Facet browsing currently unavailable
Page 3 of 7430 results
Sort by: relevance publication year
BD-D1Sec: Protocol of security authentication for BeiDou D1 civil navigation message based on certificateless signature JOURNAL ARTICLE published June 2021 in Computers & Security |
IFIP/SEC'96 conference proceeding JOURNAL ARTICLE published January 1996 in Computers & Security |
Certified electronic mail: Properties revisited JOURNAL ARTICLE published March 2010 in Computers & Security |
An axiomatic theory of trust in secure communication protocols JOURNAL ARTICLE published April 1992 in Computers & Security |
DOPdefender: An approach to thwarting data-oriented programming attacks based on a data-aware automaton JOURNAL ARTICLE published March 2019 in Computers & Security Research funded by National Natural Science Foundation of China (61802432) |
The threats on the web JOURNAL ARTICLE published January 1997 in Computers & Security |
Editorial Board JOURNAL ARTICLE published November 2019 in Computers & Security |
The Evolution of Intrusion Detection Systems — The Next Step JOURNAL ARTICLE published April 2001 in Computers & Security |
NASA Hacker Pleads Guilty JOURNAL ARTICLE published December 2000 in Computers & Security |
Weak SNMP? JOURNAL ARTICLE published January 1998 in Computers & Security |
Data security in a relational database environment JOURNAL ARTICLE published June 1986 in Computers & Security |
IFIP Technical Committee JOURNAL ARTICLE published September 2009 in Computers & Security |
New thinking about information technology security JOURNAL ARTICLE published January 1995 in Computers & Security |
Laptop Theft Now Targeted Towards Data and Not Necessarily Hardware JOURNAL ARTICLE published December 2000 in Computers & Security |
Win 95 security measures mollify users JOURNAL ARTICLE published January 1996 in Computers & Security |
Editorial: Special issue on trust in cyber, physical and social computing JOURNAL ARTICLE published November 2014 in Computers & Security |
Romancing The Internet And Management’s Quagmire JOURNAL ARTICLE published November 2000 in Computers & Security |
Annotated bibliography on software maintenance JOURNAL ARTICLE published October 1988 in Computers & Security |
Security plans lag computer crime rate JOURNAL ARTICLE published January 1995 in Computers & Security |
An analysis of the statistical disclosure attack and receiver-bound cover JOURNAL ARTICLE published November 2011 in Computers & Security |