default search action
Computers & Security, Volume 15
Volume 15, Number 1, 1996
- From the editor. 2-3
- Harold Joseph Highland:
Random bits & bytes. 4-11 - Jon David:
The new face of the virus threat. 13-16 - Mark Buckwell:
The spook solution - Now open for business. 17-26 - Paul Smith:
Achieving interoperable security services in open systems products. 27-37 - Thierry Moreau:
A probabilistic flaw in PGP design? 39-43 - Jan H. P. Eloff, Ralph Holbein, Stephanie Teufel:
Security classification for documents. 55-71 - Min-Shiang Hwang, Wen-Guey Tzeng, Wei-Pang Yang:
An access control scheme based on Chinese remainder theorem and time stamp concept. 73-81
Volume 15, Number 2, 1996
- From the editor. 88-89
- Harold Joseph Highland:
Random bits & bytes. 90-99 - Edwin B. Heinlein:
Medical records security. 100-102 - Frederick B. Cohen:
A note on distributed coordinated attacks. 103-121 - Kiyoto Tanaka, Hiroyuki Matsumoto, Ikuro Oyaizu:
A confidentiality system for ISDN inter-PC high-speed file transfer. 141-155 - Marcel E. M. Spruit, Maarten Looijen:
IT security in Dutch practice. 157-170 - Udi Manber:
A simple scheme to make passwords based on one-way functions much harder to crack. 171-176
Volume 15, Number 3, 1996
- From the editor. 182-183
- Harold Joseph Highland:
Random Bits & Bytes. 184-197 - Nigel Miller:
Establishing web sites - legal issues and risks. 198-202 - Clive Blatchford:
Internet as a Pornotopia? 203-208 - Paul Evans:
Information protection for publishers. 209-211 - Eike Born:
Enforcing legal ownership rights by an access control system. 212-220 - Shiuh-Jeng Wang, Jin-Fu Chang:
Smart card based secure password authentication scheme. 231-237 - Willem G. de Ru, Jan H. P. Eloff:
Risk analysis modelling with the use of fuzzy logic. 239-248 - Jing-Jang Hwang:
A conventional approach to secret balloting in computer networks. 249-262
Volume 15, Number 4, 1996
- From the editor. 268-269
- Harold Joseph Highland:
Random bits & bytes. 270-280 - Rossouw von Solms:
Information security management: The second generation. 281-288 - Jacques R. Lemieux:
Using RAD tools to develop secure client/server applications. 289-295 - Thomas Finne:
The information security chain in a company. 297-316 - Joan Borrell, Josep Rifà:
An implementable secure voting scheme. 327-338 - Wen-Shenq Juang, Chin-Laung Lei:
A collision-free secret ballot protocol for computerized general elections. 339-348
Volume 15, Number 5, 1996
- From the editor. 354-355
- Harold Joseph Highland:
Random bits & bytes. 356-366 - Edwin B. Heinlein:
Computer security in China. 369-375 - Rolf T. Moulton, Mark E. Moulton:
Electronic communications risk management: A checklist for business managers. 377-386 - Harold Joseph Highland:
IFIP TC 11 news. Comput. Secur. 15(5): 387-390 (1996) - Tzong-Chen Wu, Hung-Sung Sung:
Authenticating passwords over an insecure channel. 431-439 - Gregory B. White, Udo W. Pooch:
Cooperating security managers: Distributed intrusion detection systems. 441-450
Volume 15, Number 6, 1996
- From the editor. 456-457
- Harold Joseph Highland:
Random bits & bytes. 458-469 - Robert L. Frank:
Security issues in the virtual corporation. 471-476 - Ken Lindup:
The role of information security in corporate governance. 477-485 - Gerald L. Kovacich:
Establishing a network security programme. 486-498 - Edwin B. Heinlein:
Year 2000 - A real is security issue. 499-500 - John Sherwood:
SALSA: A method for developing the enterprise security architecture and strategy. 501-506 - Jim Press:
Object oriented cryptographic facility design: Export considerations. 507-514 - Vijay Varadharajan, Claudio Calvelli:
Extending the schematic protection model - II. Revocation. 525-536 - Sung-Ming Yen:
Cryptanalysis and repair of the multi-verifier signature with verifier specification. 537-544
Volume 15, Number 7, 1996
- From the editor. 550-551
- Harold Joseph Highland:
Random bits & bytes. 552-560 - Tim Porter:
Information warfare - Your company needs you! 561-566 - Alan R. Krull:
GSSP (Generally-Accepted System Security Principles): A trip to Abilene? 567-575 - Andrew J. Clark:
Cryptographic controls - the eternal triangle, . 576-584 - Vesselin Bontchev:
Possible macro virus attacks and how to prevent them. 595-626 - Cees J. A. Jansen, Piet van der Vlist:
Message encipherment with minimal expansion and redundancy - doing better than ISO-10126. 627-632 - John D. Yesberg, Mark S. Anderson:
Quantitative authentication and vouching. 633-645
Volume 15, Number 8, 1996
- From the editor. 652-653
- Harold Joseph Highland:
Passwords, the web, and the internet. 654 - Harold Joseph Highland:
Pornography and privacy. 654-655 - Harold Joseph Highland:
It's a web browser! No, it's a weapon! 655-656 - Harold Joseph Highland:
Internet/web directory. 656-657 - Harold Joseph Highland:
The enemy within. 657 - Harold Joseph Highland:
Ntis volumes of interest. 658-660 - Jim Reid:
Plugging the holes in host-based authentication. 661-671 - Dean Adams:
Open for business - Securely! 673-682 - Lam-for Kwok, Dennis Longley:
A security officer's workbench. 695-705 - Frederick B. Cohen:
A secure world-wide-web daemon. 707-724 - Markus Michels, David Naccache, Holger Petersen:
GOST 34.10 - A brief overview of Russia's DSA. 725-732
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.