Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 7421 results
Sort by: relevance publication year

A geometric approach for sharing secrets

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Wu Tzong-Chen | He Wei-Hua

Multiplexer-based double-exponentiation for normal basis of GF(2m)

JOURNAL ARTICLE published February 2005 in Computers & Security

Authors: Che Wun Chiou | Chiou-Yng Lee

The perils of privacy

JOURNAL ARTICLE published October 2002 in Computers & Security

Authors: Stephen Hinde

How security fits in — a management view

JOURNAL ARTICLE published April 1987 in Computers & Security

Authors: James A. Schweitzer

US approaches to cryptographic key escrowing (session presentation)

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Lynn McNulty

‘Mafiaboy’ Hit With 64 New Charges

JOURNAL ARTICLE published October 2000 in Computers & Security

Authors: Bill Hancock

Calendar

JOURNAL ARTICLE published February 1984 in Computers & Security

Contents

JOURNAL ARTICLE published February 2012 in Computers & Security

Editorial

JOURNAL ARTICLE published May 1984 in Computers & Security

Authors: Harold Joseph Highland

Another perspective on sensitive but unclassified data

JOURNAL ARTICLE published February 1988 in Computers & Security

Authors: Robert H. Courtney

Exorcising demons

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Ben McClure

A dynamic cryptographic key generation and information broadcasting scheme in information systems

JOURNAL ARTICLE published January 1994 in Computers & Security

Authors: Horng-Twu Liaw

It's 1997. Do you know where your data is?

JOURNAL ARTICLE published January 1997 in Computers & Security

Security takes front seat at pentium preview

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Helen Meyer

Editorial Board

JOURNAL ARTICLE published February 1991 in Computers & Security

Cryptography and cryptosystems. January 1970– October 1987

JOURNAL ARTICLE published October 1988 in Computers & Security

Year 2000 — A real is security issue

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Edwin B. Heinlein

Safety on the move

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Helen Collinson

The password predictor—a training aid for raising security awareness

JOURNAL ARTICLE published October 1988 in Computers & Security

Authors: John M. Carroll | Robert B. Mowat | Lynda E. Robbins | David Wiseman

International board of referees

JOURNAL ARTICLE published January 1994 in Computers & Security