Journal: Computers & Security

Volume 22, Issue 8

652 -- 653E. Eugene Schultz. Information security and the media
654 -- 663E. Eugene Schultz. Security views
664 -- 669Stephen Hinde. Computer security: Mapping the future
670 -- 672Hank Wolfe. Setting up an electronic evidence forensics laboratory
673 -- 674Jay G. Heiser. Beyond cryptography: Bruce Schneier s Beyond Fear: thinking sensibly about security in an uncertain world
675 -- 684J. Johnston, Jan H. P. Eloff, Les Labuschagne. Security and human computer interfaces
685 -- 692John Leach. Improving user security behaviour
695 -- 706Aykut Guven, Ibrahim Sogukpinar. Understanding users keystroke patterns for computer access security
707 -- 724John Reinke, Hossein Saiedian. The availability of source code in relation to timely response to security vulnerabilities
725 -- 727Kefei Chen, Sheng Zhong. Attacks on the (enhanced) Yang-Shieh authentication
728 -- 734Chin-Chen Chang, Ya-Fen Chang. Efficient anonymous auction protocols with freewheeling bids