Facet browsing currently unavailable
Page 7 of 7437 results
Sort by: relevance publication year
The reduced Enigma JOURNAL ARTICLE published October 2003 in Computers & Security |
From the Editor JOURNAL ARTICLE published January 1998 in Computers & Security |
The security challenges inherent in VoIP JOURNAL ARTICLE published December 2007 in Computers & Security |
Novell wages war on Israeli software piracy JOURNAL ARTICLE published January 1999 in Computers & Security |
Computer verification of human users' identity: A theoretical model and some evaluation criteria JOURNAL ARTICLE published November 1991 in Computers & Security |
Providing a safety net JOURNAL ARTICLE published January 1995 in Computers & Security |
Keep your network virus-free JOURNAL ARTICLE published January 1996 in Computers & Security |
Desperate times call for desperate measures JOURNAL ARTICLE published January 1996 in Computers & Security |
A key management algorithm for secure communication in open systems interconnection architecture JOURNAL ARTICLE published February 1990 in Computers & Security |
Confessing to the FBI JOURNAL ARTICLE published January 1997 in Computers & Security |
A Need for a Network Security Czar JOURNAL ARTICLE published October 2000 in Computers & Security |
Virus is wrapped and all ready for Christmas day JOURNAL ARTICLE published January 1999 in Computers & Security |
Ethernet communication networks. 1978–1986 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database) JOURNAL ARTICLE published October 1988 in Computers & Security |
Can viruses ever be useful? JOURNAL ARTICLE published April 1991 in Computers & Security |
Study on poll-site voting and verification systems JOURNAL ARTICLE published November 2012 in Computers & Security |
Spherical microaggregation: Anonymizing sparse vector spaces JOURNAL ARTICLE published March 2015 in Computers & Security |
A Simple Graphical Tool For Modelling Trust JOURNAL ARTICLE published September 2001 in Computers & Security |
Achieving Interoperability in a Multiple-Security- Policies Environment JOURNAL ARTICLE published March 2000 in Computers & Security |
Applying security policies and service level agreement to IaaS service model to enhance security and transition JOURNAL ARTICLE published May 2012 in Computers & Security |
A taxonomy and survey of attacks on digital signatures JOURNAL ARTICLE published May 2013 in Computers & Security |