Journal: Computers & Security

Volume 14, Issue 5

365 -- 371Harold Joseph Highland. Random bits & bytes
377 -- 383Jean Hitchings. Deficiencies of the traditional approach to information security and the requirements for a new methodology
385 -- 389John Leach. Dynamic authentication for smartcards
391 -- 402Sarah Gordon. Technologically enabled crime: Shifting paradigms for the Year 2000
435 -- 448Anastasia Doumas, Konstantinos Mavroudakis, Dimitris Gritzalis, Sokratis K. Katsikas. Design of a neural network for recognition and classification of computer viruses
449 -- 463Muninder P. Kailay, Peter Jarratt. RAMeX: a prototype expert system for computer security risk analysis and management
465 -- 472Thomas Hardjono, Jennifer Seberry. Applications of smartcards for anonymous and verifiable databases