Journals in DBLP
Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:2, pp:92-100 [Journal ] Karl Rihaczek The harmonized ITSEC evaluation criteria. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:2, pp:101-110 [Journal ] Harold W. Thimbleby Can viruses ever be useful? [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:2, pp:111-114 [Journal ] Jim Press Secure transfer of identity and privilege attributes in an open systems environment. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:2, pp:117-127 [Journal ] J. K. Jan , Chin-Chen Chang , S. J. Wang A dynamic key-lock-pair access control scheme. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:2, pp:129-139 [Journal ] Dimitris Gritzalis , A. Tomaras , Sokratis K. Katsikas , J. Keklikoglou Data security in medical information systems: The Greek case. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:2, pp:141-159 [Journal ]