Journal: Computers & Security

Volume 6, Issue 2

97 -- 98Harold Joseph Highland. In this issue..
99 -- 100Harold Joseph Highland. How secure are your encryption keys?
100 -- 101Harold Joseph Highland. The DES revisited - Part II
102 -- 103Harold Joseph Highland. Computer security: A new focus at the National Bureau of Standards
103 -- 108Harold Joseph Highland. Technology watch
108 -- 109Harold Joseph Highland. The charade of computer security
109 -- 110Harold Joseph Highland. Random notes and reports
111 -- 117Juhani Saari. Computer crime - numbers lie
118 -- 128Fred Cohe. Protection and administration of information networks with partial orderings
129 -- 132James A. Schweitzer. How security fits in - a management view: Security is an essential for quality information
133 -- 138I. S. Herschberg. The hackers' comfort
139 -- 151Tung Bui, Taracad R. Sivasankaran. Cost-effectiveness modeling for a decision support system in computer security
152 -- 157Niv Ahituv, Yeheskel Lapid, Seev Neumann. Verifying the authentication of an information system user
158 -- 166Andreas Pfitzmann, Michael Waidner. Networks without user observability
167 -- 171Ronald Paans. IFIP/Sec'86: Information security: The challenge
172 -- 0Ronald Paans. ECOMA-14
173 -- 176Ronald Paans. First European Conference on Computer Audit, Control & Security
177 -- 179J. A. N. Lee, Gerald Segal. Positive alternatives to computer misuse: A report of the proceedings of an ACM panel on hacking