Journal: Computers & Security

Volume 11, Issue 5

390 -- 406Harold Joseph Highland. Random bits & bytes
412 -- 416Geoff Norman. PC security issues
417 -- 420Belden Menkus. The lessons of the Great Chicago flood of 1992
421 -- 426David L. Lathrop. Security aspects of wireless local area networks
427 -- 437Fritz Bauspieß, Frank Damm. Requirements for cryptographic hash functions
445 -- 461Helen A. Bergen, James M. Hogan. Data security in a fixed-model arithmetic coding compression algorithm
463 -- 479William J. Caelli, Anthony W. Rhodes, N. C. Russell. An evaluation of HP-UX (UNIX) for database protection using the European ITSEC