Journal: Computers & Security

Volume 6, Issue 4

285 -- 287Harold Joseph Highland. From the editor..
288 -- 295Harold Joseph Highland. Would you report a suspected data crime to the authorities?
300 -- 313John M. Carroll. Strategies for extending the useful lifetime of DES
314 -- 320Charles Cresson Wood. Information systems security: Management success factors
321 -- 331Maria M. Pozzo, Terence E. Gray. An approach to containing computer viruses
332 -- 338Fred Cohen. Design and protection of an information network under a partial ordering: A case study
339 -- 341Chris J. Mitchell, Fred Piper. The cost of reducing key-storage requirements in secure networks
342 -- 350Achim Jung. Implementing the RSA cryptosystem
351 -- 0Viiveke Fåk. Report from the working conference on "the Crypto User's Handbook" held in Stockholm, October 22-23, 1986 by IFIP WG 11: 4