Journal: Computers & Security

Volume 12, Issue 6

518 -- 526Harold Joseph Highland. Random bits & bytes
527 -- 535Charles Cresson Wood. Duress terminations and information security
536 -- 541Michael F. Kensey. Computer viruses - Towards better solutions
542 -- 549Selwyn Russell. Paradigms for verification of authorization at source of electronic documents in an integrated environment
550 -- 555Harold Joseph Highland. IFIP/Sec 93 conference report
565 -- 584Frederick B. Cohen. Operating system protection through program evolution
585 -- 595Eugene H. Spafford, Stephen A. Weeber. Software forensics: Can we track code to its authors?
597 -- 603Jan H. P. Eloff, Les Labuschagne, Karin P. Badenhorst. A comparative framework for risk analysis methods