Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 7 of 7438 results
Sort by: relevance publication year

The security challenges inherent in VoIP

JOURNAL ARTICLE published December 2007 in Computers & Security

Authors: D. Bradbury

Novell wages war on Israeli software piracy

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Sandy Nichol

Computer verification of human users' identity: A theoretical model and some evaluation criteria

JOURNAL ARTICLE published November 1991 in Computers & Security

Authors: Viiveke Fåk

Providing a safety net

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Helen Collinson

Keep your network virus-free

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Helen Meyer

Desperate times call for desperate measures

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Helen Meyer

A key management algorithm for secure communication in open systems interconnection architecture

JOURNAL ARTICLE published February 1990 in Computers & Security

Authors: Raju Ramaswamy

Confessing to the FBI

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Helen Meyer

A Need for a Network Security Czar

JOURNAL ARTICLE published October 2000 in Computers & Security

Authors: Bill Hancock

Virus is wrapped and all ready for Christmas day

JOURNAL ARTICLE published January 1999 in Computers & Security

Ethernet communication networks. 1978–1986 (citations from the INSPEC: Information Services for the Physics and Engineering Communities database)

JOURNAL ARTICLE published October 1988 in Computers & Security

Can viruses ever be useful?

JOURNAL ARTICLE published April 1991 in Computers & Security

Authors: Harold Thimbleby

Study on poll-site voting and verification systems

JOURNAL ARTICLE published November 2012 in Computers & Security

Authors: Roger Jardí-Cedó | Jordi Pujol-Ahulló | Jordi Castellà-Roca | Alexandre Viejo

Spherical microaggregation: Anonymizing sparse vector spaces

JOURNAL ARTICLE published March 2015 in Computers & Security

Authors: Daniel Abril | Guillermo Navarro-Arribas | Vicenç Torra

A Simple Graphical Tool For Modelling Trust

JOURNAL ARTICLE published September 2001 in Computers & Security

Authors: Steve Purser

Achieving Interoperability in a Multiple-Security- Policies Environment

JOURNAL ARTICLE published March 2000 in Computers & Security

Authors: S.A. Kokolakis | E.A. Kiountouzis

Applying security policies and service level agreement to IaaS service model to enhance security and transition

JOURNAL ARTICLE published May 2012 in Computers & Security

Authors: Louay Karadsheh

A taxonomy and survey of attacks on digital signatures

JOURNAL ARTICLE published May 2013 in Computers & Security

Authors: Jorge L. Hernandez-Ardieta | Ana I. Gonzalez-Tablas | Jose M. de Fuentes | Benjamin Ramos

Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies

JOURNAL ARTICLE published March 2008 in Computers & Security

Authors: Francesco Palmieri | Ugo Fiore

Balancing software and training requirements for information security

JOURNAL ARTICLE published November 2023 in Computers & Security

Research funded by Javna Agencija za Raziskovalno Dejavnost RS (P2-0426) | Univerza v Mariboru (J5-3111)

Authors: Damjan Fujs | Simon Vrhovec | Damjan Vavpotič