researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Issue
Volume
6
, Issue
3
193
--
194
Harold Joseph Highland
.
From the editor
195
--
196
Harold Joseph Highland
.
Data encryption standard II?
196
--
198
Harold Joseph Highland
.
Report from Beijing
198
--
199
Harold Joseph Highland
.
Information sources
199
--
202
Harold Joseph Highland
.
Encryption package
202
--
203
Harold Joseph Highland
.
US data controls
203
--
205
Harold Joseph Highland
.
Computer security and law
205
--
0
Harold Joseph Highland
.
Cipher cracking
206
--
218
Karl Rihaczek
.
TeleTrusT-OSIS and communication security
219
--
228
Fred Cohen
.
Design and administration of distributed and hierarchical information networks under partial orderings
229
--
244
Harold Joseph Highland
.
How to evaluate microcomputer encryption software and hardware
252
--
260
P. Dwyer
,
George D. Jelatis
,
Bhavani M. Thuraisingham
.
Multilevel Security in Database Management Systems
252
--
260
Richard J. Johnstone
.
Key updating flags in EFT-POS security systems
261
--
268
Philippe Van Heurck
.
TRASEC: Belgian security system for electronic funds transfers