Journal: Computers & Security

Volume 15, Issue 4

270 -- 280Harold Joseph Highland. Random bits & bytes
281 -- 288Rossouw von Solms. Information security management: The second generation
297 -- 316Thomas Finne. The information security chain in a company
327 -- 338Joan Borrell, Josep RifĂ . An implementable secure voting scheme
339 -- 348Wen-Shenq Juang, Chin-Laung Lei. A collision-free secret ballot protocol for computerized general elections