Journal: Computers & Security

Volume 17, Issue 3

190 -- 191Bill Hancock. From the editor
192 -- 200Bill Hancock. Security Views
201 -- 206Nicky Maddison. Y2000 enters the body politic
207 -- 210Stephen Hinde. Recent security surveys
211 -- 221Fred Cohen, Cynthia A. Phillips, Laura Painton Swiler, Timothy Gaylor, Patricia Leary, Fran Rupley, Richard Isler. A cause and effect model of attacks on information systems : Some Analysis Based on That Model, and The Application of that Model for CyberWarfare in CID
233 -- 252Gert van der Merwe, Jan H. P. Eloff. Software source code, visual risk analysis: an example
253 -- 264Tom Coffey, T. Newe. Realisation of a minimum-knowledge identification and signature scheme
265 -- 272Mike Matyas, Mohammad Peyravian, Allen Roginsky, Nevenko Zunic. Reversible data mixing procedure for efficient public-key encryption