Journals in DBLP
Bill Hancock From the editor. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:4, pp:276-277 [Journal ] Stephen Hinde E for exponential growth. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:4, pp:295-299 [Journal ] Richard Ford No suprises in Melissa Land. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:4, pp:300-302 [Journal ] August Bequai Employers and the internet: Legal woes and concerns. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:4, pp:303-306 [Journal ] Chris Pounder The revised version of BS7799 - so what's new? [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:4, pp:307-311 [Journal ] Garry Bulmer Encryption - Do or die for UK business. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:4, pp:312-316 [Journal ] Pauline Ratnasingham Implicit trust in the risk assessment process of EDI. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:4, pp:317-321 [Journal ] Keith Buzzard Computer security - What should you spend your money on? [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:4, pp:322-334 [Journal ] Mohammad Peyravian , Allen Roginsky , Nevenko Zunic Hash-based encryption system. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:4, pp:345-350 [Journal ] Winfried E. Kühnhauser Policy Groups. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:4, pp:351-363 [Journal ]