Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Articles by Topics
Topic L. - Science and Technology of Learning
Topic L.4 - SECURITY/TRUST

I. Caballero, L.E. Sánchez, A. Freitas, E. Fernández-Medina:
HC+: Towards a Framework for Improving Processes in Health Organizations by Means of Security and Data Quality Management
/jucs_18_12/hc%2B_towards_a_framework
page 1703 - 720
Vol.18 / Issue 12
K. Dietrich, F. Röck:
Performance Optimizations for DAA Signatures on Java enabled Platforms
/jucs_16_4/performance_optimizations_for_daa
page 519 - 529
Vol.16 / Issue 4
K. Dietrich:
On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms
/jucs_16_4/on_reliable_platform_configuration
page 507 - 518
Vol.16 / Issue 4
A. Karim, R. Salleh, M.K. Khan, A. Siddiqa, K.-K.R. Choo:
On the Analysis and Detection of Mobile Botnet Applications
/jucs_22_4/on_the_analysis_and
page 567 - 588
Vol.22 / Issue 4
N. Kulathuramaiyer, H. Maurer, R. Mehmood:
Some Aspects of the Reliability of Information on the Web
/jucs_20_9/some_aspects_of_the
page 1284 - 1303
Vol.20 / Issue 9
C. Lee, J. Kim, S. Hong, Y.-S. Lee:
Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments
/jucs_15_5/security_analysis_of_the
page 1007 - 1022
Vol.15 / Issue 5
M. Rajaei, M.S. Haghjoo, E.K. Miyaneh:
An Anonymization Algorithm for (α, β, γ, δ)-Social Network Privacy Considering Data Utility
/jucs_21_2/an_anonymization_algorithm_for
page 268 - 305
Vol.21 / Issue 2
D.G. Rosado, E. Fernández-Medina, J. López, M. Piattini:
Developing a Secure Mobile Grid System through a UML Extension
/jucs_16_17/developing_a_secure_mobile
page 2333 - 2352
Vol.16 / Issue 17
L.E. Sánchez, A. Santos-Olmo Parra, D.G. Rosado, M. Piattini:
Managing Security and its Maturity in Small and Medium-sized Enterprises
/jucs_15_15/managing_security_and_its
page 3038 - 3058
Vol.15 / Issue 15
A.V. Uzunov, E.B. Fernandez, K. Falkner:
Engineering Security into Distributed Systems: A Survey of Methodologies
/jucs_18_20/engineering_security_into_distributed
page 2920 - 3006
Vol.18 / Issue 20