Journals in DBLP
From the editor. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:3, pp:182-183 [Journal ] Harold Joseph Highland Random Bits & Bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:3, pp:184-197 [Journal ] Nigel Miller Establishing web sites - legal issues and risks. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:3, pp:198-202 [Journal ] Clive Blatchford Internet as a Pornotopia? [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:3, pp:203-208 [Journal ] Paul Evans Information protection for publishers. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:3, pp:209-211 [Journal ] Eike Born Enforcing legal ownership rights by an access control system. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:3, pp:212-220 [Journal ] Shiuh-Jeng Wang , Jin-Fu Chang Smart card based secure password authentication scheme. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:3, pp:231-237 [Journal ] Willem G. de Ru , Jan H. P. Eloff Risk analysis modelling with the use of fuzzy logic. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:3, pp:239-248 [Journal ] Jing-Jang Hwang A conventional approach to secret balloting in computer networks. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:3, pp:249-262 [Journal ]