researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Issue
Volume
13
, Issue
7
540
--
546
Harold Joseph Highland
.
Random bits & bytes
558
--
563
Peter Sommer
.
Industrial espionage: Analysing the risk
573
--
580
Thomas Hardjono
,
Yuliang Zheng
,
Jennifer Seberry
.
Database authentication revisited
581
--
585
Chi-Sung Laih
,
Wen-Hong Chiou
,
Chin-Chen Chang
.
Authentication and protection of public keys
587
--
599
Jeffrey Picciotto
,
Richard D. Graubart
.
Extended labeling policies for enhanced application support
601
--
610
Horng-Twu Liaw
.
A dynamic cryptographic key generation and information broadcasting scheme in information systems
611
--
613
Mark Looi
,
William J. Caelli
.
A note on supplying a trusted clock via a secure device