Journals in DBLP
From the editor. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:1, pp:2-3 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:1, pp:4-11 [Journal ] Jon David The new face of the virus threat. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:1, pp:13-16 [Journal ] Mark Buckwell The spook solution - Now open for business. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:1, pp:17-26 [Journal ] Paul Smith Achieving interoperable security services in open systems products. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:1, pp:27-37 [Journal ] Thierry Moreau A probabilistic flaw in PGP design? [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:1, pp:39-43 [Journal ] Jan H. P. Eloff , Ralph Holbein , Stephanie Teufel Security classification for documents. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:1, pp:55-71 [Journal ] Min-Shiang Hwang , Wen-Guey Tzeng , Wei-Pang Yang An access control scheme based on Chinese remainder theorem and time stamp concept. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:1, pp:73-81 [Journal ]