Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 4 of 7430 results
Sort by: relevance publication year

Calling in confidence

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Helen Collinson

A sensible approach to protecting your data

JOURNAL ARTICLE published June 1988 in Computers & Security

Authors: Esther H. Highland

Passwords could be past tense by 2002

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Helen Meyer

Virus wars escalate

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Helen Collinson

IFIP technical committee 11

JOURNAL ARTICLE published December 1989 in Computers & Security

Agencies fail to appreciate threat to data security

JOURNAL ARTICLE published August 1988 in Computers & Security

Authors: Esther H. Highland

Protect your e-mail

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Helen Collinson

A novel remote user authentication scheme using bilinear pairings

JOURNAL ARTICLE published May 2006 in Computers & Security

Authors: Manik Lal Das | Ashutosh Saxena | Ved P. Gulati | Deepak B. Phatak

The Search For Privacy

JOURNAL ARTICLE published April 2001 in Computers & Security

Authors: Stephen Hinde

ECMA's approach for IT security evalutaions

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Harold Joseph Highland

Random bits & bytes

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Harold Joseph Highland

Know your enemy

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Helen Meyer

Calendar

JOURNAL ARTICLE published January 1995 in Computers & Security

New computer system causes chaos

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Helen Collinson

From the editor

JOURNAL ARTICLE published January 1995 in Computers & Security

Bombed out

JOURNAL ARTICLE published September 1992 in Computers & Security

Today's computer crime: The threat from within

JOURNAL ARTICLE published February 1988 in Computers & Security

Authors: Diana ben-Aaron | Lee Green

From the editor

JOURNAL ARTICLE published February 1991 in Computers & Security

Cryptanalysis of two password-based authentication schemes using smart cards

JOURNAL ARTICLE published February 2006 in Computers & Security

Authors: Raphael C.-W. Phan

Data acquisition, reduction, and analysis using a microcomputer

JOURNAL ARTICLE published October 1988 in Computers & Security

Authors: Bruce M. Allen