researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Manag. Comput. Security
Home
Index
Info
Issue
Volume
10
, Issue
3
100
--
108
I. Irakleous
,
Steven Furnell
,
Paul Dowland
,
Maria Papadaki
.
An experimental comparison of secret-based user authentication technologies
109
--
118
Alan D. Smith
,
Felix Offodile
.
Information management of automatic data capture: an overview of technical developments
119
--
125
Clive Vermeulen
,
Rossouw von Solms
.
The information security management toolbox - taking the pain out of security management
126
--
134
Stuart Maguire
.
Identifying risks during information system development: managing the process
135
--
139
Mayur S. Desai
,
Thomas C. Richards
,
Thomas von der Embse
.
System insecurity - firewalls