Security and privacy requirements in computing
ACM '86 Proceedings of 1986 ACM Fall joint computer conference
A paradigmatic analysis of conventional approaches for developing and managing secure IS
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
WWW electronic commerce and java trojan horses
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
CIT'10 Proceedings of the 4th international conference on Communications and information technology
Hi-index | 0.00 |