Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 4 of 7440 results
Sort by: relevance publication year

From the editor

JOURNAL ARTICLE published January 1996 in Computers & Security

PC-mainframe ties hard to guard

JOURNAL ARTICLE published April 1988 in Computers & Security

Legal options to computer viruses

JOURNAL ARTICLE published February 1989 in Computers & Security

Authors: Bernard P. Zajac

Telecommunications Crime — Part 3

JOURNAL ARTICLE published February 2000 in Computers & Security

Authors: Michael Collins

The Annual Report of the UK Data Protection Registrar

JOURNAL ARTICLE published January 1998 in Computers & Security

Authors: Chris Pounder

Corporates blasé over software theft

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Helen Meyer

Five rules for selling security

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Helen Meyer

Announcement

JOURNAL ARTICLE published November 2018 in Computers & Security

Verifying the authentication of an information system user

JOURNAL ARTICLE published April 1987 in Computers & Security

Authors: Niv Ahituv | Yeheskel Lapid | Seev Neumann

Revocation and update of trust in autonomous delay tolerant networks

JOURNAL ARTICLE published July 2016 in Computers & Security

Authors: C.I. Djamaludin | E. Foo | S. Camtepe | P. Corke

Mitigation of network tampering using dynamic dispatch of mobile agents

JOURNAL ARTICLE published February 2004 in Computers & Security

Authors: Ronald F DeMara | Adam J Rocke

Computer forensics

JOURNAL ARTICLE published January 2003 in Computers & Security

Authors: Dr.Henry B Wolfe

Providing secure execution environments with a last line of defense against Trojan circuit attacks

JOURNAL ARTICLE published October 2009 in Computers & Security

Authors: Gedare Bloom | Bhagirath Narahari | Rahul Simha | Joseph Zambreno

Privacy preservation for soft biometrics based multimodal recognition system

JOURNAL ARTICLE published May 2016 in Computers & Security

Authors: Debanjan Sadhya | Sanjay Kumar Singh

IFIP/SEC'96 conference proceeding

JOURNAL ARTICLE published January 1996 in Computers & Security

Certified electronic mail: Properties revisited

JOURNAL ARTICLE published March 2010 in Computers & Security

Authors: Josep Lluis Ferrer-Gomilla | Jose A. Onieva | Magdalena Payeras | Javier Lopez

An axiomatic theory of trust in secure communication protocols

JOURNAL ARTICLE published April 1992 in Computers & Security

Authors: P.Venkat Rangan

DOPdefender: An approach to thwarting data-oriented programming attacks based on a data-aware automaton

JOURNAL ARTICLE published March 2019 in Computers & Security

Research funded by National Natural Science Foundation of China (61802432)

Authors: Ye Wang | Qingbao Li | Ping Zhang | Zhifeng Chen | Guimin Zhang

The threats on the web

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Harold Joseph Highland

Editorial Board

JOURNAL ARTICLE published November 2019 in Computers & Security