researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Issue
Volume
7
, Issue
1
3
--
5
Harold Joseph Highland
.
Case history of a virus attack
5
--
6
Harold Joseph Highland
.
Encryption, attacks and ethics
6
--
7
Harold Joseph Highland
.
How to protect a microcomputer system
7
--
9
Harold Joseph Highland
.
Chernobyl computer communications
9
--
10
Harold Joseph Highland
.
Electromagnetic interference
10
--
0
Harold Joseph Highland
.
IFIP/Sec '88
10
--
11
Harold Joseph Highland
.
For your information
13
--
18
Harold Joseph Highland
.
Product reviews
19
--
23
Robert H. Courtney Jr.
.
Another perspective on sensitive but unclassified data
25
--
26
Harold Joseph Highland
.
How secure are fiber optics communications?
27
--
34
Harold Joseph Highland
.
Secretdisk II - transparent automatic encryption
35
--
36
Bernard P. Zajac Jr.
.
Dial-up communication lines: Can they be secured?
37
--
43
Harold Joseph Highland
.
Program aids for office automation security
47
--
52
Belden Menkus
.
Getting started in data processing disaster recovery
53
--
57
Ellen Amsel
.
Network security and access controls
59
--
63
Niv Ahituv
,
Yeheskel Lapid
,
Seev Neumann
.
Protecting statistical databases against retrieval of private information
65
--
71
Per Christoffersson
.
Message authentication and encryption combined
73
--
82
Teresa F. Lunt
,
Dorothy E. Denning
,
Roger R. Schell
,
Mark Heckman
,
William R. Shockley
.
Element-level classification with A1 assurance
83
--
87
Arto Salomaa
.
A public-key cryptosystem based on language theory
101
--
110
.
Abstracts of recent articles and literature