Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 10 of 7415 results
Sort by: relevance publication year

Kahn on codes: Secrets of the new cryptology

JOURNAL ARTICLE published September 1985 in Computers & Security

Editorial Board

JOURNAL ARTICLE published April 2020 in Computers & Security

The one minute fraud auditor

JOURNAL ARTICLE published February 1989 in Computers & Security

Authors: Jack Bologna

Weigh in on encryption standard

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Sandy Nichol

Editorial Board

JOURNAL ARTICLE published July 2019 in Computers & Security

Guide for authors

JOURNAL ARTICLE published May 2003 in Computers & Security

Detecting network intruders

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Helen Meyer

Discussing security with top management

JOURNAL ARTICLE published April 1988 in Computers & Security

Authors: William A.J. Bound

International board of referees

JOURNAL ARTICLE published January 1994 in Computers & Security

IFIP technical committee 11

JOURNAL ARTICLE published December 1990 in Computers & Security

A DOS-based POset implementation

JOURNAL ARTICLE published October 1991 in Computers & Security

Authors: Frederick B. Cohen

Protecting The Web Server And Applications

JOURNAL ARTICLE published January 2001 in Computers & Security

Authors: Iain Franklin

Hardware, software security devices protect PCs and inside information

JOURNAL ARTICLE published April 1988 in Computers & Security

In brief

JOURNAL ARTICLE published October 2002 in Computers & Security

Authors: Brian McKenna | Sarah Hilley

Protection of information in electronic systems

JOURNAL ARTICLE published December 1986 in Computers & Security

Securing peer-assisted indoor localization leveraging acoustic ranging

JOURNAL ARTICLE published March 2019 in Computers & Security

Research funded by National Natural Science Foundation of China (61425024,61402223,61321491,61300235)

Authors: Shaoyong Du | Jingyu Hua | Sheng Zhong

Security views

JOURNAL ARTICLE published September 2005 in Computers & Security

Authors: E. Schultz

Trusted ORACLE—multilevel secure data management for military computing

JOURNAL ARTICLE published May 1991 in Computers & Security

Authors: R.J. Allen

Photon protection

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Helen Meyer

Suppliers are biggest virus carriers

JOURNAL ARTICLE published December 1992 in Computers & Security