Journal: IEEE Computer

Volume 16, Issue 2

6 -- 0H. S. McDonald. Special Message
8 -- 10Subhash C. Kak. Data Security in Computer Networks: Guest Editor's Introduction
15 -- 24Selim G. Aki. Digital Signatures: A Tutorial Survey
27 -- 35Dorothy E. Denning. Protecting Public Keys and Signature Keys
39 -- 51Richard A. DeMillo, Michael Merritt. Protocols for Data Security
55 -- 62Donald W. Davies. Applying the RSA Digital Signature to Electronic Mail
63 -- 85Dana S. Nau. Expert Computer Systems
86 -- 87James C. Brakefield. The Open Channel