|
Journals in DBLP
- Harold Joseph Highland
Random bits & bytes. [Citation Graph (0, 0)][DBLP] Computers & Security, 1992, v:11, n:6, pp:498-507 [Journal]
- Françoise Gilbert
Breach of system security and theft of data: Legal aspects and preventive measures. [Citation Graph (0, 0)][DBLP] Computers & Security, 1992, v:11, n:6, pp:508-517 [Journal]
- John Robinson
Computer security evaluation: Developments in the European ITSEC programme. [Citation Graph (0, 0)][DBLP] Computers & Security, 1992, v:11, n:6, pp:518-524 [Journal]
- Belden Menkus
Understanding EDI security issues. [Citation Graph (0, 0)][DBLP] Computers & Security, 1992, v:11, n:6, pp:525-528 [Journal]
- Ravi S. Sandhu, Sushil Jajodia
Eliminating polyinstantiation securely. [Citation Graph (0, 0)][DBLP] Computers & Security, 1992, v:11, n:6, pp:547-562 [Journal]
- Frederick B. Cohen
Defense-in-depth against computer viruses. [Citation Graph (0, 0)][DBLP] Computers & Security, 1992, v:11, n:6, pp:563-579 [Journal]
- Sebastiaan H. von Solms, David Naccache
On blind signatures and perfect crimes. [Citation Graph (0, 0)][DBLP] Computers & Security, 1992, v:11, n:6, pp:581-583 [Journal]
|