Journals in DBLP
From the editor. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:6, pp:452-453 [Journal ] Gerald L. Kovacich ISSO career development. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:6, pp:455-458 [Journal ] Thomas Finne Information security implemented in: The theory on stock market efficiency, Markowitz's portfolio theory and porter's value chain. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:6, pp:469-479 [Journal ] Rosario Gennaro , Paul A. Karger , Stephen M. Matyas , Mohammad Peyravian , Allen Roginsky , David Safford , Michael Willett , Nevenko Zunic Two-phase cryptographic key recovery system. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:6, pp:481-506 [Journal ] Les Labuschagne , Jan H. P. Eloff Improved system-access control using complementary technologies. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:6, pp:543-549 [Journal ] Simon N. Foley Building Chinese walls in standard unixTM . [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:6, pp:551-563 [Journal ]