Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 3 of 7440 results
Sort by: relevance publication year

BD-D1Sec: Protocol of security authentication for BeiDou D1 civil navigation message based on certificateless signature

JOURNAL ARTICLE published June 2021 in Computers & Security

Authors: Wu Zhijun | Yang Yiming

Information Systems Risk Management: Key Concepts and Business Processes

JOURNAL ARTICLE published March 2000 in Computers & Security

Authors: Thomas Finne

The Search For Privacy

JOURNAL ARTICLE published April 2001 in Computers & Security

Authors: Stephen Hinde

ECMA's approach for IT security evalutaions

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Harold Joseph Highland

Random bits & bytes

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Harold Joseph Highland

Know your enemy

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Helen Meyer

Calendar

JOURNAL ARTICLE published January 1995 in Computers & Security

New computer system causes chaos

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Helen Collinson

From the editor

JOURNAL ARTICLE published January 1995 in Computers & Security

Bombed out

JOURNAL ARTICLE published September 1992 in Computers & Security

Today's computer crime: The threat from within

JOURNAL ARTICLE published February 1988 in Computers & Security

Authors: Diana ben-Aaron | Lee Green

From the editor

JOURNAL ARTICLE published February 1991 in Computers & Security

Cryptanalysis of two password-based authentication schemes using smart cards

JOURNAL ARTICLE published February 2006 in Computers & Security

Authors: Raphael C.-W. Phan

Data acquisition, reduction, and analysis using a microcomputer

JOURNAL ARTICLE published October 1988 in Computers & Security

Authors: Bruce M. Allen

Melissa virus wakes up IT world

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Sandy Nichol

Reducing charges of E-comm harassment

JOURNAL ARTICLE published January 1998 in Computers & Security

Authors: Mark Moulton

Virus defense alert

JOURNAL ARTICLE published April 1988 in Computers & Security

Nested categories for access control

JOURNAL ARTICLE published December 1988 in Computers & Security

Authors: Ravinderpal Singh Sandhu

Old viruses licked, but new ones find fodder in Windows 95

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Helen Collinson

Marketing information systems audit

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Alan Krull