researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Volume
Volume
14
, Issue
8
660
--
666
Harold Joseph Highland
.
Random bits & bytes
667
--
674
Charles Cresson Wood
.
Writing infosec policies
675
--
680
Rebecca J. Duncan
.
There are some cracks in the cornerstone of information security
681
--
690
Christopher L. J. Holloway
.
Controlling digital signature services using a smartcard
691
--
695
Kenneth R. Lindup
.
A new model for information security policies
707
--
717
Love Ekenberg
,
Subhash Oberoi
,
István Orci
.
A cost model for managing information security hazards
719
--
738
Marshall D. Abrams
,
Marvin V. Zelkowitz
.
Striving for correctness
Volume
14
, Issue
7
574
--
585
Harold Joseph Highland
.
Random bits & bytes
587
--
598
Christopher L. J. Holloway
.
Controlling the use of cryptographic keys
599
--
604
Sarah Gordon
.
Internet 101
621
--
631
Ben Soh
,
Tharam S. Dillon
.
Setting optimal intrusion-detection thresholds
633
--
643
Fred de Koning
.
A methodology for the design of security plans
645
--
651
James Backhouse
,
Gurpreet Dhillon
.
Managing computer crime: a research outlook
Volume
14
, Issue
6
480
--
488
Harold Joseph Highland
.
Random bits & bytes
496
--
517
Jim Reid
.
Open systems security: Traps and pitfalls
527
--
539
Frank Stoll
.
The need for decentralization and privacy in mobile communications networks
541
--
566
Raymond W. Lo
,
Karl N. Levitt
,
Ronald A. Olsson
.
MCF: a malicious code filter
Volume
14
, Issue
5
365
--
371
Harold Joseph Highland
.
Random bits & bytes
377
--
383
Jean Hitchings
.
Deficiencies of the traditional approach to information security and the requirements for a new methodology
385
--
389
John Leach
.
Dynamic authentication for smartcards
391
--
402
Sarah Gordon
.
Technologically enabled crime: Shifting paradigms for the Year 2000
435
--
448
Anastasia Doumas
,
Konstantinos Mavroudakis
,
Dimitris Gritzalis
,
Sokratis K. Katsikas
.
Design of a neural network for recognition and classification of computer viruses
449
--
463
Muninder P. Kailay
,
Peter Jarratt
.
RAMeX: a prototype expert system for computer security risk analysis and management
465
--
472
Thomas Hardjono
,
Jennifer Seberry
.
Applications of smartcards for anonymous and verifiable databases
Volume
14
, Issue
4
274
--
282
Harold Joseph Highland
.
Random bits & bytes
283
--
284
Charles Cresson Wood
.
Shifting information systems security responsibility from user organizations to vendor/publisher organizations
287
--
288
Charles Cresson Wood
,
Karen Snow
.
ISO 9000 and information security
289
--
296
Gerald L. Kovacich
.
Recovering computer-generated evidence
307
--
321
Simon R. Wiseman
.
Classification services in the SWORD secure DBMS
323
--
348
Greg O Shea
.
Redundant access rights
349
--
357
Simon J. Shepherd
.
A high speed software implementation of the Data Encryption Standard
Volume
14
, Issue
3
188
--
196
Harold Joseph Highland
.
Random bits & bytes
197
--
198
Edwin B. Heinlein
.
Principles of information systems security
199
--
204
Scott Hill
,
Martin Smith
.
Risk management & corporate security: A viable leadership and business solution designed to enhance corporations in the emerging marketplace
205
--
214
Hyun-jung Kim
.
Biometrics, is it a viable proposition for identity authentication and access control?
225
--
231
Frank Deane
,
Kate Barrelle
,
Ron Henderson
,
Doug Mahar
.
Perceived acceptability of biometric security systems
233
--
249
Matt Bishop
,
Daniel V. Klein
.
Improving system security via proactive password checking
251
--
265
H. A. S. Booysen
,
Jan H. P. Eloff
.
Classification of objects for improved access control
Volume
14
, Issue
2
90
--
102
Harold Joseph Highland
.
Random Bits & Bytes
103
--
112
Manfred Möhrenschlager
.
Hacking: To criminalize or not ? - suggestions for the legislature
113
--
115
Henry B. Wolfe
.
Computer security: For fun and profit
135
--
145
Tzong-Chen Wu
,
Wei-Hua He
.
A geometric approach for sharing secrets
147
--
157
Marshall D. Abrams
,
Jonathan D. Moffett
.
A higher level of computer security through active policies
159
--
166
Hui-Min Tsai
,
Chin-Chen Chang
.
A cryptographic implementation for dynamic access control in a user hierarchy
167
--
180
John G. Cleary
,
Sean A. Irvine
,
Ingrid Rinsma-Melchert
.
On the insecurity of arithmetic coding
Volume
14
, Issue
1
4
--
13
Harold Joseph Highland
.
Random bits & bytes
14
--
23
Martin Smith
,
John Sherwood
.
Business continuity planning
45
--
56
Marshall D. Abrams
,
Michael V. Joyce
.
Trusted system concepts
57
--
68
Marshall D. Abrams
,
Michael V. Joyce
.
Trusted computing update
69
--
81
Marshall D. Abrams
,
Michael V. Joyce
.
New thinking about information technology security