Facet browsing currently unavailable
Page 3 of 7440 results
Sort by: relevance publication year
BD-D1Sec: Protocol of security authentication for BeiDou D1 civil navigation message based on certificateless signature JOURNAL ARTICLE published June 2021 in Computers & Security |
Information Systems Risk Management: Key Concepts and Business Processes JOURNAL ARTICLE published March 2000 in Computers & Security |
The Search For Privacy JOURNAL ARTICLE published April 2001 in Computers & Security |
ECMA's approach for IT security evalutaions JOURNAL ARTICLE published January 1995 in Computers & Security |
Random bits & bytes JOURNAL ARTICLE published January 1996 in Computers & Security |
Know your enemy JOURNAL ARTICLE published January 1999 in Computers & Security |
Calendar JOURNAL ARTICLE published January 1995 in Computers & Security |
New computer system causes chaos JOURNAL ARTICLE published January 1995 in Computers & Security |
From the editor JOURNAL ARTICLE published January 1995 in Computers & Security |
Bombed out JOURNAL ARTICLE published September 1992 in Computers & Security |
Today's computer crime: The threat from within JOURNAL ARTICLE published February 1988 in Computers & Security |
From the editor JOURNAL ARTICLE published February 1991 in Computers & Security |
Cryptanalysis of two password-based authentication schemes using smart cards JOURNAL ARTICLE published February 2006 in Computers & Security |
Data acquisition, reduction, and analysis using a microcomputer JOURNAL ARTICLE published October 1988 in Computers & Security |
Melissa virus wakes up IT world JOURNAL ARTICLE published January 1999 in Computers & Security |
Reducing charges of E-comm harassment JOURNAL ARTICLE published January 1998 in Computers & Security |
Virus defense alert JOURNAL ARTICLE published April 1988 in Computers & Security |
Nested categories for access control JOURNAL ARTICLE published December 1988 in Computers & Security |
Old viruses licked, but new ones find fodder in Windows 95 JOURNAL ARTICLE published January 1995 in Computers & Security |
Marketing information systems audit JOURNAL ARTICLE published January 1995 in Computers & Security |