Journal: Computers & Security

Volume 11, Issue 2

110 -- 120Harold Joseph Highland. Random bits & bytes
121 -- 127Belden Menkus. Introduction to computer security
128 -- 133Robin L. Sherman. Biometrics futures
149 -- 161Dimitris Gritzalis, Sokratis K. Katsikas, J. Keklikoglou, A. Tomaras. Determining access rights for medical information systems
163 -- 172P. Venkat Rangan. An axiomatic theory of trust in secure communication protocols