Go home now Header Background Image
Submission Procedure
share: |
Follow us
Articles by Topics
Topic L. - Science and Technology of Learning

I. Caballero, L.E. Sánchez, A. Freitas, E. Fernández-Medina:
HC+: Towards a Framework for Improving Processes in Health Organizations by Means of Security and Data Quality Management
page 1703 - 720
Vol.18 / Issue 12
K. Dietrich:
On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms
page 507 - 518
Vol.16 / Issue 4
K. Dietrich, F. Röck:
Performance Optimizations for DAA Signatures on Java enabled Platforms
page 519 - 529
Vol.16 / Issue 4
A. Karim, R. Salleh, M.K. Khan, A. Siddiqa, K.-K.R. Choo:
On the Analysis and Detection of Mobile Botnet Applications
page 567 - 588
Vol.22 / Issue 4
N. Kulathuramaiyer, H. Maurer, R. Mehmood:
Some Aspects of the Reliability of Information on the Web
page 1284 - 1303
Vol.20 / Issue 9
C. Lee, J. Kim, S. Hong, Y.-S. Lee:
Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments
page 1007 - 1022
Vol.15 / Issue 5
C. Moeckel:
(De-)Constructing Attacker Categorisations: A Typology Iteration for the Case of Digital Banking
page 783 - 804
Vol.26 / Issue 7
M. Rajaei, M.S. Haghjoo, E.K. Miyaneh:
An Anonymization Algorithm for (α, β, γ, δ)-Social Network Privacy Considering Data Utility
page 268 - 305
Vol.21 / Issue 2
D.G. Rosado, E. Fernández-Medina, J. López, M. Piattini:
Developing a Secure Mobile Grid System through a UML Extension
page 2333 - 2352
Vol.16 / Issue 17
L.E. Sánchez, A. Santos-Olmo Parra, D.G. Rosado, M. Piattini:
Managing Security and its Maturity in Small and Medium-sized Enterprises
page 3038 - 3058
Vol.15 / Issue 15
A.V. Uzunov, E.B. Fernandez, K. Falkner:
Engineering Security into Distributed Systems: A Survey of Methodologies
page 2920 - 3006
Vol.18 / Issue 20