Journals in DBLP
Bill Hancock From the editor. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:3, pp:190-191 [Journal ] Bill Hancock Security Views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:3, pp:192-200 [Journal ] Nicky Maddison Y2000 enters the body politic. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:3, pp:201-206 [Journal ] Stephen Hinde Recent security surveys. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:3, pp:207-210 [Journal ] Fred Cohen , Cynthia A. Phillips , Laura Painton Swiler , Timothy Gaylor , Patricia Leary , Fran Rupley , Richard Isler A cause and effect model of attacks on information systems : Some Analysis Based on That Model, and The Application of that Model for CyberWarfare in CID. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:3, pp:211-221 [Journal ] Gert van der Merwe , Jan H. P. Eloff Software source code, visual risk analysis: an example. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:3, pp:233-252 [Journal ] Tom Coffey , T. Newe Realisation of a minimum-knowledge identification and signature scheme. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:3, pp:253-264 [Journal ] Mike Matyas , Mohammad Peyravian , Allen Roginsky , Nevenko Zunic Reversible data mixing procedure for efficient public-key encryption. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:3, pp:265-272 [Journal ]