Journal: Computers & Security

Volume 13, Issue 7

540 -- 546Harold Joseph Highland. Random bits & bytes
558 -- 563Peter Sommer. Industrial espionage: Analysing the risk
573 -- 580Thomas Hardjono, Yuliang Zheng, Jennifer Seberry. Database authentication revisited
581 -- 585Chi-Sung Laih, Wen-Hong Chiou, Chin-Chen Chang. Authentication and protection of public keys
587 -- 599Jeffrey Picciotto, Richard D. Graubart. Extended labeling policies for enhanced application support
601 -- 610Horng-Twu Liaw. A dynamic cryptographic key generation and information broadcasting scheme in information systems
611 -- 613Mark Looi, William J. Caelli. A note on supplying a trusted clock via a secure device