Journal: Computers & Security

Volume 15, Issue 5

356 -- 366Harold Joseph Highland. Random bits & bytes
369 -- 375Edwin B. Heinlein. Computer security in China
377 -- 386Rolf T. Moulton, Mark E. Moulton. Electronic communications risk management: A checklist for business managers
387 -- 390Harold Joseph Highland. IFIP TC 11 news
431 -- 439Tzong-Chen Wu, Hung-Sung Sung. Authenticating passwords over an insecure channel
441 -- 450Gregory B. White, Udo W. Pooch. Cooperating security managers: Distributed intrusion detection systems