Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 9 of 7437 results
Sort by: relevance publication year

Security Views - Malware Update

JOURNAL ARTICLE published March 2006 in Computers & Security

Current literature The 19th National Information Systems Security Conference

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Harold Joseph Highland

Dynamic authentication for smartcards

JOURNAL ARTICLE published January 1995 in Computers & Security

Air force mounts offensive against computer crime

JOURNAL ARTICLE published October 1988 in Computers & Security

Authors: Neil Munro

Secure electronic-mail: return to sender

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Ben McClure

7th DoD/NBS computer security conference

JOURNAL ARTICLE published September 1985 in Computers & Security

Calendar

JOURNAL ARTICLE published May 1991 in Computers & Security

Letter to the editor

JOURNAL ARTICLE published May 1993 in Computers & Security

Authors: Steve Roberts

IFIP technical committee 11

JOURNAL ARTICLE published February 1988 in Computers & Security

Crypto paper set for January launch

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Helen Meyer

In brief

JOURNAL ARTICLE published March 2002 in Computers & Security

Authors: Sarah Hilley

From toy rings to sophisticated codes

JOURNAL ARTICLE published January 1998 in Computers & Security

Authors: Ben McClure

IFIP technical committee 11

JOURNAL ARTICLE published May 2003 in Computers & Security

Signature verification using holistic measures

JOURNAL ARTICLE published December 1985 in Computers & Security

Authors: P. de Bruyne

A file integrity checking system to detect and recover from program modification attacks in multi-user computer systems

JOURNAL ARTICLE published August 1990 in Computers & Security

Authors: Robert A. McKosky | Sajjan G. Shiva

OSI security system revealed

JOURNAL ARTICLE published February 1988 in Computers & Security

Authors: Elisabeth Horwitt

Contents

JOURNAL ARTICLE published October 2012 in Computers & Security

Internet users fret over spies' new role

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Helen Collinson

Internet security incidents, a survey within Dutch organizations

JOURNAL ARTICLE published January 1998 in Computers & Security

Authors: Martin Caminada | Reind van de Riet | Arjen van Zanten | Leendert van Doom

Transborder data flows: access to the international on-line data-base market

JOURNAL ARTICLE published September 1985 in Computers & Security