


default search action
Computers & Security, Volume 15
Volume 15, Number 1, 1996
- From the editor. 2-3

- Harold Joseph Highland:

Random bits & bytes. 4-11 - Jon David:

The new face of the virus threat. 13-16 - Mark Buckwell:

The spook solution - Now open for business. 17-26 - Paul Smith:

Achieving interoperable security services in open systems products. 27-37 - Thierry Moreau:

A probabilistic flaw in PGP design? 39-43 - Jan H. P. Eloff, Ralph Holbein, Stephanie Teufel

:
Security classification for documents. 55-71 - Min-Shiang Hwang, Wen-Guey Tzeng, Wei-Pang Yang:

An access control scheme based on Chinese remainder theorem and time stamp concept. 73-81
Volume 15, Number 2, 1996
- From the editor. 88-89

- Harold Joseph Highland:

Random bits & bytes. 90-99 - Edwin B. Heinlein:

Medical records security. 100-102 - Frederick B. Cohen:

A note on distributed coordinated attacks. 103-121 - Kiyoto Tanaka, Hiroyuki Matsumoto, Ikuro Oyaizu:

A confidentiality system for ISDN inter-PC high-speed file transfer. 141-155 - Marcel E. M. Spruit, Maarten Looijen:

IT security in Dutch practice. 157-170 - Udi Manber:

A simple scheme to make passwords based on one-way functions much harder to crack. 171-176
Volume 15, Number 3, 1996
- From the editor. 182-183

- Harold Joseph Highland:

Random Bits & Bytes. 184-197 - Nigel Miller:

Establishing web sites - legal issues and risks. 198-202 - Clive Blatchford:

Internet as a Pornotopia? 203-208 - Paul Evans:

Information protection for publishers. 209-211 - Eike Born:

Enforcing legal ownership rights by an access control system. 212-220 - Shiuh-Jeng Wang, Jin-Fu Chang:

Smart card based secure password authentication scheme. 231-237 - Willem G. de Ru, Jan H. P. Eloff:

Risk analysis modelling with the use of fuzzy logic. 239-248 - Jing-Jang Hwang:

A conventional approach to secret balloting in computer networks. 249-262
Volume 15, Number 4, 1996
- From the editor. 268-269

- Harold Joseph Highland:

Random bits & bytes. 270-280 - Rossouw von Solms:

Information security management: The second generation. 281-288 - Jacques R. Lemieux:

Using RAD tools to develop secure client/server applications. 289-295 - Thomas Finne:

The information security chain in a company. 297-316 - Joan Borrell

, Josep Rifà
:
An implementable secure voting scheme. 327-338 - Wen-Shenq Juang, Chin-Laung Lei:

A collision-free secret ballot protocol for computerized general elections. 339-348
Volume 15, Number 5, 1996
- From the editor. 354-355

- Harold Joseph Highland:

Random bits & bytes. 356-366 - Edwin B. Heinlein:

Computer security in China. 369-375 - Rolf T. Moulton, Mark E. Moulton:

Electronic communications risk management: A checklist for business managers. 377-386 - Harold Joseph Highland:

IFIP TC 11 news. Comput. Secur. 15(5): 387-390 (1996) - Tzong-Chen Wu, Hung-Sung Sung:

Authenticating passwords over an insecure channel. 431-439 - Gregory B. White, Udo W. Pooch:

Cooperating security managers: Distributed intrusion detection systems. 441-450
Volume 15, Number 6, 1996
- From the editor. 456-457

- Harold Joseph Highland:

Random bits & bytes. 458-469 - Robert L. Frank:

Security issues in the virtual corporation. 471-476 - Ken Lindup:

The role of information security in corporate governance. 477-485 - Gerald L. Kovacich:

Establishing a network security programme. 486-498 - Edwin B. Heinlein:

Year 2000 - A real is security issue. 499-500 - John Sherwood:

SALSA: A method for developing the enterprise security architecture and strategy. 501-506 - Jim Press:

Object oriented cryptographic facility design: Export considerations. 507-514 - Vijay Varadharajan, Claudio Calvelli:

Extending the schematic protection model - II. Revocation. 525-536 - Sung-Ming Yen:

Cryptanalysis and repair of the multi-verifier signature with verifier specification. 537-544
Volume 15, Number 7, 1996
- From the editor. 550-551

- Harold Joseph Highland:

Random bits & bytes. 552-560 - Tim Porter:

Information warfare - Your company needs you! 561-566 - Alan R. Krull:

GSSP (Generally-Accepted System Security Principles): A trip to Abilene? 567-575 - Andrew J. Clark:

Cryptographic controls - the eternal triangle, . 576-584 - Vesselin Bontchev:

Possible macro virus attacks and how to prevent them. 595-626 - Cees J. A. Jansen, Piet van der Vlist:

Message encipherment with minimal expansion and redundancy - doing better than ISO-10126. 627-632 - John D. Yesberg, Mark S. Anderson:

Quantitative authentication and vouching. 633-645
Volume 15, Number 8, 1996
- From the editor. 652-653

- Harold Joseph Highland:

Passwords, the web, and the internet. 654 - Harold Joseph Highland:

Pornography and privacy. 654-655 - Harold Joseph Highland:

It's a web browser! No, it's a weapon! 655-656 - Harold Joseph Highland:

Internet/web directory. 656-657 - Harold Joseph Highland:

The enemy within. 657 - Harold Joseph Highland:

Ntis volumes of interest. 658-660 - Jim Reid:

Plugging the holes in host-based authentication. 661-671 - Dean Adams:

Open for business - Securely! 673-682 - Lam-for Kwok

, Dennis Longley:
A security officer's workbench. 695-705 - Frederick B. Cohen:

A secure world-wide-web daemon. 707-724 - Markus Michels, David Naccache, Holger Petersen:

GOST 34.10 - A brief overview of Russia's DSA. 725-732

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














