researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Issue
Volume
6
, Issue
4
285
--
287
Harold Joseph Highland
.
From the editor..
288
--
295
Harold Joseph Highland
.
Would you report a suspected data crime to the authorities?
300
--
313
John M. Carroll
.
Strategies for extending the useful lifetime of DES
314
--
320
Charles Cresson Wood
.
Information systems security: Management success factors
321
--
331
Maria M. Pozzo
,
Terence E. Gray
.
An approach to containing computer viruses
332
--
338
Fred Cohen
.
Design and protection of an information network under a partial ordering: A case study
339
--
341
Chris J. Mitchell
,
Fred Piper
.
The cost of reducing key-storage requirements in secure networks
342
--
350
Achim Jung
.
Implementing the RSA cryptosystem
351
--
0
Viiveke Fåk
.
Report from the working conference on "the Crypto User's Handbook" held in Stockholm, October 22-23, 1986 by IFIP WG 11: 4