|
Journals in DBLP
From the editor. [Citation Graph (0, 0)][DBLP] Computers & Security, 1996, v:15, n:4, pp:268-269 [Journal]
- Harold Joseph Highland
Random bits & bytes. [Citation Graph (0, 0)][DBLP] Computers & Security, 1996, v:15, n:4, pp:270-280 [Journal]
- Rossouw von Solms
Information security management: The second generation. [Citation Graph (0, 0)][DBLP] Computers & Security, 1996, v:15, n:4, pp:281-288 [Journal]
- Jacques R. Lemieux
Using RAD tools to develop secure client/server applications. [Citation Graph (0, 0)][DBLP] Computers & Security, 1996, v:15, n:4, pp:289-295 [Journal]
- Thomas Finne
The information security chain in a company. [Citation Graph (0, 0)][DBLP] Computers & Security, 1996, v:15, n:4, pp:297-316 [Journal]
- Joan Borrell, Josep Rifà
An implementable secure voting scheme. [Citation Graph (0, 0)][DBLP] Computers & Security, 1996, v:15, n:4, pp:327-338 [Journal]
- Wen-Shenq Juang, Chin-Laung Lei
A collision-free secret ballot protocol for computerized general elections. [Citation Graph (0, 0)][DBLP] Computers & Security, 1996, v:15, n:4, pp:339-348 [Journal]
|