Journals in DBLP
Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:2, pp:110-120 [Journal ] Belden Menkus Introduction to computer security. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:2, pp:121-127 [Journal ] Robin L. Sherman Biometrics futures. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:2, pp:128-133 [Journal ] Dimitris Gritzalis , Sokratis K. Katsikas , J. Keklikoglou , A. Tomaras Determining access rights for medical information systems. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:2, pp:149-161 [Journal ] P. Venkat Rangan An axiomatic theory of trust in secure communication protocols. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:2, pp:163-172 [Journal ] Rotraut Laun Asymmetric user authentication. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:2, pp:173-183 [Journal ]