researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Volume
Volume
15
, Issue
8
652
--
653
.
From the editor
654
--
0
Harold Joseph Highland
.
Passwords, the web, and the internet
654
--
655
Harold Joseph Highland
.
Pornography and privacy
655
--
656
Harold Joseph Highland
.
It s a web browser! No, it s a weapon!
656
--
657
Harold Joseph Highland
.
Internet/web directory
657
--
0
Harold Joseph Highland
.
The enemy within
658
--
660
Harold Joseph Highland
.
Ntis volumes of interest
661
--
671
Jim Reid
.
Plugging the holes in host-based authentication
695
--
705
Lam-for Kwok
,
Dennis Longley
.
A security officer s workbench
707
--
724
Frederick B. Cohen
.
A secure world-wide-web daemon
725
--
732
Markus Michels
,
David Naccache
,
Holger Petersen
.
GOST 34.10 - A brief overview of Russia s DSA
Volume
15
, Issue
7
550
--
551
.
From the editor
552
--
560
Harold Joseph Highland
.
Random bits & bytes
561
--
566
Tim Porter
.
Information warfare - Your company needs you!
576
--
584
Andrew J. Clark
.
Cryptographic controls - the eternal triangle:::, :::
595
--
626
Vesselin Bontchev
.
Possible macro virus attacks and how to prevent them
627
--
632
Cees J. A. Jansen
,
Piet van der Vlist
.
Message encipherment with minimal expansion and redundancy - doing better than ISO-10126
633
--
645
John Yesberg
,
Mark S. Anderson
.
Quantitative authentication and vouching
Volume
15
, Issue
6
458
--
469
Harold Joseph Highland
.
Random bits & bytes
471
--
476
Robert L. Frank
.
Security issues in the virtual corporation
477
--
485
Ken Lindup
.
The role of information security in corporate governance
486
--
498
Gerald L. Kovacich
.
Establishing a network security programme
499
--
500
Edwin B. Heinlein
.
Year 2000 - A real is security issue
501
--
506
John Sherwood
.
SALSA: A method for developing the enterprise security architecture and strategy
507
--
514
Jim Press
.
Object oriented cryptographic facility design: Export considerations
525
--
536
Vijay Varadharajan
,
Claudio Calvelli
.
Extending the schematic protection model - II. Revocation
537
--
544
Sung-Ming Yen
.
Cryptanalysis and repair of the multi-verifier signature with verifier specification
Volume
15
, Issue
5
356
--
366
Harold Joseph Highland
.
Random bits & bytes
369
--
375
Edwin B. Heinlein
.
Computer security in China
377
--
386
Rolf T. Moulton
,
Mark E. Moulton
.
Electronic communications risk management: A checklist for business managers
387
--
390
Harold Joseph Highland
.
IFIP TC 11 news
431
--
439
Tzong-Chen Wu
,
Hung-Sung Sung
.
Authenticating passwords over an insecure channel
441
--
450
Gregory B. White
,
Udo W. Pooch
.
Cooperating security managers: Distributed intrusion detection systems
Volume
15
, Issue
4
270
--
280
Harold Joseph Highland
.
Random bits & bytes
281
--
288
Rossouw von Solms
.
Information security management: The second generation
297
--
316
Thomas Finne
.
The information security chain in a company
327
--
338
Joan Borrell
,
Josep RifĂ
.
An implementable secure voting scheme
339
--
348
Wen-Shenq Juang
,
Chin-Laung Lei
.
A collision-free secret ballot protocol for computerized general elections
Volume
15
, Issue
3
184
--
197
Harold Joseph Highland
.
Random Bits & Bytes
198
--
202
Nigel Miller
.
Establishing web sites - legal issues and risks
203
--
208
Clive Blatchford
.
Internet as a Pornotopia?
209
--
211
Paul Evans
.
Information protection for publishers
212
--
220
Eike Born
.
Enforcing legal ownership rights by an access control system
231
--
237
Shiuh-Jeng Wang
,
Jin-Fu Chang
.
Smart card based secure password authentication scheme
239
--
248
Willem G. de Ru
,
Jan H. P. Eloff
.
Risk analysis modelling with the use of fuzzy logic
249
--
262
Jing-Jang Hwang
.
A conventional approach to secret balloting in computer networks
Volume
15
, Issue
2
90
--
99
Harold Joseph Highland
.
Random bits & bytes
100
--
102
Edwin B. Heinlein
.
Medical records security
103
--
121
Frederick B. Cohen
.
A note on distributed coordinated attacks
141
--
155
Kiyoto Tanaka
,
Hiroyuki Matsumoto
,
Ikuro Oyaizu
.
A confidentiality system for ISDN inter-PC high-speed file transfer
157
--
170
Marcel E. M. Spruit
,
Maarten Looijen
.
IT security in Dutch practice
171
--
176
Udi Manber
.
A simple scheme to make passwords based on one-way functions much harder to crack
Volume
15
, Issue
1
2
--
3
.
From the editor
4
--
11
Harold Joseph Highland
.
Random bits & bytes
13
--
16
Jon David
.
The new face of the virus threat
17
--
26
Mark Buckwell
.
The spook solution - Now open for business
27
--
37
Paul Smith
.
Achieving interoperable security services in open systems products
39
--
43
Thierry Moreau
.
A probabilistic flaw in PGP design?
55
--
71
Jan H. P. Eloff
,
Ralph Holbein
,
Stephanie Teufel
.
Security classification for documents
73
--
81
Min-Shiang Hwang
,
Wen-Guey Tzeng
,
Wei-Pang Yang
.
An access control scheme based on Chinese remainder theorem and time stamp concept