| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 1998 | J | jnl |
Inf. Secur. J. A Glob. Perspect.
|
| 1997 | J | jnl |
Inf. Secur. J. A Glob. Perspect.
|
| 1994 | J | jnl |
Comput. Secur.
|
| 1992 | J | jnl |
Comput. Secur.
|
| 1992 | J | jnl |
Comput. Secur.
|
| 1992 | J | jnl |
Comput. Secur.
|
| 1992 | J | jnl |
Comput. Secur.
|
| 1992 | J | jnl |
Comput. Secur.
|
| 1992 | J | jnl |
Comput. Secur.
|
| 1991 | J | jnl |
Comput. Secur.
|
| 1991 | J | jnl |
Comput. Secur.
|
| 1991 | J | jnl |
Comput. Secur.
|
| 1990 | J | jnl |
Comput. Secur.
|
| 1990 | J | jnl |
Comput. Secur.
|
| 1990 | J | jnl |
Comput. Secur.
|
| 1990 | J | jnl |
Comput. Secur.
|
| 1989 | J | jnl |
Comput. Secur.
|
| 1989 | J | jnl |
Comput. Secur.
|
| 1989 | J | jnl |
Comput. Secur.
|
| 1989 | J | jnl |
Comput. Secur.
|
| 1989 | J | jnl |
Comput. Secur.
|
| 1988 | J | jnl |
Comput. Secur.
|
| 1988 | J | jnl |
Comput. Secur.
|
| 1988 | J | jnl |
Comput. Secur.
|
| 1988 | J | jnl |
Comput. Secur.
|
| 1988 | J | jnl |
Comput. Secur.
|
| 1985 | J | jnl |
Comput. Secur.
|
| 1985 | J | jnl |
Comput. Secur.
|
| 1983 | J | jnl |
Comput. Secur.
|