researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Issue
Volume
6
, Issue
2
97
--
98
Harold Joseph Highland
.
In this issue..
99
--
100
Harold Joseph Highland
.
How secure are your encryption keys?
100
--
101
Harold Joseph Highland
.
The DES revisited - Part II
102
--
103
Harold Joseph Highland
.
Computer security: A new focus at the National Bureau of Standards
103
--
108
Harold Joseph Highland
.
Technology watch
108
--
109
Harold Joseph Highland
.
The charade of computer security
109
--
110
Harold Joseph Highland
.
Random notes and reports
111
--
117
Juhani Saari
.
Computer crime - numbers lie
118
--
128
Fred Cohe
.
Protection and administration of information networks with partial orderings
129
--
132
James A. Schweitzer
.
How security fits in - a management view: Security is an essential for quality information
133
--
138
I. S. Herschberg
.
The hackers' comfort
139
--
151
Tung Bui
,
Taracad R. Sivasankaran
.
Cost-effectiveness modeling for a decision support system in computer security
152
--
157
Niv Ahituv
,
Yeheskel Lapid
,
Seev Neumann
.
Verifying the authentication of an information system user
158
--
166
Andreas Pfitzmann
,
Michael Waidner
.
Networks without user observability
167
--
171
Ronald Paans
.
IFIP/Sec'86: Information security: The challenge
172
--
0
Ronald Paans
.
ECOMA-14
173
--
176
Ronald Paans
.
First European Conference on Computer Audit, Control & Security
177
--
179
J. A. N. Lee
,
Gerald Segal
.
Positive alternatives to computer misuse: A report of the proceedings of an ACM panel on hacking