Journal: Computers & Security

Volume 8, Issue 7

553 -- 561Harold Joseph Highland. Random bits & bytes
563 -- 568Harold Joseph Highland. Secret disk II - administrator
581 -- 586Belden Menkus. Computer-related fire problems revisited
587 -- 604David L. Jobusch, Arthur E. Oldehoeft. A survey of password mechanisms: Weaknesses and potential improvements. Part 1
607 -- 611Khosrow Dehnad. A simple way of improving the login security
613 -- 620Charles P. Pfleeger, Shari Lawrence Pfleeger, Mary Frances Theofanos. A methodology for penetration testing
621 -- 630Dieter Bong, Christoph Ruland. Optimized software implementations of the modular exponentiation on general purpose microprocessors