|
Journals in DBLP
- Harold Joseph Highland
Random bits & bytes. [Citation Graph (0, 0)][DBLP] Computers & Security, 1993, v:12, n:2, pp:106-116 [Journal]
- Stanley H. Stahl
Information security in workstation environments. [Citation Graph (0, 0)][DBLP] Computers & Security, 1993, v:12, n:2, pp:117-122 [Journal]
- Robert A. Clyde
DECnet security (Not necessarily an oxymoron). [Citation Graph (0, 0)][DBLP] Computers & Security, 1993, v:12, n:2, pp:123-127 [Journal]
- David Moseley
Public key management for X.25 network security. [Citation Graph (0, 0)][DBLP] Computers & Security, 1993, v:12, n:2, pp:128-133 [Journal]
- Helen A. Bergen, James M. Hogan
A chosen plaintext attack on an adaptive arithmetic coding compression algorithm. [Citation Graph (0, 0)][DBLP] Computers & Security, 1993, v:12, n:2, pp:157-167 [Journal]
- John A. Fitch III, Lance J. Hoffman
A shortest path network security model. [Citation Graph (0, 0)][DBLP] Computers & Security, 1993, v:12, n:2, pp:169-189 [Journal]
- Mary C. Jones, Kirk P. Arnett, Jeung-tai Eddie Tang, Nian-Shin Chen
Perceptions of computer viruses: a cross-cultural assessment. [Citation Graph (0, 0)][DBLP] Computers & Security, 1993, v:12, n:2, pp:191-197 [Journal]
|