Journals in DBLP
Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1994, v:13, n:4, pp:278-286 [Journal ] Karl Rihaczek Data interchange and legal security - signature surrogates. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1994, v:13, n:4, pp:287-293 [Journal ] William List , Rob Melville Integrity in information systems - Executive summary. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1994, v:13, n:4, pp:295-301 [Journal ] Edo Roos Lindgreen , I. S. Herschberg On the validity of the Bell-La Padula model. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1994, v:13, n:4, pp:317-333 [Journal ] Dennis Longley , S. Vasudevan Effect of key generators on the automatic search for flaws in key management schemes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1994, v:13, n:4, pp:335-347 [Journal ] D. N. J. Mostert , Sebastiaan H. von Solms A methodology to include computer security, safety and resilience requirements as part of the user requirement. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1994, v:13, n:4, pp:349-364 [Journal ]