Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 7379 results
Sort by: relevance publication year

A security officer's workbench

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Lam For Kwok | Dennis Longley

Random bits & bytes

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Harold Joseph Highland

IFC - Editorial Board

JOURNAL ARTICLE published October 2006 in Computers & Security

Contingency planning for the millenium

JOURNAL ARTICLE published January 1998 in Computers & Security

Authors: Stephen Hinde

Red book includes a metaphysical look at security

JOURNAL ARTICLE published June 1988 in Computers & Security

Authors: Esther H. Highland

Cryptographic key distribution and authentication protocols for secure group communication

JOURNAL ARTICLE published January 1996 in Computers & Security

International Board of Referees

JOURNAL ARTICLE published January 1995 in Computers & Security

IFC - Editorial Board

JOURNAL ARTICLE published May 2009 in Computers & Security

From the editor

JOURNAL ARTICLE published February 1989 in Computers & Security

Authors: Harold Joseph Highland

Computer user surveillance

JOURNAL ARTICLE published April 1988 in Computers & Security

The reduced Enigma

JOURNAL ARTICLE published October 2003 in Computers & Security

Authors: Harold Thimbleby

From the Editor

JOURNAL ARTICLE published January 1998 in Computers & Security

Authors: Bill Hancock

The security challenges inherent in VoIP

JOURNAL ARTICLE published December 2007 in Computers & Security

Authors: D. Bradbury

Novell wages war on Israeli software piracy

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Sandy Nichol

Computer verification of human users' identity: A theoretical model and some evaluation criteria

JOURNAL ARTICLE published November 1991 in Computers & Security

Authors: Viiveke Fåk

Providing a safety net

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Helen Collinson

Keep your network virus-free

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Helen Meyer

Desperate times call for desperate measures

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Helen Meyer

A key management algorithm for secure communication in open systems interconnection architecture

JOURNAL ARTICLE published February 1990 in Computers & Security

Authors: Raju Ramaswamy

Confessing to the FBI

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Helen Meyer