Journals in DBLP
Bill Hancock From the editor. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:7, pp:550-552 [Journal ] Bill Hancock Security views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:7, pp:553-564 [Journal ] Stephen Hinde The bell tolls for the bell-shaped curve: or how hot magnets, species distribution and things that go bump in the air will change our view of risk. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:7, pp:565-572 [Journal ] Gerald L. Kovacich Hackers: Freedom fighters of the 21st Century. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:7, pp:573-576 [Journal ] Michael Collins Telecommunications crime - Part 1. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:7, pp:577-586 [Journal ] Pauline Ratnasingham Risks in low trust among trading partners in electronic commerce. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:7, pp:587-592 [Journal ] Mohammad Peyravian , Stephen M. Matyas , Allen Roginsky , Nevenko Zunic Generating user-based cryptographic keys and random numbers. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:7, pp:619-626 [Journal ] Diomidis Spinellis , Stefanos Gritzalis , John Iliadis , Dimitris Gritzalis , Sokratis K. Katsikas Trusted third party services for deploying secure telemedical applications over the WWW. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:7, pp:627-639 [Journal ]