Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 7 of 7437 results
Sort by: relevance publication year

The reduced Enigma

JOURNAL ARTICLE published October 2003 in Computers & Security

Authors: Harold Thimbleby

From the Editor

JOURNAL ARTICLE published January 1998 in Computers & Security

Authors: Bill Hancock

The security challenges inherent in VoIP

JOURNAL ARTICLE published December 2007 in Computers & Security

Authors: D. Bradbury

Novell wages war on Israeli software piracy

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Sandy Nichol

Computer verification of human users' identity: A theoretical model and some evaluation criteria

JOURNAL ARTICLE published November 1991 in Computers & Security

Authors: Viiveke Fåk

Providing a safety net

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Helen Collinson

Keep your network virus-free

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Helen Meyer

Desperate times call for desperate measures

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Helen Meyer

A key management algorithm for secure communication in open systems interconnection architecture

JOURNAL ARTICLE published February 1990 in Computers & Security

Authors: Raju Ramaswamy

Confessing to the FBI

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Helen Meyer

A Need for a Network Security Czar

JOURNAL ARTICLE published October 2000 in Computers & Security

Authors: Bill Hancock

Virus is wrapped and all ready for Christmas day

JOURNAL ARTICLE published January 1999 in Computers & Security

Ethernet communication networks. 1978–1986 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database)

JOURNAL ARTICLE published October 1988 in Computers & Security

Can viruses ever be useful?

JOURNAL ARTICLE published April 1991 in Computers & Security

Authors: Harold Thimbleby

Study on poll-site voting and verification systems

JOURNAL ARTICLE published November 2012 in Computers & Security

Authors: Roger Jardí-Cedó | Jordi Pujol-Ahulló | Jordi Castellà-Roca | Alexandre Viejo

Spherical microaggregation: Anonymizing sparse vector spaces

JOURNAL ARTICLE published March 2015 in Computers & Security

Authors: Daniel Abril | Guillermo Navarro-Arribas | Vicenç Torra

A Simple Graphical Tool For Modelling Trust

JOURNAL ARTICLE published September 2001 in Computers & Security

Authors: Steve Purser

Achieving Interoperability in a Multiple-Security- Policies Environment

JOURNAL ARTICLE published March 2000 in Computers & Security

Authors: S.A. Kokolakis | E.A. Kiountouzis

Applying security policies and service level agreement to IaaS service model to enhance security and transition

JOURNAL ARTICLE published May 2012 in Computers & Security

Authors: Louay Karadsheh

A taxonomy and survey of attacks on digital signatures

JOURNAL ARTICLE published May 2013 in Computers & Security

Authors: Jorge L. Hernandez-Ardieta | Ana I. Gonzalez-Tablas | Jose M. de Fuentes | Benjamin Ramos