Applications of Trusted Review to Information Security

Henderson, AnneMarie & Yesberg, John (2001) Applications of Trusted Review to Information Security. In Information Security and Privacy: Proceedings of the 6th Australasian Conference on Information Security and Privacy, ACISP 2001, 11-13 July, 2001.

Impact and interest:

0 citations in Scopus
Search Google Scholar™

Citation counts are sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

ID Code: 25311
Item Type: Conference Paper
Refereed: Yes
ISBN: 3-540-42300-1
Divisions: Past > QUT Faculties & Divisions > Faculty of Science and Technology
Deposited On: 17 Jun 2009 15:07
Last Modified: 08 Jul 2017 14:02

Export: EndNote | Dublin Core | BibTeX

Repository Staff Only: item control page