Journal: Computers & Security

Volume 12, Issue 2

106 -- 116Harold Joseph Highland. Random bits & bytes
117 -- 122Stanley H. Stahl. Information security in workstation environments
123 -- 127Robert A. Clyde. DECnet security (Not necessarily an oxymoron)
128 -- 133David Moseley. Public key management for X.25 network security
157 -- 167Helen A. Bergen, James M. Hogan. A chosen plaintext attack on an adaptive arithmetic coding compression algorithm
169 -- 189John A. Fitch III, Lance J. Hoffman. A shortest path network security model
191 -- 197Mary C. Jones, Kirk P. Arnett, Jeung-tai Eddie Tang, Nian-Shin Chen. Perceptions of computer viruses: a cross-cultural assessment