Journal: Computers & Security

Volume 15, Issue 3

184 -- 197Harold Joseph Highland. Random Bits & Bytes
198 -- 202Nigel Miller. Establishing web sites - legal issues and risks
203 -- 208Clive Blatchford. Internet as a Pornotopia?
209 -- 211Paul Evans. Information protection for publishers
212 -- 220Eike Born. Enforcing legal ownership rights by an access control system
231 -- 237Shiuh-Jeng Wang, Jin-Fu Chang. Smart card based secure password authentication scheme
239 -- 248Willem G. de Ru, Jan H. P. Eloff. Risk analysis modelling with the use of fuzzy logic
249 -- 262Jing-Jang Hwang. A conventional approach to secret balloting in computer networks