researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Issue
Volume
13
, Issue
5
372
--
378
Harold Joseph Highland
.
Random bits & bytes
379
--
384
Leon Strous
.
Security evaluation criteria
385
--
391
Michael J. Ganley
.
Digital signatures and their uses
392
--
400
Bernard P. Zajac Jr.
.
Cost effectiveness of anti-viral scanners
411
--
435
Karin P. Badenhorst
,
Jan H. P. Eloff
.
TOPM: a formal approach to the optimization of information technology risk management
437
--
450
Eike Born
,
Helmut G. Stiegler
.
Discretionary access control by means of usage conditions