149 | -- | 158 | Someswar Kesh, Sam Ramanujan, Sridhar P. Nerur. A framework for analyzing e-commerce security |
159 | -- | 164 | Hao Feng, Chan Choong Wah. Private key generation from on-line handwritten signatures |
165 | -- | 170 | Kostas S. Metaxiotis, John E. Psarras, Stefanos Papastefanatos. Knowledge and information management in e-learning environments; the user agent architecture |
171 | -- | 177 | Gaurav Jain, Deepali Singh, Shekhar Verma. Service level agreements in IP networks |
178 | -- | 183 | Alan D. Smith, William T. Rupp. Issues in cybersecurity; understanding the potential risks associated with hackers/crackers |
184 | -- | 192 | John A. Rodgers, David C. Yen, David C. Chou. Developing e-business; a strategic approach |
196 | -- | 0 | Steven Furnell. Cybercrime - vandalizing the information society (Review) |