Facet browsing currently unavailable
Page 4 of 7438 results
Sort by: relevance publication year
E-signatures for the security conscious JOURNAL ARTICLE published January 1997 in Computers & Security |
CIO’s Get Serious About Best Security Practices JOURNAL ARTICLE published July 2000 in Computers & Security |
New computer system causes chaos JOURNAL ARTICLE published January 1995 in Computers & Security |
Letter to the editor JOURNAL ARTICLE published January 1995 in Computers & Security |
Expert system for software quality assurance JOURNAL ARTICLE published October 1988 in Computers & Security |
Refereed Papers JOURNAL ARTICLE published March 2002 in Computers & Security |
Information system attacks: A preliminary classification scheme JOURNAL ARTICLE published January 1997 in Computers & Security |
Authenticating users by word association JOURNAL ARTICLE published December 1987 in Computers & Security |
An intruder model with message inspection for model checking security protocols JOURNAL ARTICLE published February 2010 in Computers & Security |
DKaaS: DARK-KERNEL as a service for active cyber threat intelligence JOURNAL ARTICLE published September 2023 in Computers & Security |
Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications JOURNAL ARTICLE published November 2019 in Computers & Security Research funded by National Natural Science Foundation of China (61802376) |
A concise cost analysis of Internet malware JOURNAL ARTICLE published October 2009 in Computers & Security |
Subject index for vol. 11 JOURNAL ARTICLE published March 1993 in Computers & Security |
Editorial JOURNAL ARTICLE published July 2010 in Computers & Security |
When the password is a passkey JOURNAL ARTICLE published February 1988 in Computers & Security |
Information Security in Multiprocessor Systems Based on the X86 Architecture JOURNAL ARTICLE published October 2000 in Computers & Security |
Think you're virus-proof? Think again JOURNAL ARTICLE published January 1995 in Computers & Security |
Is encryption the road to security? JOURNAL ARTICLE published January 1996 in Computers & Security |
A primer on software piracy cases in the courts JOURNAL ARTICLE published May 1984 in Computers & Security |
On Bricks and Walls: Why Building Secure Software is Hard JOURNAL ARTICLE published June 2002 in Computers & Security |