Facet browsing currently unavailable
Page 5 of 7416 results
Sort by: relevance publication year
Report from the working conference on “the Crypto User's Handbook” held in Stockholm, October 22–23, 1986 by IFIP WG 11:4 JOURNAL ARTICLE published August 1987 in Computers & Security |
Calendar JOURNAL ARTICLE published January 1997 in Computers & Security |
Intergrating security activities into the software development life cycle and the software quality assurance process JOURNAL ARTICLE published June 1986 in Computers & Security |
Update on triple DES operations and crypto system initialization JOURNAL ARTICLE published January 1997 in Computers & Security |
The 1993 IFIP Kristian Beckman Award JOURNAL ARTICLE published June 1993 in Computers & Security |
White House Security Summit Builds Towards a B2B Security Standard JOURNAL ARTICLE published November 2000 in Computers & Security |
The state-of-the-art in computer security JOURNAL ARTICLE published November 1983 in Computers & Security |
ECOMA-14 JOURNAL ARTICLE published April 1987 in Computers & Security |
Personal but not confidential: A new davate over privacy JOURNAL ARTICLE published June 1988 in Computers & Security |
Calendar JOURNAL ARTICLE published January 1995 in Computers & Security |
Internet encryption JOURNAL ARTICLE published January 1997 in Computers & Security |
A confidentiality system for ISDN inter-PC high-speed file transfer JOURNAL ARTICLE published January 1996 in Computers & Security |
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider JOURNAL ARTICLE published March 2010 in Computers & Security |
Protecting information in the electronic workplace: A guide for managers JOURNAL ARTICLE published November 1983 in Computers & Security |
Want security? See what hacker does with a cookie JOURNAL ARTICLE published January 1997 in Computers & Security |
Loophole gives hackers access to DEC machines JOURNAL ARTICLE published April 1988 in Computers & Security |
International board of referees JOURNAL ARTICLE published January 1996 in Computers & Security |
Computer abuse and managerial response JOURNAL ARTICLE published December 1987 in Computers & Security |
Intranets: living in your own private internet JOURNAL ARTICLE published January 1996 in Computers & Security |
Author index for vol. 12 JOURNAL ARTICLE published February 1994 in Computers & Security |