title = {A High-Throughput Secure Reliable Multicast Protocol}, journal = {J. Comput. Secur.}, volume = {5}, number = {2}, pages = {113--128}, year = {1997}, url = {https://doi.org/10.3233/JCS-1997-5203}, doi = {10.3233/JCS-1997-5203}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/MalkhiR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/QuisquaterJ97, author = {Jean{-}Jacques Quisquater and Marc Joye}, title = {Authentication of Sequences with the {SL2} Hash Function: Application to Video Sequences}, journal = {J. Comput. Secur.}, volume = {5}, number = {3}, pages = {213--224}, year = {1997}, url = {https://doi.org/10.3233/JCS-1997-5303}, doi = {10.3233/JCS-1997-5303}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/QuisquaterJ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/RoscheisenW97, author = {Martin R{\"{o}}scheisen and Terry Winograd}, title = {A Network-Centric Design for Relationship-Based Security and Access Control}, journal = {J. Comput. Secur.}, volume = {5}, number = {3}, pages = {249--254}, year = {1997}, url = {https://doi.org/10.3233/JCS-1997-5306}, doi = {10.3233/JCS-1997-5306}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/RoscheisenW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Sinclair97, author = {Jane E. Sinclair}, title = {Action Systems for Security Specification}, journal = {J. Comput. Secur.}, volume = {5}, number = {2}, pages = {129--154}, year = {1997}, url = {https://doi.org/10.3233/JCS-1997-5204}, doi = {10.3233/JCS-1997-5204}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Sinclair97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/SyversonRG97, author = {Paul F. Syverson and Michael G. Reed and David M. Goldschlag}, title = {Private Web Browsing}, journal = {J. Comput. Secur.}, volume = {5}, number = {3}, pages = {237--248}, year = {1997}, url = {https://doi.org/10.3233/JCS-1997-5305}, doi = {10.3233/JCS-1997-5305}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/SyversonRG97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/VimercatiS97, author = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Authorization Specification and Enforcement in Federated Database Systems}, journal = {J. Comput. Secur.}, volume = {5}, number = {2}, pages = {155--188}, year = {1997}, url = {https://doi.org/10.3233/JCS-1997-5205}, doi = {10.3233/JCS-1997-5205}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/VimercatiS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/WinslettCJS97, author = {Marianne Winslett and Neil Ching and Vicki Ellen Jones and Igor Slepchin}, title = {Using Digital Credentials on the World Wide Web}, journal = {J. Comput. Secur.}, volume = {5}, number = {3}, pages = {255--266}, year = {1997}, url = {https://doi.org/10.3233/JCS-1997-5307}, doi = {10.3233/JCS-1997-5307}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/WinslettCJS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.