Journals in DBLP
Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:8, pp:698-709 [Journal ] Peter Fagan Organizational issues in IT security. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:8, pp:710-715 [Journal ] Gary Hardy Commercial accreditation of information security. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:8, pp:716-729 [Journal ] Harold Joseph Highland 16th national computer security conference. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:8, pp:730-734 [Journal ] Dieter Gollmann , Thomas Beth , Frank Damm Authentication services in distributed systems. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:8, pp:753-764 [Journal ] Jon Ølnes EDIFACT security made simple - the EDIMED approach. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:8, pp:765-774 [Journal ] Frank Koerner System threats and vulnerabilities and the contrary principle. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:8, pp:775-779 [Journal ] Caroline Allinson , Helen Bergen , Edward P. Dawson Message collision in block ciphers with message authentication. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:8, pp:781-787 [Journal ]