Facet browsing currently unavailable
Page 2 of 7428 results
Sort by: relevance publication year
More options for physical access control JOURNAL ARTICLE published May 1990 in Computers & Security |
Security Views - Malware Update JOURNAL ARTICLE published February 2007 in Computers & Security |
In this issue… JOURNAL ARTICLE published March 1986 in Computers & Security |
Site Spoofing Becomes More Popular JOURNAL ARTICLE published November 2000 in Computers & Security |
Towards a causality based analysis of anonymity protection in indeterministic mix systems JOURNAL ARTICLE published June 2017 in Computers & Security |
Privacy Advocates Grow in Europe JOURNAL ARTICLE published January 2001 in Computers & Security |
Protection on the web JOURNAL ARTICLE published January 1996 in Computers & Security |
Facing the challenge of IT security JOURNAL ARTICLE published January 1995 in Computers & Security |
RSA goes down under to dodge export laws JOURNAL ARTICLE published January 1999 in Computers & Security |
A framework for quantitative evaluation of parallel control-flow obfuscation JOURNAL ARTICLE published November 2012 in Computers & Security |
Does Microsoft have security all locked up? JOURNAL ARTICLE published January 1996 in Computers & Security |
PGP V5.0 Keys Potentially Insecure JOURNAL ARTICLE published July 2000 in Computers & Security |
Editorial Board JOURNAL ARTICLE published August 2018 in Computers & Security |
Design and administration of distributed and hierarchical information networks under partial orderings JOURNAL ARTICLE published June 1987 in Computers & Security |
Congestion control in routing networks JOURNAL ARTICLE published October 1988 in Computers & Security |
Analysis and reconstruction of laser printer information leakages in the media of electromagnetic radiation, power, and signal lines JOURNAL ARTICLE published May 2016 in Computers & Security |
Security Training: Education For an Emerging Profession? JOURNAL ARTICLE published May 2001 in Computers & Security |
Mahalanobis distance-based robust approaches against false data injection attacks on dynamic power state estimation JOURNAL ARTICLE published September 2021 in Computers & Security |
MultiRHM: Defeating multi-staged enterprise intrusion attacks through multi-dimensional and multi-parameter host identity anonymization JOURNAL ARTICLE published January 2023 in Computers & Security |
On accuracy and anonymity of privacy-preserving negative survey (NS) algorithms JOURNAL ARTICLE published June 2021 in Computers & Security |