Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 5 of 7416 results
Sort by: relevance publication year

Report from the working conference on “the Crypto User's Handbook” held in Stockholm, October 22–23, 1986 by IFIP WG 11:4

JOURNAL ARTICLE published August 1987 in Computers & Security

Authors: Viiveke Fåk

Calendar

JOURNAL ARTICLE published January 1997 in Computers & Security

Intergrating security activities into the software development life cycle and the software quality assurance process

JOURNAL ARTICLE published June 1986 in Computers & Security

Authors: FrederickG. Tompkins | Russel Rice

Update on triple DES operations and crypto system initialization

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Carl Meyer

The 1993 IFIP Kristian Beckman Award

JOURNAL ARTICLE published June 1993 in Computers & Security

Authors: John Meyer

White House Security Summit Builds Towards a B2B Security Standard

JOURNAL ARTICLE published November 2000 in Computers & Security

Authors: Bill Hancock

The state-of-the-art in computer security

JOURNAL ARTICLE published November 1983 in Computers & Security

Authors: Jerome Lobel

ECOMA-14

JOURNAL ARTICLE published April 1987 in Computers & Security

Authors: Ronald Paans

Personal but not confidential: A new davate over privacy

JOURNAL ARTICLE published June 1988 in Computers & Security

Authors: Esther H. Highland

Calendar

JOURNAL ARTICLE published January 1995 in Computers & Security

Internet encryption

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Paul Docherty

A confidentiality system for ISDN inter-PC high-speed file transfer

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Kiyoto Tanaka | Hiroyuki Matsumoto | Ikuro Oyaizu

A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider

JOURNAL ARTICLE published March 2010 in Computers & Security

Authors: Houssem Jarraya | Maryline Laurent

Protecting information in the electronic workplace: A guide for managers

JOURNAL ARTICLE published November 1983 in Computers & Security

Want security? See what hacker does with a cookie

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Helen Meyer

Loophole gives hackers access to DEC machines

JOURNAL ARTICLE published April 1988 in Computers & Security

International board of referees

JOURNAL ARTICLE published January 1996 in Computers & Security

Computer abuse and managerial response

JOURNAL ARTICLE published December 1987 in Computers & Security

Authors: HaroldJoseph Highland

Intranets: living in your own private internet

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Helen Collinson

Author index for vol. 12

JOURNAL ARTICLE published February 1994 in Computers & Security