Journals in DBLP
E. Eugene Schultz Information security and the media. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:8, pp:652-653 [Journal ] E. Eugene Schultz Security views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:8, pp:654-663 [Journal ] Stephen Hinde Computer security: Mapping the future. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:8, pp:664-669 [Journal ] Hank Wolfe Setting up an electronic evidence forensics laboratory. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:8, pp:670-672 [Journal ] Jay G. Heiser Beyond cryptography: Bruce Schneier's Beyond Fear: thinking sensibly about security in an uncertain world. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:8, pp:673-674 [Journal ] J. Johnston , Jan H. P. Eloff , Les Labuschagne Security and human computer interfaces. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:8, pp:675-684 [Journal ] John Leach Improving user security behaviour. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:8, pp:685-692 [Journal ] Aykut Guven , Ibrahim Sogukpinar Understanding users' keystroke patterns for computer access security. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:8, pp:695-706 [Journal ] John Reinke , Hossein Saiedian The availability of source code in relation to timely response to security vulnerabilities. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:8, pp:707-724 [Journal ] Ke-Fei Chen , Sheng Zhong Attacks on the (enhanced) Yang-Shieh authentication. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:8, pp:725-727 [Journal ] Chin-Chen Chang , Ya-Fen Chang Efficient anonymous auction protocols with freewheeling bids. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:8, pp:728-734 [Journal ]