|
Journals in DBLP
- Harold Joseph Highland
Random bits & bytes. [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:3, pp:192-205 [Journal]
- Robert H. Courtney, Willis H. Ware
What do we mean by integrity? [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:3, pp:206-208 [Journal]
- Charles Cresson Wood
Fifty ways to secure dial-up connections. [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:3, pp:209-215 [Journal]
- Shivraj Kanungo
Identity authentication in heterogeneous computing environments: a comparative study for an integrated framework. [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:3, pp:231-253 [Journal]
- Chin-Chen Chang, J. K. Jan, Daniel J. Buehrer
A scheme to determine the relationship between two users in a hierarchy. [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:3, pp:255-261 [Journal]
- Scott Magruder
High-level language computer viruses - a new threat? [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:3, pp:263-269 [Journal]
|