Bart De Schutter Trends in the Fight Against Computer-Related Delinquency. [Citation Graph (0, 0)][DBLP] Computer Security and Industrial Cryptography, 1991, pp:3-19 [Conf]
Johan van Tilburg Secret-Key Exchange with Authentication. [Citation Graph (0, 0)][DBLP] Computer Security and Industrial Cryptography, 1991, pp:71-86 [Conf]
David W. Roberts Evaluation Criteria for IT Security. [Citation Graph (0, 0)][DBLP] Computer Security and Industrial Cryptography, 1991, pp:151-161 [Conf]
Bart Preneel Standardization of Cryptographic Techniques. [Citation Graph (0, 0)][DBLP] Computer Security and Industrial Cryptography, 1991, pp:162-173 [Conf]
David Chaum Numbers Can Be a Better Form of Cash than Paper. [Citation Graph (0, 0)][DBLP] Computer Security and Industrial Cryptography, 1991, pp:174-178 [Conf]
Klaus Vedder Security Aspects of Mobile Communications. [Citation Graph (0, 0)][DBLP] Computer Security and Industrial Cryptography, 1991, pp:193-210 [Conf]
Walter Fumy (Local Area) Network Security. [Citation Graph (0, 0)][DBLP] Computer Security and Industrial Cryptography, 1991, pp:211-226 [Conf]