|
Journals in DBLP
- Harold Joseph Highland
Random bits & bytes. [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:5, pp:372-378 [Journal]
- Leon Strous
Security evaluation criteria. [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:5, pp:379-384 [Journal]
- Michael J. Ganley
Digital signatures and their uses. [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:5, pp:385-391 [Journal]
- Bernard P. Zajac Jr.
Cost effectiveness of anti-viral scanners. [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:5, pp:392-400 [Journal]
- Helen Collinson
Abstracts of recent articles and literature. [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:5, pp:401-406 [Journal]
- Karin P. Badenhorst, Jan H. P. Eloff
TOPM: a formal approach to the optimization of information technology risk management. [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:5, pp:411-435 [Journal]
- Eike Born, Helmut Stiegler
Discretionary access control by means of usage conditions. [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:5, pp:437-450 [Journal]
|