Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 3 of 7430 results
Sort by: relevance publication year

BD-D1Sec: Protocol of security authentication for BeiDou D1 civil navigation message based on certificateless signature

JOURNAL ARTICLE published June 2021 in Computers & Security

Authors: Wu Zhijun | Yang Yiming

IFIP/SEC'96 conference proceeding

JOURNAL ARTICLE published January 1996 in Computers & Security

Certified electronic mail: Properties revisited

JOURNAL ARTICLE published March 2010 in Computers & Security

Authors: Josep Lluis Ferrer-Gomilla | Jose A. Onieva | Magdalena Payeras | Javier Lopez

An axiomatic theory of trust in secure communication protocols

JOURNAL ARTICLE published April 1992 in Computers & Security

Authors: P.Venkat Rangan

DOPdefender: An approach to thwarting data-oriented programming attacks based on a data-aware automaton

JOURNAL ARTICLE published March 2019 in Computers & Security

Research funded by National Natural Science Foundation of China (61802432)

Authors: Ye Wang | Qingbao Li | Ping Zhang | Zhifeng Chen | Guimin Zhang

The threats on the web

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Harold Joseph Highland

Editorial Board

JOURNAL ARTICLE published November 2019 in Computers & Security

The Evolution of Intrusion Detection Systems — The Next Step

JOURNAL ARTICLE published April 2001 in Computers & Security

Authors: Richard Barber

NASA Hacker Pleads Guilty

JOURNAL ARTICLE published December 2000 in Computers & Security

Authors: Bill Hancock

Weak SNMP?

JOURNAL ARTICLE published January 1998 in Computers & Security

Authors: Ben McClure

Data security in a relational database environment

JOURNAL ARTICLE published June 1986 in Computers & Security

Authors: R.F. van der Lans

IFIP Technical Committee

JOURNAL ARTICLE published September 2009 in Computers & Security

New thinking about information technology security

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Marshall D. Abrams | Michael V. Joyce

Laptop Theft Now Targeted Towards Data and Not Necessarily Hardware

JOURNAL ARTICLE published December 2000 in Computers & Security

Authors: Bill Hancock

Win 95 security measures mollify users

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Helen Collinson

Editorial: Special issue on trust in cyber, physical and social computing

JOURNAL ARTICLE published November 2014 in Computers & Security

Authors: Zheng Yan | Guojun Wang | Valtteri Niemi | Robert H. Deng

Romancing The Internet And Management’s Quagmire

JOURNAL ARTICLE published November 2000 in Computers & Security

Authors: August Bequai

Annotated bibliography on software maintenance

JOURNAL ARTICLE published October 1988 in Computers & Security

Authors: W.M. Osborne | R. Raigrodski

Security plans lag computer crime rate

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Helen Collinson

An analysis of the statistical disclosure attack and receiver-bound cover

JOURNAL ARTICLE published November 2011 in Computers & Security

Authors: Nayantara Mallesh | Matthew Wright