Journal: Computers & Security

Volume 6, Issue 3

193 -- 194Harold Joseph Highland. From the editor
195 -- 196Harold Joseph Highland. Data encryption standard II?
196 -- 198Harold Joseph Highland. Report from Beijing
198 -- 199Harold Joseph Highland. Information sources
199 -- 202Harold Joseph Highland. Encryption package
202 -- 203Harold Joseph Highland. US data controls
203 -- 205Harold Joseph Highland. Computer security and law
205 -- 0Harold Joseph Highland. Cipher cracking
206 -- 218Karl Rihaczek. TeleTrusT-OSIS and communication security
219 -- 228Fred Cohen. Design and administration of distributed and hierarchical information networks under partial orderings
229 -- 244Harold Joseph Highland. How to evaluate microcomputer encryption software and hardware
252 -- 260P. Dwyer, George D. Jelatis, Bhavani M. Thuraisingham. Multilevel Security in Database Management Systems
252 -- 260Richard J. Johnstone. Key updating flags in EFT-POS security systems
261 -- 268Philippe Van Heurck. TRASEC: Belgian security system for electronic funds transfers