Facet browsing currently unavailable
Page 1 of 7421 results
Sort by: relevance publication year
A geometric approach for sharing secrets JOURNAL ARTICLE published January 1995 in Computers & Security |
Multiplexer-based double-exponentiation for normal basis of GF(2m) JOURNAL ARTICLE published February 2005 in Computers & Security |
The perils of privacy JOURNAL ARTICLE published October 2002 in Computers & Security |
How security fits in — a management view JOURNAL ARTICLE published April 1987 in Computers & Security |
US approaches to cryptographic key escrowing (session presentation) JOURNAL ARTICLE published January 1995 in Computers & Security |
‘Mafiaboy’ Hit With 64 New Charges JOURNAL ARTICLE published October 2000 in Computers & Security |
Calendar JOURNAL ARTICLE published February 1984 in Computers & Security |
Contents JOURNAL ARTICLE published February 2012 in Computers & Security |
Editorial JOURNAL ARTICLE published May 1984 in Computers & Security |
Another perspective on sensitive but unclassified data JOURNAL ARTICLE published February 1988 in Computers & Security |
Exorcising demons JOURNAL ARTICLE published January 1997 in Computers & Security |
A dynamic cryptographic key generation and information broadcasting scheme in information systems JOURNAL ARTICLE published January 1994 in Computers & Security |
It's 1997. Do you know where your data is? JOURNAL ARTICLE published January 1997 in Computers & Security |
Security takes front seat at pentium preview JOURNAL ARTICLE published January 1999 in Computers & Security |
Editorial Board JOURNAL ARTICLE published February 1991 in Computers & Security |
Cryptography and cryptosystems. January 1970– October 1987 JOURNAL ARTICLE published October 1988 in Computers & Security |
Year 2000 — A real is security issue JOURNAL ARTICLE published January 1996 in Computers & Security |
Safety on the move JOURNAL ARTICLE published January 1995 in Computers & Security |
The password predictor—a training aid for raising security awareness JOURNAL ARTICLE published October 1988 in Computers & Security |
International board of referees JOURNAL ARTICLE published January 1994 in Computers & Security |