Journal: Computers & Security

Volume 9, Issue 3

196 -- 208Harold Joseph Highland. Random bits & bytes
209 -- 213Belden Menkus. Understanding data communication security vulnerabilities
223 -- 228I. S. Herschberg, Ronald Paans. Sloppy, sloppier, sloppiest
229 -- 232Charlotte Klopp. More options for physical access control
235 -- 244Claude Laferriere. A discussion of implementation strategies for secure database management systems
245 -- 255Sead Muftic. Transaction protection by antennas
257 -- 262Bart Preneel, Antoon Bosselaers, René Govaerts, Joos Vandewalle. Cryptanalysis of a fast cryptographic checksum algorithm