Search dblp for Publications

export results for "stream:streams/conf/pcsec:"

 download as .bib file

@inproceedings{DBLP:conf/pcs/Comba86,
  author    = {Paul G. Comba},
  editor    = {David R. Callaghan and
               Leslie D. Ball},
  title     = {Approaches to cryptographic key management},
  booktitle = {Proceedings of the Northeast {ACM} Symposium on Personal Computer
               Security, {PCS} 1986, Waltham, Massachusetts, USA, 1986},
  pages     = {38--45},
  publisher = {{ACM}},
  year      = {1986},
  url       = {https://doi.org/10.1145/318772.318781},
  doi       = {10.1145/318772.318781},
  timestamp = {Sat, 12 Nov 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/pcs/Comba86.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcs/Hertzberg86,
  author    = {George Hertzberg},
  editor    = {David R. Callaghan and
               Leslie D. Ball},
  title     = {Human behavior factors in {PC} control},
  booktitle = {Proceedings of the Northeast {ACM} Symposium on Personal Computer
               Security, {PCS} 1986, Waltham, Massachusetts, USA, 1986},
  pages     = {46--56},
  publisher = {{ACM}},
  year      = {1986},
  url       = {https://doi.org/10.1145/318772.318782},
  doi       = {10.1145/318772.318782},
  timestamp = {Sat, 12 Nov 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/pcs/Hertzberg86.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcs/Holden86,
  author    = {Don Holden},
  editor    = {David R. Callaghan and
               Leslie D. Ball},
  title     = {The role of the host computer in defending against P.C.s},
  booktitle = {Proceedings of the Northeast {ACM} Symposium on Personal Computer
               Security, {PCS} 1986, Waltham, Massachusetts, USA, 1986},
  pages     = {28--37},
  publisher = {{ACM}},
  year      = {1986},
  url       = {https://doi.org/10.1145/318772.318780},
  doi       = {10.1145/318772.318780},
  timestamp = {Sat, 12 Nov 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/pcs/Holden86.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcs/Jennings86,
  author    = {William Jennings},
  editor    = {David R. Callaghan and
               Leslie D. Ball},
  title     = {Microcomputer management of the Bank of New England},
  booktitle = {Proceedings of the Northeast {ACM} Symposium on Personal Computer
               Security, {PCS} 1986, Waltham, Massachusetts, USA, 1986},
  pages     = {21--27},
  publisher = {{ACM}},
  year      = {1986},
  url       = {https://doi.org/10.1145/318772.318777},
  doi       = {10.1145/318772.318777},
  timestamp = {Sat, 12 Nov 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/pcs/Jennings86.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcs/KurzbanSHCHM86,
  author    = {Stanley A. Kurzban and
               James A. Schweitzer and
               Don Holden and
               Paul G. Comba and
               George Hertzberg and
               Bill Miller},
  editor    = {David R. Callaghan and
               Leslie D. Ball},
  title     = {Panel discussion (panel session)},
  booktitle = {Proceedings of the Northeast {ACM} Symposium on Personal Computer
               Security, {PCS} 1986, Waltham, Massachusetts, USA, 1986},
  pages     = {57--62},
  publisher = {{ACM}},
  year      = {1986},
  url       = {https://doi.org/10.1145/318772.318783},
  doi       = {10.1145/318772.318783},
  timestamp = {Sat, 12 Nov 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/pcs/KurzbanSHCHM86.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcs/Murray86,
  author    = {William Murray},
  editor    = {David R. Callaghan and
               Leslie D. Ball},
  title     = {Good security practice for personal computers},
  booktitle = {Proceedings of the Northeast {ACM} Symposium on Personal Computer
               Security, {PCS} 1986, Waltham, Massachusetts, USA, 1986},
  pages     = {1--12},
  publisher = {{ACM}},
  year      = {1986},
  url       = {https://doi.org/10.1145/318772.318775},
  doi       = {10.1145/318772.318775},
  timestamp = {Sat, 12 Nov 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/pcs/Murray86.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcs/Schweitzer86,
  author    = {James A. Schweitzer},
  editor    = {David R. Callaghan and
               Leslie D. Ball},
  title     = {Security awareness},
  booktitle = {Proceedings of the Northeast {ACM} Symposium on Personal Computer
               Security, {PCS} 1986, Waltham, Massachusetts, USA, 1986},
  pages     = {13--20},
  publisher = {{ACM}},
  year      = {1986},
  url       = {https://doi.org/10.1145/318772.318776},
  doi       = {10.1145/318772.318776},
  timestamp = {Sat, 12 Nov 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/pcs/Schweitzer86.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pcsec/1986,
  editor    = {David R. Callaghan and
               Leslie D. Ball},
  title     = {Proceedings of the Northeast {ACM} Symposium on Personal Computer
               Security, {PCS} 1986, Waltham, Massachusetts, USA, 1986},
  publisher = {{ACM}},
  year      = {1986},
  url       = {https://doi.org/10.1145/318772},
  doi       = {10.1145/318772},
  isbn      = {978-0-89791-251-8},
  timestamp = {Fri, 25 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/pcsec/1986.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics