Journal: Computers & Security

Volume 13, Issue 1

4 -- 14Harold Joseph Highland. Random bits & bytes
30 -- 33Alenka Hudoklin, Branislav Smitek. Computer systems security in Slovenia
53 -- 57Jau-Liang Chen, Tzonelih Hwang. Identity-based conference key broadcast schemes with user authentication
59 -- 67Selwyn Russell. Audit-by-receiver paradigms for verification of authorization at source of electronic documents
69 -- 78Edward P. Dawson, Diane Donovan. The breadth of Shamir s secret-sharing scheme
79 -- 84Bao-Min Shao, Jing-Jang Hwang, PeCheng Wang. Distributed assignment of cryptographic keys for access control in a hierarchy