| 961 |
|
Securitizing and tranching longevity exposures
|
Biffis, E.; Blake, D.
|
Elsevier Science B.V., Amsterdam.
|
2010
|
|
|
|
| 962 |
|
Security analysis, agency costs, and UK firm characteristics
|
Doukas, J. A.; McKnight, P. J.; Pantzalis, C.
|
Elsevier Science B.V., Amsterdam.
|
2005
|
|
|
|
| 963 |
|
Security analysis and market making
|
Chung, K. H.; Cho, S. Y.
|
Elsevier Science B.V., Amsterdam
|
2005
|
|
|
|
| 964 |
|
Security analysis of GTRBAC and its variants using model checking
|
Mondal, S.; Sural, S.; Atluri, V.
|
Elsevier Science B.V., Amsterdam.
|
2011
|
|
|
|
| 965 |
|
Security analysis of GTRBAC and its variants using model checking
|
Mondal, S.; Sural, S.; Atluri, V.
|
Elsevier Science B.V., Amsterdam.
|
2011
|
|
|
|
| 966 |
|
Security analysis of XML usage and XML parsing
|
Blyth, D. A.; Cunliffe, D. D.; Sutherland, D. I.
|
Elsevier Science B.V., Amsterdam.
|
2003
|
|
|
|
| 967 |
|
Security analysts, cash flow forecasts, and turnover
|
Pandit, S.; Willis, R. H.; Zhou, L.
|
Elsevier Science B.V., Amsterdam.
|
2012
|
|
|
|
| 968 |
|
Security and human computer interfaces
|
Johnston, J.; Eloff, J. H.; Labuschagne, L.
|
Elsevier Science B.V., Amsterdam.
|
2003
|
|
|
|
| 969 |
|
Security beliefs and barriers for novice Internet users
|
Furnell, S.; Tsaganidi, V.; Phippen, A.
|
Elsevier Science B.V., Amsterdam.
|
2008
|
|
|
|
| 970 |
|
Security considerations for incremental hash functions based on pair block chaining
|
Phan, R. C.; Wagner, D.
|
Elsevier Science B.V., Amsterdam.
|
2006
|
|
|
|
| 971 |
|
Security dilemmas with Microsoft's Internet Explorer
|
Schultz, E.
|
Elsevier Science B.V., Amsterdam.
|
2005
|
|
|
|
| 972 |
|
Security engineering and security RoI
|
Leach, D. J.
|
Elsevier Science B.V., Amsterdam.
|
2003
|
|
|
|
| 973 |
|
Security enhancement for the timestamp-based password authentication scheme using smart cards
|
Shen, J. J.; Lin, C. W.; Hwang, M. S.
|
Elsevier Science B.V., Amsterdam.
|
2003
|
|
|
|
| 974 |
|
Security evaluation of biometric keys
|
Al-Assam, H.; Jassim, S.
|
Elsevier Science B.V., Amsterdam.
|
2012
|
|
|
|
| 975 |
|
Security for a Multi-Agent System based on JADE
|
Vila, X.; Schuster, A.; Riera, A.
|
Elsevier Science B.V., Amsterdam.
|
2007
|
|
|
|
| 976 |
|
Security implications in RFID and authentication processing framework
|
Ayoade, J.
|
Elsevier Science B.V., Amsterdam.
|
2006
|
|
|
|
| 977 |
|
Security in a Flash
|
David, J.
|
Elsevier Science B.V., Amsterdam.
|
2003
|
|
|
|
| 978 |
|
Security in data communications: Security in Fixed and Wireless Networks - An introduction to securing data communications
|
Schafer, G.
|
Elsevier Science B.V., Amsterdam.
|
2004
|
|
|
|
| 979 |
|
Security in XML-based financial reporting services on the Internet
|
Efrim Boritz, J.; No, W. G.
|
Elsevier Science B.V., Amsterdam.
|
2005
|
|
|
|
| 980 |
|
Security issues for third party games: Technical, business and legal perspectives
|
Davis, S. B.; Price, W. J.
|
Elsevier Science B.V., Amsterdam.
|
2008
|
|
|
|