researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Issue
Volume
3
, Issue
1
3
--
7
Rolf Moulton
.
Data security is a management responsibility
9
--
19
Harvey S. Koch
.
Auditing on-line systems: An evaluation of parallel versus Continuous and Intermittent Simulation
21
--
28
James A. Schweitzer
.
Personal workstation automation security vulnerabilities
29
--
34
Ruth A. Seif
.
Contingency planning in the banking community
35
--
41
Arthur E. Oldehoeft
,
Robert McDonald
.
A software scheme for user-controlled file encryption
43
--
44
Sig Porter
.
Cryptology and number sequences: Pseudorandom, random, and perfectly random
45
--
47
Albert A. Mullin
.
A note on the mathematics of public-key cryptosystems
53
--
55
Michael Comer
.
Computer crime needs international countermeasures